


default search action
Journal of Information Security and Applications, Volume 46
Volume 46, June 2019
- Ankur Lohachab

, Bidhan Karambir:
ECC based inter-device authentication and authorization scheme using MQTT for IoT networks. 1-12
- Salvatore Carta, Gianni Fenu, Diego Reforgiato Recupero

, Roberto Saia
:
Fraud detection for E-commerce transactions by employing a prudential Multiple Consensus model. 13-22 - K. Abhimanyu Kumar Patro

, Bibhudendra Acharya
:
An efficient colour image encryption scheme based on 1-D chaotic maps. 23-41 - Defu Wang, Xiaojuan Wang

, Yong Zhang
, Lei Jin:
Detection of power grid disturbances and cyber-attacks based on machine learning. 42-52 - Rami Mustafa A. Mohammad

, Mohammed Abdulrahman Alqahtani:
A comparison of machine learning techniques for file system forensics analysis. 53-61 - Diego Renza

, Sebastián Mendoza, Dora M. Ballesteros L.
:
High-uncertainty audio signal encryption based on the Collatz conjecture. 62-69 - Subodh Kumar, Rajendra Kumar, Sushil Kumar, Sunil Kumar:

Cryptographic construction using coupled map lattice as a diffusion model to enhanced security. 70-83 - Jalesh Kumar

, Shivananda Nirmala:
Securing the regions comprising information in a document image with novel key selection technique - a parallel approach. 84-95 - Hiep Cong Pham

, Linda Brennan, Steven Furnell:
Information security burnout: Identification of sources and mitigating factors from security demands and resources. 96-107
- Tapasi Bhattacharjee, Santi P. Maity

:
Progressive and hierarchical share-in-share scheme over cloud. 108-120 - Rui Ferreira, Rui L. Aguiar

:
Repositioning privacy concerns: Web servers controlling URL metadata. 121-137
- Dimitrios Damopoulos, Georgios Kambourakis

:
Hands-Free one-Time and continuous authentication using glass wearable devices. 138-150 - Kyrylo Petrenko, Atefeh Mashatan

, Farid Shirazi
:
Assessing the quantum-resistant cryptographic agility of routing and switching IT network infrastructure in a large-size financial organization. 151-163 - Umesh Kumar Singh, Chanchala Joshi, Dimitris Kanellopoulos

:
A framework for zero-day vulnerabilities detection and prioritization. 164-172 - Neelam Dabas, Ram Pal Singh

:
ELM-Kernel and reduced kernel ELM based watermarking scheme. 173-192 - Hamssa Hasrouny, Abed Ellatif Samhat

, Carole Bassil
, Anis Laouiti:
Misbehavior detection and efficient revocation within VANET. 193-209 - Abdelrahman Altigani

, Shafaatunnur Hasan, Siti Mariyam Shamsuddin
, Bazara I. A. Barry:
A multi-shape hybrid symmetric encryption algorithm to thwart attacks based on the knowledge of the used cryptographic suite. 210-221 - Mordechai Guri:

Optical air-gap exfiltration attack via invisible images. 222-230 - Rohit M. Thanki

, Ashish Kothari
, Deven Trivedi
:
Hybrid and blind watermarking scheme in DCuT - RDWT domain. 231-249 - Shanshan Li, Chunxiang Xu, Yuan Zhang

:
CSED: Client-Side encrypted deduplication scheme based on proofs of ownership for cloud storage. 250-258
- Yongzhong He, Xuejun Yang, Binghui Hu, Wei Wang:

Dynamic privacy leakage analysis of Android third-party libraries. 259-270 - Guoming Wang, Rongxing Lu, Cheng Huang, Yong Liang Guan:

An efficient and privacy-Preserving pre-clinical guide scheme for mobile eHealthcare. 271-280
- Arvind Bakshi

, Anoop Kumar Patel:
Secure telemedicine using RONI halftoned visual cryptography without pixel expansion. 281-295 - Andrea Visconti, Ondrej Mosnácek, Milan Broz

, Vashek Matyás:
Examining PBKDF2 security margin - Case study of LUKS. 296-306
- Ngoc-Dung T. Tieu, Huy H. Nguyen

, Hoang-Quoc Nguyen-Son, Junichi Yamagishi, Isao Echizen:
Spatio-temporal generative adversarial network for gait anonymization. 307-319 - Sudipta Kumar Ghosal

, Jyotsna Kumar Mandal
:
On the use of the Stirling Transform in image steganography. 320-330

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














