Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/istr/istr73.bht:"
@article{DBLP:journals/istr/DaubnerMMBMP23, author = {Lukas Daubner and Martin Mac{\'{a}}k and Raimundas Matulevicius and Barbora Buhnova and Sofija Maksovic and Tom{\'{a}}s Pitner}, title = {Addressing insider attacks via forensic-ready risk management}, journal = {J. Inf. Secur. Appl.}, volume = {73}, pages = {103433}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103433}, doi = {10.1016/J.JISA.2023.103433}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/DaubnerMMBMP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/FarAH23, author = {Saeed Banaeian Far and Maryam Rajabzadeh Asaar and Afrooz Haghbin}, title = {Distributed auditing protocol for untraceable transactions}, journal = {J. Inf. Secur. Appl.}, volume = {73}, pages = {103429}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103429}, doi = {10.1016/J.JISA.2023.103429}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/FarAH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/GuoDZW23, author = {Junyan Guo and Ye Du and Dawei Zhang and Runfang Wu}, title = {{PSEEMV:} Provably secure and efficient emergency message verification scheme based on {ECC} and {CRT} for Space Information Network}, journal = {J. Inf. Secur. Appl.}, volume = {73}, pages = {103437}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103437}, doi = {10.1016/J.JISA.2023.103437}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/GuoDZW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/GuoWTFZ23, author = {Cheng Guo and Litao Wang and Xinyu Tang and Bin Feng and Guofeng Zhang}, title = {Two-party interactive secure deduplication with efficient data ownership management in cloud storage}, journal = {J. Inf. Secur. Appl.}, volume = {73}, pages = {103426}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103426}, doi = {10.1016/J.JISA.2023.103426}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/GuoWTFZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HoglundFR23, author = {Joel H{\"{o}}glund and Martin Furuhed and Shahid Raza}, title = {Lightweight certificate revocation for low-power IoT with end-to-end security}, journal = {J. Inf. Secur. Appl.}, volume = {73}, pages = {103424}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103424}, doi = {10.1016/J.JISA.2023.103424}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/HoglundFR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KoshibaZB23, author = {Takeshi Koshiba and Behrouz Zolfaghari and Khodakhast Bibak}, title = {A tradeoff paradigm shift in cryptographically-secure pseudorandom number generation based on discrete logarithm}, journal = {J. Inf. Secur. Appl.}, volume = {73}, pages = {103430}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103430}, doi = {10.1016/J.JISA.2023.103430}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/KoshibaZB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KumarS23, author = {Anmol Kumar and Gaurav Somani}, title = {Service separation assisted DDoS attack mitigation in cloud targets}, journal = {J. Inf. Secur. Appl.}, volume = {73}, pages = {103435}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103435}, doi = {10.1016/J.JISA.2023.103435}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/KumarS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LeeCCHFL23, author = {Jung{-}San Lee and Ying{-}Chin Chen and Chit{-}Jie Chew and Wei{-}Che Hung and Yun{-}Yi Fan and Bo Li}, title = {Constructing gene features for robust 3D mesh zero-watermarking}, journal = {J. Inf. Secur. Appl.}, volume = {73}, pages = {103414}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2022.103414}, doi = {10.1016/J.JISA.2022.103414}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/LeeCCHFL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LiZNY23, author = {Jun Li and Minqing Zhang and Ke Niu and Xiaoyuan Yang}, title = {Investigation on principles for cost assignment in motion vector-based video steganography}, journal = {J. Inf. Secur. Appl.}, volume = {73}, pages = {103439}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103439}, doi = {10.1016/J.JISA.2023.103439}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/LiZNY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LiuCYGF23, author = {Suhui Liu and Liquan Chen and Hongtao Yu and Shang Gao and Huiyu Fang}, title = {{BP-AKAA:} Blockchain-enforced Privacy-preserving Authentication and Key Agreement and Access Control for IIoT}, journal = {J. Inf. Secur. Appl.}, volume = {73}, pages = {103443}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103443}, doi = {10.1016/J.JISA.2023.103443}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/LiuCYGF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MsolliAHGMM23, author = {Amina Msolli and Nader Ajmi and Abdelhamid Helali and Abdelaziz Gassoumi and Hassen Maaref and Ridha Mghaieth}, title = {New key management scheme based on pool-hash for {WSN} and IoT}, journal = {J. Inf. Secur. Appl.}, volume = {73}, pages = {103415}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2022.103415}, doi = {10.1016/J.JISA.2022.103415}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/MsolliAHGMM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/PanditKM23, author = {Anupama Arjun Pandit and Atul Kumar and Arun Mishra}, title = {LWR-based Quantum-Safe Pseudo-Random Number Generator}, journal = {J. Inf. Secur. Appl.}, volume = {73}, pages = {103431}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103431}, doi = {10.1016/J.JISA.2023.103431}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/PanditKM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/RandiveMS23, author = {Krunal Randive and R. Mohan and Ambairam Muthu Sivakrishna}, title = {An efficient pattern-based approach for insider threat classification using the image-based feature representation}, journal = {J. Inf. Secur. Appl.}, volume = {73}, pages = {103434}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103434}, doi = {10.1016/J.JISA.2023.103434}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/RandiveMS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SahinA23, author = {Meryem Soysaldi Sahin and Sedat Akleylek}, title = {A survey of quantum secure group signature schemes: Lattice-based approach}, journal = {J. Inf. Secur. Appl.}, volume = {73}, pages = {103432}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103432}, doi = {10.1016/J.JISA.2023.103432}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/SahinA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SunTZCLW23, author = {Xiaobing Sun and Liangqiong Tu and Jiale Zhang and Jie Cai and Bin Li and Yu Wang}, title = {\emph{ASSBert}: Active and semi-supervised bert for smart contract vulnerability detection}, journal = {J. Inf. Secur. Appl.}, volume = {73}, pages = {103423}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103423}, doi = {10.1016/J.JISA.2023.103423}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/SunTZCLW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SunZWJZ23, author = {Jintong Sun and Fucai Zhou and Qiang Wang and Zi Jiao and Yun Zhang}, title = {Flexible revocation and verifiability for outsourced Private Set Intersection computation}, journal = {J. Inf. Secur. Appl.}, volume = {73}, pages = {103438}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103438}, doi = {10.1016/J.JISA.2023.103438}, timestamp = {Wed, 26 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/SunZWJZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SwethaAU23, author = {Gadde Swetha and J. Amutharaj and S. Usha}, title = {A security model to protect the isolation of medical data in the cloud using hybrid cryptography}, journal = {J. Inf. Secur. Appl.}, volume = {73}, pages = {103412}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2022.103412}, doi = {10.1016/J.JISA.2022.103412}, timestamp = {Wed, 15 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/SwethaAU23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ThakorRDP23, author = {Vishal A. Thakor and Mohammad Abdur Razzaque and Anand D. Darji and Aksh R. Patel}, title = {A novel 5-bit S-box design for lightweight cryptography algorithms}, journal = {J. Inf. Secur. Appl.}, volume = {73}, pages = {103444}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103444}, doi = {10.1016/J.JISA.2023.103444}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ThakorRDP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/WangLCHH23, author = {Zheng Wang and Bin Liu and Jingzhao Chen and Weihua Huang and Yong Hu}, title = {Nash mixed detection strategy of multi-type network attack based on zero-sum stochastic game}, journal = {J. Inf. Secur. Appl.}, volume = {73}, pages = {103436}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103436}, doi = {10.1016/J.JISA.2023.103436}, timestamp = {Mon, 04 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/WangLCHH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/WangQXTP23, author = {Zhangdong Wang and Jiaohua Qin and Xuyu Xiang and Yun Tan and Jia Peng}, title = {A privacy-preserving cross-media retrieval on encrypted data in cloud computing}, journal = {J. Inf. Secur. Appl.}, volume = {73}, pages = {103440}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103440}, doi = {10.1016/J.JISA.2023.103440}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/WangQXTP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/WuZZYL23, author = {Bolun Wu and Futai Zou and Chengwei Zhang and Tangda Yu and Yun Li}, title = {Multi-field relation mining for malicious {HTTP} traffic detection based on attention and cross network}, journal = {J. Inf. Secur. Appl.}, volume = {73}, pages = {103411}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2022.103411}, doi = {10.1016/J.JISA.2022.103411}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/WuZZYL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/YangLK23, author = {Ching{-}Nung Yang and Peng Li and Hsin{-}Chuan Kuo}, title = {(\emph{k, n}) secret image sharing scheme with privileged set}, journal = {J. Inf. Secur. Appl.}, volume = {73}, pages = {103413}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2022.103413}, doi = {10.1016/J.JISA.2022.103413}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/YangLK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/YangXWH23, author = {Lin Yang and Dawen Xu and Rangding Wang and Songhan He}, title = {Adaptive {HEVC} video steganography based on distortion compensation optimization}, journal = {J. Inf. Secur. Appl.}, volume = {73}, pages = {103442}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103442}, doi = {10.1016/J.JISA.2023.103442}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/YangXWH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/YuCTYZ23, author = {Jiarui Yu and Jingsong Cui and Hang Tu and Chunwu Yu and Man Zhou}, title = {A {SM2} based efficient and lightweight batch verification approach for {IC} cards}, journal = {J. Inf. Secur. Appl.}, volume = {73}, pages = {103409}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2022.103409}, doi = {10.1016/J.JISA.2022.103409}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/YuCTYZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ZhaoDTLYW23, author = {Meng Zhao and Yong Ding and Shijie Tang and Hai Liang and Changsong Yang and Huiyong Wang}, title = {Dual-server certificateless public key encryption with authorized equality test for outsourced IoT data}, journal = {J. Inf. Secur. Appl.}, volume = {73}, pages = {103441}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103441}, doi = {10.1016/J.JISA.2023.103441}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/ZhaoDTLYW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ZhouHCY23, author = {Xiaoyu Zhou and Wien Hong and Tung{-}Shou Chen and Guangsong Yang}, title = {Reversible demosaiced image authentication scheme with recoverability using clustering and matching techniques}, journal = {J. Inf. Secur. Appl.}, volume = {73}, pages = {103425}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103425}, doi = {10.1016/J.JISA.2023.103425}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ZhouHCY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.