Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Search dblp for Publications

export results for "toc:db/journals/istr/istr73.bht:"

 download as .bib file

@article{DBLP:journals/istr/DaubnerMMBMP23,
  author       = {Lukas Daubner and
                  Martin Mac{\'{a}}k and
                  Raimundas Matulevicius and
                  Barbora Buhnova and
                  Sofija Maksovic and
                  Tom{\'{a}}s Pitner},
  title        = {Addressing insider attacks via forensic-ready risk management},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {73},
  pages        = {103433},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103433},
  doi          = {10.1016/J.JISA.2023.103433},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/DaubnerMMBMP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/FarAH23,
  author       = {Saeed Banaeian Far and
                  Maryam Rajabzadeh Asaar and
                  Afrooz Haghbin},
  title        = {Distributed auditing protocol for untraceable transactions},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {73},
  pages        = {103429},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103429},
  doi          = {10.1016/J.JISA.2023.103429},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/FarAH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/GuoDZW23,
  author       = {Junyan Guo and
                  Ye Du and
                  Dawei Zhang and
                  Runfang Wu},
  title        = {{PSEEMV:} Provably secure and efficient emergency message verification
                  scheme based on {ECC} and {CRT} for Space Information Network},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {73},
  pages        = {103437},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103437},
  doi          = {10.1016/J.JISA.2023.103437},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/GuoDZW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/GuoWTFZ23,
  author       = {Cheng Guo and
                  Litao Wang and
                  Xinyu Tang and
                  Bin Feng and
                  Guofeng Zhang},
  title        = {Two-party interactive secure deduplication with efficient data ownership
                  management in cloud storage},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {73},
  pages        = {103426},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103426},
  doi          = {10.1016/J.JISA.2023.103426},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/GuoWTFZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HoglundFR23,
  author       = {Joel H{\"{o}}glund and
                  Martin Furuhed and
                  Shahid Raza},
  title        = {Lightweight certificate revocation for low-power IoT with end-to-end
                  security},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {73},
  pages        = {103424},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103424},
  doi          = {10.1016/J.JISA.2023.103424},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/HoglundFR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KoshibaZB23,
  author       = {Takeshi Koshiba and
                  Behrouz Zolfaghari and
                  Khodakhast Bibak},
  title        = {A tradeoff paradigm shift in cryptographically-secure pseudorandom
                  number generation based on discrete logarithm},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {73},
  pages        = {103430},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103430},
  doi          = {10.1016/J.JISA.2023.103430},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/KoshibaZB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KumarS23,
  author       = {Anmol Kumar and
                  Gaurav Somani},
  title        = {Service separation assisted DDoS attack mitigation in cloud targets},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {73},
  pages        = {103435},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103435},
  doi          = {10.1016/J.JISA.2023.103435},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/KumarS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LeeCCHFL23,
  author       = {Jung{-}San Lee and
                  Ying{-}Chin Chen and
                  Chit{-}Jie Chew and
                  Wei{-}Che Hung and
                  Yun{-}Yi Fan and
                  Bo Li},
  title        = {Constructing gene features for robust 3D mesh zero-watermarking},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {73},
  pages        = {103414},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2022.103414},
  doi          = {10.1016/J.JISA.2022.103414},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/LeeCCHFL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LiZNY23,
  author       = {Jun Li and
                  Minqing Zhang and
                  Ke Niu and
                  Xiaoyuan Yang},
  title        = {Investigation on principles for cost assignment in motion vector-based
                  video steganography},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {73},
  pages        = {103439},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103439},
  doi          = {10.1016/J.JISA.2023.103439},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/LiZNY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LiuCYGF23,
  author       = {Suhui Liu and
                  Liquan Chen and
                  Hongtao Yu and
                  Shang Gao and
                  Huiyu Fang},
  title        = {{BP-AKAA:} Blockchain-enforced Privacy-preserving Authentication and
                  Key Agreement and Access Control for IIoT},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {73},
  pages        = {103443},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103443},
  doi          = {10.1016/J.JISA.2023.103443},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/LiuCYGF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MsolliAHGMM23,
  author       = {Amina Msolli and
                  Nader Ajmi and
                  Abdelhamid Helali and
                  Abdelaziz Gassoumi and
                  Hassen Maaref and
                  Ridha Mghaieth},
  title        = {New key management scheme based on pool-hash for {WSN} and IoT},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {73},
  pages        = {103415},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2022.103415},
  doi          = {10.1016/J.JISA.2022.103415},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/MsolliAHGMM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/PanditKM23,
  author       = {Anupama Arjun Pandit and
                  Atul Kumar and
                  Arun Mishra},
  title        = {LWR-based Quantum-Safe Pseudo-Random Number Generator},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {73},
  pages        = {103431},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103431},
  doi          = {10.1016/J.JISA.2023.103431},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/PanditKM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/RandiveMS23,
  author       = {Krunal Randive and
                  R. Mohan and
                  Ambairam Muthu Sivakrishna},
  title        = {An efficient pattern-based approach for insider threat classification
                  using the image-based feature representation},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {73},
  pages        = {103434},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103434},
  doi          = {10.1016/J.JISA.2023.103434},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/RandiveMS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SahinA23,
  author       = {Meryem Soysaldi Sahin and
                  Sedat Akleylek},
  title        = {A survey of quantum secure group signature schemes: Lattice-based
                  approach},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {73},
  pages        = {103432},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103432},
  doi          = {10.1016/J.JISA.2023.103432},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/SahinA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SunTZCLW23,
  author       = {Xiaobing Sun and
                  Liangqiong Tu and
                  Jiale Zhang and
                  Jie Cai and
                  Bin Li and
                  Yu Wang},
  title        = {\emph{ASSBert}: Active and semi-supervised bert for smart contract
                  vulnerability detection},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {73},
  pages        = {103423},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103423},
  doi          = {10.1016/J.JISA.2023.103423},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/SunTZCLW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SunZWJZ23,
  author       = {Jintong Sun and
                  Fucai Zhou and
                  Qiang Wang and
                  Zi Jiao and
                  Yun Zhang},
  title        = {Flexible revocation and verifiability for outsourced Private Set Intersection
                  computation},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {73},
  pages        = {103438},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103438},
  doi          = {10.1016/J.JISA.2023.103438},
  timestamp    = {Wed, 26 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/SunZWJZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SwethaAU23,
  author       = {Gadde Swetha and
                  J. Amutharaj and
                  S. Usha},
  title        = {A security model to protect the isolation of medical data in the cloud
                  using hybrid cryptography},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {73},
  pages        = {103412},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2022.103412},
  doi          = {10.1016/J.JISA.2022.103412},
  timestamp    = {Wed, 15 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/SwethaAU23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ThakorRDP23,
  author       = {Vishal A. Thakor and
                  Mohammad Abdur Razzaque and
                  Anand D. Darji and
                  Aksh R. Patel},
  title        = {A novel 5-bit S-box design for lightweight cryptography algorithms},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {73},
  pages        = {103444},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103444},
  doi          = {10.1016/J.JISA.2023.103444},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ThakorRDP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WangLCHH23,
  author       = {Zheng Wang and
                  Bin Liu and
                  Jingzhao Chen and
                  Weihua Huang and
                  Yong Hu},
  title        = {Nash mixed detection strategy of multi-type network attack based on
                  zero-sum stochastic game},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {73},
  pages        = {103436},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103436},
  doi          = {10.1016/J.JISA.2023.103436},
  timestamp    = {Mon, 04 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/WangLCHH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WangQXTP23,
  author       = {Zhangdong Wang and
                  Jiaohua Qin and
                  Xuyu Xiang and
                  Yun Tan and
                  Jia Peng},
  title        = {A privacy-preserving cross-media retrieval on encrypted data in cloud
                  computing},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {73},
  pages        = {103440},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103440},
  doi          = {10.1016/J.JISA.2023.103440},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/WangQXTP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WuZZYL23,
  author       = {Bolun Wu and
                  Futai Zou and
                  Chengwei Zhang and
                  Tangda Yu and
                  Yun Li},
  title        = {Multi-field relation mining for malicious {HTTP} traffic detection
                  based on attention and cross network},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {73},
  pages        = {103411},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2022.103411},
  doi          = {10.1016/J.JISA.2022.103411},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/WuZZYL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/YangLK23,
  author       = {Ching{-}Nung Yang and
                  Peng Li and
                  Hsin{-}Chuan Kuo},
  title        = {(\emph{k, n}) secret image sharing scheme with privileged set},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {73},
  pages        = {103413},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2022.103413},
  doi          = {10.1016/J.JISA.2022.103413},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/YangLK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/YangXWH23,
  author       = {Lin Yang and
                  Dawen Xu and
                  Rangding Wang and
                  Songhan He},
  title        = {Adaptive {HEVC} video steganography based on distortion compensation
                  optimization},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {73},
  pages        = {103442},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103442},
  doi          = {10.1016/J.JISA.2023.103442},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/YangXWH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/YuCTYZ23,
  author       = {Jiarui Yu and
                  Jingsong Cui and
                  Hang Tu and
                  Chunwu Yu and
                  Man Zhou},
  title        = {A {SM2} based efficient and lightweight batch verification approach
                  for {IC} cards},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {73},
  pages        = {103409},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2022.103409},
  doi          = {10.1016/J.JISA.2022.103409},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/YuCTYZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ZhaoDTLYW23,
  author       = {Meng Zhao and
                  Yong Ding and
                  Shijie Tang and
                  Hai Liang and
                  Changsong Yang and
                  Huiyong Wang},
  title        = {Dual-server certificateless public key encryption with authorized
                  equality test for outsourced IoT data},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {73},
  pages        = {103441},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103441},
  doi          = {10.1016/J.JISA.2023.103441},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/ZhaoDTLYW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ZhouHCY23,
  author       = {Xiaoyu Zhou and
                  Wien Hong and
                  Tung{-}Shou Chen and
                  Guangsong Yang},
  title        = {Reversible demosaiced image authentication scheme with recoverability
                  using clustering and matching techniques},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {73},
  pages        = {103425},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103425},
  doi          = {10.1016/J.JISA.2023.103425},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ZhouHCY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}