


default search action
Journal of Information Security and Applications, Volume 90
Volume 90, 2025
- Ankur, Rajeev Kumar

, Ajay K. Sharma:
Reversible data hiding in encrypted image using bit-plane based label-map encoding with optimal block size. 104005 - Jukka Ruohonen

:
SoK: The design paradigm of safe and secure defaults. 103989 - Ghulam Murtaza

, Umar Hayat
:
Efficient image encryption algorithm based on ECC and dynamic S-box. 104004 - Surbhi Prakash, Amar Kumar Mohapatra:

MA_BiRAE - Malware analysis and detection technique using adversarial learning and deep learning. 104009 - Hengzhu Liu, Ping Xiong

, Tianqing Zhu, Philip S. Yu
:
A survey on machine unlearning: Techniques and new emerged privacy risks. 104010 - Xiaoguang Liu, Peize Liu, Bo Yang, Yizhan Chen:

One multi-receiver certificateless searchable public key encryption scheme for IoMT assisted by LLM. 104011 - Long Yin, Jian Xu, Zihao Wang, Qiang Wang, Fucai Zhou:

A semi-centralized key agreement protocol integrated multiple security communication techniques for LLM-based autonomous driving system. 104012 - Samia Saidane

, Francesco Telch, Kussai Shahin, Fabrizio Granelli
:
Deep GraphSAGE enhancements for intrusion detection: Analyzing attention mechanisms and GCN integration. 104013 - Xiaoying Zhu

, Shihong Zou
, Guoai Xu, Jinwen Xi
:
Group-Capability-Based Access Control with Ring Signature. 104014 - Karim Khalil

, Christian Gehrmann, Günther Vogel:
CyberROAD: A cybersecurity risk assessment ontology for automotive domain aligned with ISO/SAE 21434:2021. 104015 - Hayato Watanabe, Ryoma Ito

, Toshihiro Ohigashi:
On the effects of neural network-based output prediction attacks on the design of symmetric-key ciphers. 104016 - Aurelio Loris Canino, Gianluca Lax:

A cost-effective solution leveraging public blockchain for massively sharing malware signatures. 104017 - Jyothy S. T, Mrinal Sarvagya:

IDHG-ECC-integrated Diffie Hellman Galois-elliptic-curve cryptography for enhancing EHR data security. 104024 - Guangyun Yang, Xinhui Lu, Yu Lu, Junlin Tang, Xiangguang Xiong

:
Robust zero-watermarking method for multiple medical images using wavelet fusion and DTCWT-QR. 104028 - Guanlin Pan

, Haowen Tan, Wenying Zheng, Pandi Vijayakumar
, Q. M. Jonathan Wu, Audithan Sivaraman:
Three-factor authentication and key agreement protocol with collusion resistance in VANETs. 104029 - Guojun Fan, Lei Lu, Xiaodong Song, Zijing Li, Zhibin Pan:

Non-local PPVO-based reversible data hiding using opposite direction pairwise embedding. 104030 - Yuxuan Zhao, Junfeng Tian

:
A novel lightweight authentication protocol for WBAN based on Stern-Brocot tree. 104031 - Tahir Iqbal

, Guowei Wu, Zahid Iqbal
, Muhammad Bilal Mahmood
, Amreen Shafique, Wenbo Guo:
PypiGuard: A novel meta-learning approach for enhanced malicious package detection in PyPI through static-dynamic feature fusion. 104032 - Tapaswini Mohanty, Vikas Srivastava

, Sumit Kumar Debnath, Pantelimon Stanica
:
Quantum secure protocols for multiparty computations. 104033 - Jiaxin Li

, Marco Arazzi
, Antonino Nocera
, Mauro Conti
:
Subject Data Auditing via Source Inference Attack in Cross-Silo Federated Learning. 104034 - Gaurav Baranwal

, Anubhav Yadav:
Privacy-preserving candidate assessment and selection frameworks in e-recruitment system. 104043

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














