Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/istr/istr58.bht:"
@article{DBLP:journals/istr/AcharyaD21, author = {Kamalesh Acharya and Ratna Dutta}, title = {Constructing provable secure broadcast encryption scheme with dealership}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102736}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102736}, doi = {10.1016/J.JISA.2020.102736}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/AcharyaD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AlayaS21, author = {Bechir Alaya and Lamaa Sellami}, title = {Clustering method and symmetric/asymmetric cryptography scheme adapted to securing urban {VANET} networks}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102779}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102779}, doi = {10.1016/J.JISA.2021.102779}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/AlayaS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AminPS21, author = {Ruhul Amin and Isha Pali and Venkatasamy Sureshkumar}, title = {Software-Defined Network enabled Vehicle to Vehicle secured data transmission protocol in VANETs}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102729}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102729}, doi = {10.1016/J.JISA.2020.102729}, timestamp = {Fri, 12 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/AminPS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AnthiWRBW21, author = {Eirini Anthi and Lowri Williams and Matilda Rhode and Pete Burnap and Adam Wedgbury}, title = {Adversarial attacks on machine learning cybersecurity defences in Industrial Control Systems}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102717}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102717}, doi = {10.1016/J.JISA.2020.102717}, timestamp = {Sun, 16 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/AnthiWRBW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/BoutetC21, author = {Antoine Boutet and Mathieu Cunche}, title = {Privacy protection for Wi-Fi location positioning systems}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102635}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102635}, doi = {10.1016/J.JISA.2020.102635}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/BoutetC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChanCG21, author = {Wai Kok Chan and Ji{-}Jian Chin and Vik Tor Goh}, title = {Simple and scalable blockchain with privacy}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102700}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102700}, doi = {10.1016/J.JISA.2020.102700}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ChanCG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChaouchDDMBO21, author = {Asma Chaouch and Laurent{-}St{\'{e}}phane Didier and Fangan{-}Yssouf Dosso and Nadia El Mrabet and Belgacem Bouallegue and Bouraoui Ouni}, title = {Two hardware implementations for modular multiplication in the {AMNS:} Sequential and semi-parallel}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102770}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102770}, doi = {10.1016/J.JISA.2021.102770}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ChaouchDDMBO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChenGHC21, author = {Jiahui Chen and Wensheng Gan and Muchuang Hu and Chien{-}Ming Chen}, title = {On the construction of a post-quantum blockchain for smart city}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102780}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102780}, doi = {10.1016/J.JISA.2021.102780}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/ChenGHC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChenH21, author = {Xiaofeng Chen and Chaoqun Hong}, title = {An Efficient Dual-image Reversible Data Hiding Scheme Based on Exploiting Modification Direction}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102702}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102702}, doi = {10.1016/J.JISA.2020.102702}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ChenH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChenMRMAABK21, author = {Mengji Chen and Taj Malook and Ateeq Ur Rehman and Yar Muhammad and Mohammad Dahman Alshehri and Aamir Akbar and Muhammad Bilal and Muazzam Ali Khan}, title = {Blockchain-Enabled healthcare system for detection of diabetes}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102771}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102771}, doi = {10.1016/J.JISA.2021.102771}, timestamp = {Tue, 26 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ChenMRMAABK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChiW21, author = {Po{-}Wen Chi and Ming{-}Hung Wang}, title = {Deniable search of encrypted cloud-storage data}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102806}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102806}, doi = {10.1016/J.JISA.2021.102806}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ChiW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/DebnathCKD21, author = {Sumit Kumar Debnath and Tanmay Choudhury and Nibedita Kundu and Kunal Dey}, title = {Post-quantum secure multi-party private set-intersection in star network topology}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102731}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102731}, doi = {10.1016/J.JISA.2020.102731}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/DebnathCKD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/DeebakA21, author = {Bakkiam David Deebak and Fadi M. Al{-}Turjman}, title = {Robust Lightweight Privacy-Preserving and Session Scheme Interrogation for Fog Computing Systems}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102689}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102689}, doi = {10.1016/J.JISA.2020.102689}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/DeebakA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/DeebakA21a, author = {Bakkiam David Deebak and Fadi M. Al{-}Turjman}, title = {Privacy-preserving in smart contracts using blockchain and artificial intelligence for cyber risk measurements}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102749}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102749}, doi = {10.1016/J.JISA.2021.102749}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/DeebakA21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/FarzadniaSN21, author = {Ehsan Farzadnia and Hossein Shirazi and Alireza Nowroozi}, title = {A novel sophisticated hybrid method for intrusion detection using the artificial immune system}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102721}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102721}, doi = {10.1016/J.JISA.2020.102721}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/FarzadniaSN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/GassaraR21, author = {Amal Gassara and Ismael Bouassida Rodriguez}, title = {Describing correct UAVs cooperation architectures applied on an anti-terrorism scenario}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102775}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102775}, doi = {10.1016/J.JISA.2021.102775}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/GassaraR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/GountiaR21, author = {Debasis Gountia and Sudip Roy}, title = {Security model for protecting intellectual property of state-of-the-art microfluidic biochips}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102773}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102773}, doi = {10.1016/J.JISA.2021.102773}, timestamp = {Sun, 16 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/GountiaR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/GranadilloFMAZ21, author = {Gustavo {Gonzalez Granadillo} and Mario Faiella and Ib{\'{e}}ria Medeiros and Rui Azevedo and Susana Gonzalez Zarzosa}, title = {{ETIP:} An Enriched Threat Intelligence Platform for improving {OSINT} correlation, analysis, visualization and sharing capabilities}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102715}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102715}, doi = {10.1016/J.JISA.2020.102715}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/GranadilloFMAZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/GuptaGGAGS21, author = {Sejal Gupta and Ritu Garg and Nitin Gupta and Waleed S. Alnumay and Uttam Ghosh and Pradip Kumar Sharma}, title = {Energy-efficient dynamic homomorphic security scheme for fog computing in IoT networks}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102768}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102768}, doi = {10.1016/J.JISA.2021.102768}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/GuptaGGAGS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HasanAKT21, author = {Shaikha Hasan and Mazen Ali and Sherah Kurnia and Ramayah Thurasamy}, title = {Evaluating the cyber security readiness of organizations and its influence on performance}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102726}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102726}, doi = {10.1016/J.JISA.2020.102726}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/HasanAKT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HazzaaSAC21, author = {Firas Hazzaa and Antesar M. Shabut and Nada Hussein M. Ali and Marcian N. Cirstea}, title = {Security Scheme Enhancement for Voice over Wireless Networks}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102798}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102798}, doi = {10.1016/J.JISA.2021.102798}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/HazzaaSAC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HijawiAAHF21, author = {Wadi' Hijawi and Ja'far Alqatawna and Ala' M. Al{-}Zoubi and Mohammad A. Hassonah and Hossam Faris}, title = {Android botnet detection using machine learning models based on a comprehensive static analysis approach}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102735}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102735}, doi = {10.1016/J.JISA.2020.102735}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/HijawiAAHF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HsuHXZL21, author = {Chingfang Hsu and Lein Harn and Zhe Xia and Maoyuan Zhang and Quanrun Li}, title = {Design of ideal secret sharing based on new results on representable quadripartite matroids}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102724}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102724}, doi = {10.1016/J.JISA.2020.102724}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/HsuHXZL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HuangCLL21, author = {Peng{-}Cheng Huang and Chinchen Chang and Yung{-}Hui Li and Yanjun Liu}, title = {Enhanced (n, n)-threshold {QR} code secret sharing scheme based on error correction mechanism}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102719}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102719}, doi = {10.1016/J.JISA.2020.102719}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/HuangCLL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HussainUKKCK21, author = {Saddam Hussain and Insaf Ullah and Hizbullah Khattak and Muhammad Asghar Khan and Chien{-}Ming Chen and Saru Kumari}, title = {A lightweight and provable secure identity-based generalized proxy signcryption {(IBGPS)} scheme for Industrial Internet of Things (IIoT)}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102625}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102625}, doi = {10.1016/J.JISA.2020.102625}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/HussainUKKCK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HusseinSMO21, title = {Retraction notice to "A Hybrid Security Strategy {(HS2)} for Reliable Video Streaming in Fog Computing" Journal of Information Security and Applications 51 {(2020)} 102412}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102807}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102807}, doi = {10.1016/J.JISA.2021.102807}, timestamp = {Fri, 07 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/HusseinSMO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/IqbalHAKR21, author = {Nadeem Iqbal and Muhammad Hanif and Sagheer Abbas and Muhammad Adnan Khan and Zia Ul Rehman}, title = {Dynamic 3D scrambled image based {RGB} image encryption scheme using hyperchaotic system and {DNA} encoding}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102809}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102809}, doi = {10.1016/J.JISA.2021.102809}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/IqbalHAKR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KaurK21, author = {Damandeep Kaur and Devender Kumar}, title = {Cryptanalysis and improvement of a two-factor user authentication scheme for smart home}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102787}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102787}, doi = {10.1016/J.JISA.2021.102787}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/KaurK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KhanK21, author = {Jan Sher Khan and Sema Ko{\c{c}} Kayhan}, title = {Chaos and compressive sensing based novel image encryption scheme}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102711}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102711}, doi = {10.1016/J.JISA.2020.102711}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/KhanK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KunangNSS21, author = {Yesi Novaria Kunang and Siti Nurmaini and Deris Stiawan and Bhakti Yudho Suprapto}, title = {Attack classification of an intrusion detection system using deep learning and hyperparameter optimization}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102804}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102804}, doi = {10.1016/J.JISA.2021.102804}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/KunangNSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KunduDM21, author = {Nibedita Kundu and Sumit Kumar Debnath and Dheerendra Mishra}, title = {A secure and efficient group signature scheme based on multivariate public key cryptography}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102776}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102776}, doi = {10.1016/J.JISA.2021.102776}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/KunduDM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LaiLLJ21, author = {Yen{-}Lung Lai and Minyi Li and Shiuan{-}Ni Liang and Zhe Jin}, title = {Lossless fuzzy extractor enabled secure authentication using low entropy noisy sources}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102695}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102695}, doi = {10.1016/J.JISA.2020.102695}, timestamp = {Sun, 16 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/LaiLLJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LiCHCN21, author = {Ying Li and Jiaxing Cheng and Cheng Huang and Zhouguo Chen and Weina Niu}, title = {NEDetector: Automatically extracting cybersecurity neologisms from hacker forums}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102784}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102784}, doi = {10.1016/J.JISA.2021.102784}, timestamp = {Wed, 19 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/LiCHCN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LiLDW21, author = {Yanbin Li and Yu Liu and Yongheng Dai and Pengda Wang}, title = {A party-adaptive variant of LowGear}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102763}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102763}, doi = {10.1016/J.JISA.2021.102763}, timestamp = {Sun, 16 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/LiLDW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LiWQYGWQ21, author = {Haiyu Li and Tao Wang and Zirui Qiao and Bo Yang and Yueyang Gong and Jingyi Wang and Guoyong Qiu}, title = {Blockchain-based searchable encryption with efficient result verification and fair payment}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102791}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102791}, doi = {10.1016/J.JISA.2021.102791}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/LiWQYGWQ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LiuTTM21, author = {Zi{-}Yuan Liu and Yi{-}Fan Tseng and Raylin Tso and Masahiro Mambo}, title = {Designated-ciphertext searchable encryption}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102709}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102709}, doi = {10.1016/J.JISA.2020.102709}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/LiuTTM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LizardoBNCA21, author = {Andr{\'{e}} Lizardo and Raul Barbosa and Samuel Neves and Jaime Correia and Filipe Ara{\'{u}}jo}, title = {End-to-end secure group communication for the Internet of Things}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102772}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102772}, doi = {10.1016/J.JISA.2021.102772}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/LizardoBNCA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Logrippo21, author = {Luigi Logrippo}, title = {Multi-level models for data security in networks and in the Internet of things}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102778}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102778}, doi = {10.1016/J.JISA.2021.102778}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Logrippo21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LvYZHT21, author = {Lingling Lv and Zhipeng Yang and Lei Zhang and Quanzhen Huang and Zhihong Tian}, title = {Multi-party transaction framework for drone services based on alliance blockchain in smart cities}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102792}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102792}, doi = {10.1016/J.JISA.2021.102792}, timestamp = {Sun, 16 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/LvYZHT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MannaPD21, author = {Michele La Manna and Pericle Perazzo and Gianluca Dini}, title = {{SEA-BREW:} {A} scalable Attribute-Based Encryption revocable scheme for low-bitrate IoT wireless networks}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102692}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102692}, doi = {10.1016/J.JISA.2020.102692}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/MannaPD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MathurPKNJ21, author = {Akshay Mathur and Laxmi Mounika Podila and Keyur Kulkarni and Quamar Niyaz and Ahmad Y. Javaid}, title = {NATICUSdroid: {A} malware detection framework for Android using native and custom permissions}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102696}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102696}, doi = {10.1016/J.JISA.2020.102696}, timestamp = {Sun, 16 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/MathurPKNJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MillarMRM21, author = {Stuart Millar and Niall McLaughlin and Jes{\'{u}}s Mart{\'{\i}}nez del Rinc{\'{o}}n and Paul Miller}, title = {Multi-view deep learning for zero-day Android malware detection}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102718}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102718}, doi = {10.1016/J.JISA.2020.102718}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/MillarMRM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MishraIZ21, author = {Nimish Mishra and SK Hafizul Islam and Sherali Zeadally}, title = {A comprehensive review on collision-resistant hash functions on lattices}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102782}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102782}, doi = {10.1016/J.JISA.2021.102782}, timestamp = {Sun, 16 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/MishraIZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MokbalWWZF21, author = {Fawaz Mahiuob Mohammed Mokbal and Dan Wang and Xiaoxi Wang and Wenbin Zhao and Lihua Fu}, title = {{XGBXSS:} An Extreme Gradient Boosting Detection Framework for Cross-Site Scripting Attacks Based on Hybrid Feature Selection Approach and Parameters Optimization}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102813}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102813}, doi = {10.1016/J.JISA.2021.102813}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/MokbalWWZF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/NishaB21, author = {O. S. Jannath Nisha and Somasundaram Mary Saira Bhanu}, title = {Detection of malicious Android applications using Ontology-based intelligent model in mobile cloud environment}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102751}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102751}, doi = {10.1016/J.JISA.2021.102751}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/NishaB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/NouraMC21, author = {Hassan N. Noura and Reem Melki and Ali Chehab}, title = {Efficient data confidentiality scheme for 5G wireless {NOMA} communications}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102781}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102781}, doi = {10.1016/J.JISA.2021.102781}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/NouraMC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/NtantogianBAPX21, author = {Christoforos Ntantogian and Panagiotis Bountakas and Dimitris Antonaropoulos and Constantinos Patsakis and Christos Xenakis}, title = {NodeXP: NOde.js server-side JavaScript injection vulnerability DEtection and eXPloitation}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102752}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102752}, doi = {10.1016/J.JISA.2021.102752}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/NtantogianBAPX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/PareekP21, author = {Gaurav Pareek and B. R. Purushothama}, title = {Secure and efficient revocable key-aggregate cryptosystem for multiple non-predefined non-disjoint aggregate sets}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102799}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102799}, doi = {10.1016/J.JISA.2021.102799}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/PareekP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/PatsakisC21, author = {Constantinos Patsakis and Fran Casino}, title = {Exploiting statistical and structural features for the detection of Domain Generation Algorithms}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102725}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102725}, doi = {10.1016/J.JISA.2020.102725}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/PatsakisC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/PolapSY21, author = {Dawid Polap and Gautam Srivastava and Keping Yu}, title = {Agent architecture of an intelligent medical system based on federated learning and blockchain technology}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102748}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102748}, doi = {10.1016/J.JISA.2021.102748}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/PolapSY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/PrasadP21, author = {Shilpee Prasad and B. R. Purushothama}, title = {{CCA} secure and efficient proxy re-encryption scheme without bilinear pairing}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102703}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102703}, doi = {10.1016/J.JISA.2020.102703}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/PrasadP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/QinTZZ21, author = {Shiyue Qin and Zhenhua Tan and Bin Zhang and Fucai Zhou}, title = {Distributed secret sharing scheme based on the high-dimensional rotation paraboloid}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102797}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102797}, doi = {10.1016/J.JISA.2021.102797}, timestamp = {Mon, 26 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/QinTZZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/RenLSYZ21, author = {Yanli Ren and Xiangyu Li and Shifeng Sun and Xingliang Yuan and Xinpeng Zhang}, title = {Privacy-preserving batch verification signature scheme based on blockchain for Vehicular Ad-Hoc Networks}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102698}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102698}, doi = {10.1016/J.JISA.2020.102698}, timestamp = {Wed, 25 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/RenLSYZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SahuSSH21, author = {Aditya Kumar Sahu and Gandharba Swain and Monalisa Sahu and J. Hemalatha}, title = {Multi-directional block based {PVD} and modulus function image steganography to avoid {FOBP} and {IEP}}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102808}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102808}, doi = {10.1016/J.JISA.2021.102808}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/SahuSSH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SailMMB21, author = {Soufiane Sail and Roberto Mag{\'{a}}n{-}Carri{\'{o}}n and Inmaculada Medina{-}Bulo and Halima Bouden}, title = {Preserving authentication and availability security services through Multivariate Statistical Network Monitoring}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102785}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102785}, doi = {10.1016/J.JISA.2021.102785}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/SailMMB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SaleemIAMH21, author = {Muhammad Asad Saleem and SK Hafizul Islam and Shafiq Ahmed and Khalid Mahmood and Majid Hussain}, title = {Provably secure biometric-based client-server secure communication over unreliable networks}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102769}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102769}, doi = {10.1016/J.JISA.2021.102769}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/SaleemIAMH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SarahBD21, author = {Izza Sarah and Mustapha Benssalah and Karim Drouiche}, title = {An enhanced scalable and secure {RFID} authentication protocol for {WBAN} within an IoT environment}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102705}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102705}, doi = {10.1016/J.JISA.2020.102705}, timestamp = {Sun, 16 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/SarahBD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SeyhanNACI21, author = {K{\"{u}}bra Seyhan and Tu N. Nguyen and Sedat Akleylek and Korhan Cengiz and SK Hafizul Islam}, title = {Bi-GISIS {KE:} Modified key exchange protocol with reusable keys for IoT security}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102788}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102788}, doi = {10.1016/J.JISA.2021.102788}, timestamp = {Tue, 02 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/SeyhanNACI21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ShahASTTK21, author = {Jay Shah and Sarthak Agarwal and Arpit Shukla and Sudeep Tanwar and Sudhanshu Tyagi and Neeraj Kumar}, title = {Blockchain-based scheme for the mobile number portability}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102764}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102764}, doi = {10.1016/J.JISA.2021.102764}, timestamp = {Sun, 16 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ShahASTTK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SharmaWG21, author = {Rahul Sharma and Mohammad Wazid and Prosanta Gope}, title = {A blockchain based secure communication framework for community interaction}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102790}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102790}, doi = {10.1016/J.JISA.2021.102790}, timestamp = {Sun, 16 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/SharmaWG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SinghA21, author = {Roop Singh and Alaknanda Ashok}, title = {An optimized robust watermarking technique using {CKGSA} in frequency domain}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102734}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102734}, doi = {10.1016/J.JISA.2020.102734}, timestamp = {Sun, 16 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/SinghA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SowjanyaDR21, author = {K. Sowjanya and Mou Dasgupta and Sangram Ray}, title = {Elliptic Curve Cryptography based authentication scheme for Internet of Medical Things}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102761}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102761}, doi = {10.1016/J.JISA.2021.102761}, timestamp = {Wed, 19 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/SowjanyaDR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/VijayI21, author = {M. Vijay and G. Indumathi}, title = {Deep belief network-based hybrid model for multimodal biometric system for futuristic security applications}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102707}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102707}, doi = {10.1016/J.JISA.2020.102707}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/VijayI21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/WangDD21, author = {Rui Wang and Guoqiang Deng and Xue{-}Feng Duan}, title = {An image encryption scheme based on double chaotic cyclic shift and Josephus problem}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102699}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102699}, doi = {10.1016/J.JISA.2020.102699}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/WangDD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/XiaFGWTW21, author = {Zhuoqun Xia and Zhenwei Fang and Ke Gu and Jin Wang and Jingjing Tan and Guanghui Wang}, title = {Effective charging identity authentication scheme based on fog computing in {V2G} networks}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102649}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102649}, doi = {10.1016/J.JISA.2020.102649}, timestamp = {Fri, 14 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/XiaFGWTW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/YangWSZ21, author = {Wencheng Yang and Song Wang and Muhammad Shahzad and Wei Zhou}, title = {A cancelable biometric authentication system based on feature-adaptive random projection}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102704}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102704}, doi = {10.1016/J.JISA.2020.102704}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/YangWSZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/YouLG21, author = {Zhaoning You and Yan Liu and Tiegang Gao}, title = {A lossless self-recovery watermarking scheme with {JPEG-LS} compression}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102733}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102733}, doi = {10.1016/J.JISA.2020.102733}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/YouLG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ZhangCKAKR21, author = {Yanbin Zhang and Ke Cheng and Fazlullah Khan and Ryan Alturki and Rahim Khan and Ateeq Ur Rehman}, title = {A mutual authentication scheme for establishing secure device-to-device communication sessions in the edge-enabled smart cities}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102683}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102683}, doi = {10.1016/J.JISA.2020.102683}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/ZhangCKAKR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ZhouDW21, author = {Yu Zhou and Xinfeng Dong and Yongzhuang Wei}, title = {On the transparency order relationships between one Boolean function and its decomposition functions}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102738}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2020.102738}, doi = {10.1016/J.JISA.2020.102738}, timestamp = {Fri, 04 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/ZhouDW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.