Search dblp for Publications

export results for "toc:db/journals/istr/istr58.bht:"

 download as .bib file

@article{DBLP:journals/istr/AcharyaD21,
  author       = {Kamalesh Acharya and
                  Ratna Dutta},
  title        = {Constructing provable secure broadcast encryption scheme with dealership},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102736},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102736},
  doi          = {10.1016/J.JISA.2020.102736},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/AcharyaD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AlayaS21,
  author       = {Bechir Alaya and
                  Lamaa Sellami},
  title        = {Clustering method and symmetric/asymmetric cryptography scheme adapted
                  to securing urban {VANET} networks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102779},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102779},
  doi          = {10.1016/J.JISA.2021.102779},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/AlayaS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AminPS21,
  author       = {Ruhul Amin and
                  Isha Pali and
                  Venkatasamy Sureshkumar},
  title        = {Software-Defined Network enabled Vehicle to Vehicle secured data transmission
                  protocol in VANETs},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102729},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102729},
  doi          = {10.1016/J.JISA.2020.102729},
  timestamp    = {Fri, 12 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/AminPS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AnthiWRBW21,
  author       = {Eirini Anthi and
                  Lowri Williams and
                  Matilda Rhode and
                  Pete Burnap and
                  Adam Wedgbury},
  title        = {Adversarial attacks on machine learning cybersecurity defences in
                  Industrial Control Systems},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102717},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102717},
  doi          = {10.1016/J.JISA.2020.102717},
  timestamp    = {Sun, 16 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/AnthiWRBW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/BoutetC21,
  author       = {Antoine Boutet and
                  Mathieu Cunche},
  title        = {Privacy protection for Wi-Fi location positioning systems},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102635},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102635},
  doi          = {10.1016/J.JISA.2020.102635},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/BoutetC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChanCG21,
  author       = {Wai Kok Chan and
                  Ji{-}Jian Chin and
                  Vik Tor Goh},
  title        = {Simple and scalable blockchain with privacy},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102700},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102700},
  doi          = {10.1016/J.JISA.2020.102700},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ChanCG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChaouchDDMBO21,
  author       = {Asma Chaouch and
                  Laurent{-}St{\'{e}}phane Didier and
                  Fangan{-}Yssouf Dosso and
                  Nadia El Mrabet and
                  Belgacem Bouallegue and
                  Bouraoui Ouni},
  title        = {Two hardware implementations for modular multiplication in the {AMNS:}
                  Sequential and semi-parallel},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102770},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102770},
  doi          = {10.1016/J.JISA.2021.102770},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ChaouchDDMBO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChenGHC21,
  author       = {Jiahui Chen and
                  Wensheng Gan and
                  Muchuang Hu and
                  Chien{-}Ming Chen},
  title        = {On the construction of a post-quantum blockchain for smart city},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102780},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102780},
  doi          = {10.1016/J.JISA.2021.102780},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/ChenGHC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChenH21,
  author       = {Xiaofeng Chen and
                  Chaoqun Hong},
  title        = {An Efficient Dual-image Reversible Data Hiding Scheme Based on Exploiting
                  Modification Direction},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102702},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102702},
  doi          = {10.1016/J.JISA.2020.102702},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ChenH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChenMRMAABK21,
  author       = {Mengji Chen and
                  Taj Malook and
                  Ateeq Ur Rehman and
                  Yar Muhammad and
                  Mohammad Dahman Alshehri and
                  Aamir Akbar and
                  Muhammad Bilal and
                  Muazzam Ali Khan},
  title        = {Blockchain-Enabled healthcare system for detection of diabetes},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102771},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102771},
  doi          = {10.1016/J.JISA.2021.102771},
  timestamp    = {Tue, 26 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ChenMRMAABK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChiW21,
  author       = {Po{-}Wen Chi and
                  Ming{-}Hung Wang},
  title        = {Deniable search of encrypted cloud-storage data},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102806},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102806},
  doi          = {10.1016/J.JISA.2021.102806},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ChiW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/DebnathCKD21,
  author       = {Sumit Kumar Debnath and
                  Tanmay Choudhury and
                  Nibedita Kundu and
                  Kunal Dey},
  title        = {Post-quantum secure multi-party private set-intersection in star network
                  topology},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102731},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102731},
  doi          = {10.1016/J.JISA.2020.102731},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/DebnathCKD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/DeebakA21,
  author       = {Bakkiam David Deebak and
                  Fadi M. Al{-}Turjman},
  title        = {Robust Lightweight Privacy-Preserving and Session Scheme Interrogation
                  for Fog Computing Systems},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102689},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102689},
  doi          = {10.1016/J.JISA.2020.102689},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/DeebakA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/DeebakA21a,
  author       = {Bakkiam David Deebak and
                  Fadi M. Al{-}Turjman},
  title        = {Privacy-preserving in smart contracts using blockchain and artificial
                  intelligence for cyber risk measurements},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102749},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102749},
  doi          = {10.1016/J.JISA.2021.102749},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/DeebakA21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/FarzadniaSN21,
  author       = {Ehsan Farzadnia and
                  Hossein Shirazi and
                  Alireza Nowroozi},
  title        = {A novel sophisticated hybrid method for intrusion detection using
                  the artificial immune system},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102721},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102721},
  doi          = {10.1016/J.JISA.2020.102721},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/FarzadniaSN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/GassaraR21,
  author       = {Amal Gassara and
                  Ismael Bouassida Rodriguez},
  title        = {Describing correct UAVs cooperation architectures applied on an anti-terrorism
                  scenario},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102775},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102775},
  doi          = {10.1016/J.JISA.2021.102775},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/GassaraR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/GountiaR21,
  author       = {Debasis Gountia and
                  Sudip Roy},
  title        = {Security model for protecting intellectual property of state-of-the-art
                  microfluidic biochips},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102773},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102773},
  doi          = {10.1016/J.JISA.2021.102773},
  timestamp    = {Sun, 16 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/GountiaR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/GranadilloFMAZ21,
  author       = {Gustavo {Gonzalez Granadillo} and
                  Mario Faiella and
                  Ib{\'{e}}ria Medeiros and
                  Rui Azevedo and
                  Susana Gonzalez Zarzosa},
  title        = {{ETIP:} An Enriched Threat Intelligence Platform for improving {OSINT}
                  correlation, analysis, visualization and sharing capabilities},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102715},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102715},
  doi          = {10.1016/J.JISA.2020.102715},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/GranadilloFMAZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/GuptaGGAGS21,
  author       = {Sejal Gupta and
                  Ritu Garg and
                  Nitin Gupta and
                  Waleed S. Alnumay and
                  Uttam Ghosh and
                  Pradip Kumar Sharma},
  title        = {Energy-efficient dynamic homomorphic security scheme for fog computing
                  in IoT networks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102768},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102768},
  doi          = {10.1016/J.JISA.2021.102768},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/GuptaGGAGS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HasanAKT21,
  author       = {Shaikha Hasan and
                  Mazen Ali and
                  Sherah Kurnia and
                  Ramayah Thurasamy},
  title        = {Evaluating the cyber security readiness of organizations and its influence
                  on performance},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102726},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102726},
  doi          = {10.1016/J.JISA.2020.102726},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/HasanAKT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HazzaaSAC21,
  author       = {Firas Hazzaa and
                  Antesar M. Shabut and
                  Nada Hussein M. Ali and
                  Marcian N. Cirstea},
  title        = {Security Scheme Enhancement for Voice over Wireless Networks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102798},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102798},
  doi          = {10.1016/J.JISA.2021.102798},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/HazzaaSAC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HijawiAAHF21,
  author       = {Wadi' Hijawi and
                  Ja'far Alqatawna and
                  Ala' M. Al{-}Zoubi and
                  Mohammad A. Hassonah and
                  Hossam Faris},
  title        = {Android botnet detection using machine learning models based on a
                  comprehensive static analysis approach},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102735},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102735},
  doi          = {10.1016/J.JISA.2020.102735},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/HijawiAAHF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HsuHXZL21,
  author       = {Chingfang Hsu and
                  Lein Harn and
                  Zhe Xia and
                  Maoyuan Zhang and
                  Quanrun Li},
  title        = {Design of ideal secret sharing based on new results on representable
                  quadripartite matroids},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102724},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102724},
  doi          = {10.1016/J.JISA.2020.102724},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/HsuHXZL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HuangCLL21,
  author       = {Peng{-}Cheng Huang and
                  Chinchen Chang and
                  Yung{-}Hui Li and
                  Yanjun Liu},
  title        = {Enhanced (n, n)-threshold {QR} code secret sharing scheme based on
                  error correction mechanism},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102719},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102719},
  doi          = {10.1016/J.JISA.2020.102719},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/HuangCLL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HussainUKKCK21,
  author       = {Saddam Hussain and
                  Insaf Ullah and
                  Hizbullah Khattak and
                  Muhammad Asghar Khan and
                  Chien{-}Ming Chen and
                  Saru Kumari},
  title        = {A lightweight and provable secure identity-based generalized proxy
                  signcryption {(IBGPS)} scheme for Industrial Internet of Things (IIoT)},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102625},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102625},
  doi          = {10.1016/J.JISA.2020.102625},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/HussainUKKCK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HusseinSMO21,
  title        = {Retraction notice to "A Hybrid Security Strategy {(HS2)} for Reliable
                  Video Streaming in Fog Computing" Journal of Information Security
                  and Applications 51 {(2020)} 102412},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102807},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102807},
  doi          = {10.1016/J.JISA.2021.102807},
  timestamp    = {Fri, 07 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/HusseinSMO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/IqbalHAKR21,
  author       = {Nadeem Iqbal and
                  Muhammad Hanif and
                  Sagheer Abbas and
                  Muhammad Adnan Khan and
                  Zia Ul Rehman},
  title        = {Dynamic 3D scrambled image based {RGB} image encryption scheme using
                  hyperchaotic system and {DNA} encoding},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102809},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102809},
  doi          = {10.1016/J.JISA.2021.102809},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/IqbalHAKR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KaurK21,
  author       = {Damandeep Kaur and
                  Devender Kumar},
  title        = {Cryptanalysis and improvement of a two-factor user authentication
                  scheme for smart home},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102787},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102787},
  doi          = {10.1016/J.JISA.2021.102787},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/KaurK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KhanK21,
  author       = {Jan Sher Khan and
                  Sema Ko{\c{c}} Kayhan},
  title        = {Chaos and compressive sensing based novel image encryption scheme},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102711},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102711},
  doi          = {10.1016/J.JISA.2020.102711},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/KhanK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KunangNSS21,
  author       = {Yesi Novaria Kunang and
                  Siti Nurmaini and
                  Deris Stiawan and
                  Bhakti Yudho Suprapto},
  title        = {Attack classification of an intrusion detection system using deep
                  learning and hyperparameter optimization},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102804},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102804},
  doi          = {10.1016/J.JISA.2021.102804},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/KunangNSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KunduDM21,
  author       = {Nibedita Kundu and
                  Sumit Kumar Debnath and
                  Dheerendra Mishra},
  title        = {A secure and efficient group signature scheme based on multivariate
                  public key cryptography},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102776},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102776},
  doi          = {10.1016/J.JISA.2021.102776},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/KunduDM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LaiLLJ21,
  author       = {Yen{-}Lung Lai and
                  Minyi Li and
                  Shiuan{-}Ni Liang and
                  Zhe Jin},
  title        = {Lossless fuzzy extractor enabled secure authentication using low entropy
                  noisy sources},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102695},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102695},
  doi          = {10.1016/J.JISA.2020.102695},
  timestamp    = {Sun, 16 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/LaiLLJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LiCHCN21,
  author       = {Ying Li and
                  Jiaxing Cheng and
                  Cheng Huang and
                  Zhouguo Chen and
                  Weina Niu},
  title        = {NEDetector: Automatically extracting cybersecurity neologisms from
                  hacker forums},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102784},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102784},
  doi          = {10.1016/J.JISA.2021.102784},
  timestamp    = {Wed, 19 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/LiCHCN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LiLDW21,
  author       = {Yanbin Li and
                  Yu Liu and
                  Yongheng Dai and
                  Pengda Wang},
  title        = {A party-adaptive variant of LowGear},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102763},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102763},
  doi          = {10.1016/J.JISA.2021.102763},
  timestamp    = {Sun, 16 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/LiLDW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LiWQYGWQ21,
  author       = {Haiyu Li and
                  Tao Wang and
                  Zirui Qiao and
                  Bo Yang and
                  Yueyang Gong and
                  Jingyi Wang and
                  Guoyong Qiu},
  title        = {Blockchain-based searchable encryption with efficient result verification
                  and fair payment},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102791},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102791},
  doi          = {10.1016/J.JISA.2021.102791},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/LiWQYGWQ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LiuTTM21,
  author       = {Zi{-}Yuan Liu and
                  Yi{-}Fan Tseng and
                  Raylin Tso and
                  Masahiro Mambo},
  title        = {Designated-ciphertext searchable encryption},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102709},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102709},
  doi          = {10.1016/J.JISA.2020.102709},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/LiuTTM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LizardoBNCA21,
  author       = {Andr{\'{e}} Lizardo and
                  Raul Barbosa and
                  Samuel Neves and
                  Jaime Correia and
                  Filipe Ara{\'{u}}jo},
  title        = {End-to-end secure group communication for the Internet of Things},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102772},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102772},
  doi          = {10.1016/J.JISA.2021.102772},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/LizardoBNCA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Logrippo21,
  author       = {Luigi Logrippo},
  title        = {Multi-level models for data security in networks and in the Internet
                  of things},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102778},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102778},
  doi          = {10.1016/J.JISA.2021.102778},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Logrippo21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LvYZHT21,
  author       = {Lingling Lv and
                  Zhipeng Yang and
                  Lei Zhang and
                  Quanzhen Huang and
                  Zhihong Tian},
  title        = {Multi-party transaction framework for drone services based on alliance
                  blockchain in smart cities},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102792},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102792},
  doi          = {10.1016/J.JISA.2021.102792},
  timestamp    = {Sun, 16 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/LvYZHT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MannaPD21,
  author       = {Michele La Manna and
                  Pericle Perazzo and
                  Gianluca Dini},
  title        = {{SEA-BREW:} {A} scalable Attribute-Based Encryption revocable scheme
                  for low-bitrate IoT wireless networks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102692},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102692},
  doi          = {10.1016/J.JISA.2020.102692},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/MannaPD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MathurPKNJ21,
  author       = {Akshay Mathur and
                  Laxmi Mounika Podila and
                  Keyur Kulkarni and
                  Quamar Niyaz and
                  Ahmad Y. Javaid},
  title        = {NATICUSdroid: {A} malware detection framework for Android using native
                  and custom permissions},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102696},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102696},
  doi          = {10.1016/J.JISA.2020.102696},
  timestamp    = {Sun, 16 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/MathurPKNJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MillarMRM21,
  author       = {Stuart Millar and
                  Niall McLaughlin and
                  Jes{\'{u}}s Mart{\'{\i}}nez del Rinc{\'{o}}n and
                  Paul Miller},
  title        = {Multi-view deep learning for zero-day Android malware detection},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102718},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102718},
  doi          = {10.1016/J.JISA.2020.102718},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/MillarMRM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MishraIZ21,
  author       = {Nimish Mishra and
                  SK Hafizul Islam and
                  Sherali Zeadally},
  title        = {A comprehensive review on collision-resistant hash functions on lattices},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102782},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102782},
  doi          = {10.1016/J.JISA.2021.102782},
  timestamp    = {Sun, 16 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/MishraIZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MokbalWWZF21,
  author       = {Fawaz Mahiuob Mohammed Mokbal and
                  Dan Wang and
                  Xiaoxi Wang and
                  Wenbin Zhao and
                  Lihua Fu},
  title        = {{XGBXSS:} An Extreme Gradient Boosting Detection Framework for Cross-Site
                  Scripting Attacks Based on Hybrid Feature Selection Approach and Parameters
                  Optimization},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102813},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102813},
  doi          = {10.1016/J.JISA.2021.102813},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/MokbalWWZF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/NishaB21,
  author       = {O. S. Jannath Nisha and
                  Somasundaram Mary Saira Bhanu},
  title        = {Detection of malicious Android applications using Ontology-based intelligent
                  model in mobile cloud environment},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102751},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102751},
  doi          = {10.1016/J.JISA.2021.102751},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/NishaB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/NouraMC21,
  author       = {Hassan N. Noura and
                  Reem Melki and
                  Ali Chehab},
  title        = {Efficient data confidentiality scheme for 5G wireless {NOMA} communications},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102781},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102781},
  doi          = {10.1016/J.JISA.2021.102781},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/NouraMC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/NtantogianBAPX21,
  author       = {Christoforos Ntantogian and
                  Panagiotis Bountakas and
                  Dimitris Antonaropoulos and
                  Constantinos Patsakis and
                  Christos Xenakis},
  title        = {NodeXP: NOde.js server-side JavaScript injection vulnerability DEtection
                  and eXPloitation},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102752},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102752},
  doi          = {10.1016/J.JISA.2021.102752},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/NtantogianBAPX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/PareekP21,
  author       = {Gaurav Pareek and
                  B. R. Purushothama},
  title        = {Secure and efficient revocable key-aggregate cryptosystem for multiple
                  non-predefined non-disjoint aggregate sets},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102799},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102799},
  doi          = {10.1016/J.JISA.2021.102799},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/PareekP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/PatsakisC21,
  author       = {Constantinos Patsakis and
                  Fran Casino},
  title        = {Exploiting statistical and structural features for the detection of
                  Domain Generation Algorithms},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102725},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102725},
  doi          = {10.1016/J.JISA.2020.102725},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/PatsakisC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/PolapSY21,
  author       = {Dawid Polap and
                  Gautam Srivastava and
                  Keping Yu},
  title        = {Agent architecture of an intelligent medical system based on federated
                  learning and blockchain technology},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102748},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102748},
  doi          = {10.1016/J.JISA.2021.102748},
  timestamp    = {Thu, 05 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/PolapSY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/PrasadP21,
  author       = {Shilpee Prasad and
                  B. R. Purushothama},
  title        = {{CCA} secure and efficient proxy re-encryption scheme without bilinear
                  pairing},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102703},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102703},
  doi          = {10.1016/J.JISA.2020.102703},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/PrasadP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/QinTZZ21,
  author       = {Shiyue Qin and
                  Zhenhua Tan and
                  Bin Zhang and
                  Fucai Zhou},
  title        = {Distributed secret sharing scheme based on the high-dimensional rotation
                  paraboloid},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102797},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102797},
  doi          = {10.1016/J.JISA.2021.102797},
  timestamp    = {Mon, 26 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/QinTZZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/RenLSYZ21,
  author       = {Yanli Ren and
                  Xiangyu Li and
                  Shifeng Sun and
                  Xingliang Yuan and
                  Xinpeng Zhang},
  title        = {Privacy-preserving batch verification signature scheme based on blockchain
                  for Vehicular Ad-Hoc Networks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102698},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102698},
  doi          = {10.1016/J.JISA.2020.102698},
  timestamp    = {Wed, 25 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/RenLSYZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SahuSSH21,
  author       = {Aditya Kumar Sahu and
                  Gandharba Swain and
                  Monalisa Sahu and
                  J. Hemalatha},
  title        = {Multi-directional block based {PVD} and modulus function image steganography
                  to avoid {FOBP} and {IEP}},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102808},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102808},
  doi          = {10.1016/J.JISA.2021.102808},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/SahuSSH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SailMMB21,
  author       = {Soufiane Sail and
                  Roberto Mag{\'{a}}n{-}Carri{\'{o}}n and
                  Inmaculada Medina{-}Bulo and
                  Halima Bouden},
  title        = {Preserving authentication and availability security services through
                  Multivariate Statistical Network Monitoring},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102785},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102785},
  doi          = {10.1016/J.JISA.2021.102785},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/SailMMB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SaleemIAMH21,
  author       = {Muhammad Asad Saleem and
                  SK Hafizul Islam and
                  Shafiq Ahmed and
                  Khalid Mahmood and
                  Majid Hussain},
  title        = {Provably secure biometric-based client-server secure communication
                  over unreliable networks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102769},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102769},
  doi          = {10.1016/J.JISA.2021.102769},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/SaleemIAMH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SarahBD21,
  author       = {Izza Sarah and
                  Mustapha Benssalah and
                  Karim Drouiche},
  title        = {An enhanced scalable and secure {RFID} authentication protocol for
                  {WBAN} within an IoT environment},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102705},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102705},
  doi          = {10.1016/J.JISA.2020.102705},
  timestamp    = {Sun, 16 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/SarahBD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SeyhanNACI21,
  author       = {K{\"{u}}bra Seyhan and
                  Tu N. Nguyen and
                  Sedat Akleylek and
                  Korhan Cengiz and
                  SK Hafizul Islam},
  title        = {Bi-GISIS {KE:} Modified key exchange protocol with reusable keys for
                  IoT security},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102788},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102788},
  doi          = {10.1016/J.JISA.2021.102788},
  timestamp    = {Tue, 02 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/SeyhanNACI21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ShahASTTK21,
  author       = {Jay Shah and
                  Sarthak Agarwal and
                  Arpit Shukla and
                  Sudeep Tanwar and
                  Sudhanshu Tyagi and
                  Neeraj Kumar},
  title        = {Blockchain-based scheme for the mobile number portability},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102764},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102764},
  doi          = {10.1016/J.JISA.2021.102764},
  timestamp    = {Sun, 16 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ShahASTTK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SharmaWG21,
  author       = {Rahul Sharma and
                  Mohammad Wazid and
                  Prosanta Gope},
  title        = {A blockchain based secure communication framework for community interaction},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102790},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102790},
  doi          = {10.1016/J.JISA.2021.102790},
  timestamp    = {Sun, 16 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/SharmaWG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SinghA21,
  author       = {Roop Singh and
                  Alaknanda Ashok},
  title        = {An optimized robust watermarking technique using {CKGSA} in frequency
                  domain},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102734},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102734},
  doi          = {10.1016/J.JISA.2020.102734},
  timestamp    = {Sun, 16 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/SinghA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SowjanyaDR21,
  author       = {K. Sowjanya and
                  Mou Dasgupta and
                  Sangram Ray},
  title        = {Elliptic Curve Cryptography based authentication scheme for Internet
                  of Medical Things},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102761},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102761},
  doi          = {10.1016/J.JISA.2021.102761},
  timestamp    = {Wed, 19 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/SowjanyaDR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/VijayI21,
  author       = {M. Vijay and
                  G. Indumathi},
  title        = {Deep belief network-based hybrid model for multimodal biometric system
                  for futuristic security applications},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102707},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102707},
  doi          = {10.1016/J.JISA.2020.102707},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/VijayI21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WangDD21,
  author       = {Rui Wang and
                  Guoqiang Deng and
                  Xue{-}Feng Duan},
  title        = {An image encryption scheme based on double chaotic cyclic shift and
                  Josephus problem},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102699},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102699},
  doi          = {10.1016/J.JISA.2020.102699},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/WangDD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/XiaFGWTW21,
  author       = {Zhuoqun Xia and
                  Zhenwei Fang and
                  Ke Gu and
                  Jin Wang and
                  Jingjing Tan and
                  Guanghui Wang},
  title        = {Effective charging identity authentication scheme based on fog computing
                  in {V2G} networks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102649},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102649},
  doi          = {10.1016/J.JISA.2020.102649},
  timestamp    = {Fri, 14 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/XiaFGWTW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/YangWSZ21,
  author       = {Wencheng Yang and
                  Song Wang and
                  Muhammad Shahzad and
                  Wei Zhou},
  title        = {A cancelable biometric authentication system based on feature-adaptive
                  random projection},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102704},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102704},
  doi          = {10.1016/J.JISA.2020.102704},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/YangWSZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/YouLG21,
  author       = {Zhaoning You and
                  Yan Liu and
                  Tiegang Gao},
  title        = {A lossless self-recovery watermarking scheme with {JPEG-LS} compression},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102733},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102733},
  doi          = {10.1016/J.JISA.2020.102733},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/YouLG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ZhangCKAKR21,
  author       = {Yanbin Zhang and
                  Ke Cheng and
                  Fazlullah Khan and
                  Ryan Alturki and
                  Rahim Khan and
                  Ateeq Ur Rehman},
  title        = {A mutual authentication scheme for establishing secure device-to-device
                  communication sessions in the edge-enabled smart cities},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102683},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102683},
  doi          = {10.1016/J.JISA.2020.102683},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/ZhangCKAKR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ZhouDW21,
  author       = {Yu Zhou and
                  Xinfeng Dong and
                  Yongzhuang Wei},
  title        = {On the transparency order relationships between one Boolean function
                  and its decomposition functions},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102738},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102738},
  doi          = {10.1016/J.JISA.2020.102738},
  timestamp    = {Fri, 04 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/ZhouDW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics