default search action
Journal of Information Security and Applications, Volume 51
Volume 51, April 2020
- (Withdrawn) A hybrid security strategy (HS2) for reliable video streaming in fog computing. 102412
- Elbasher Elmahdi, Seong-Moo Yoo, Kumar Sharshembiev:
Secure and reliable data forwarding using homomorphic encryption against blackhole attacks in mobile ad hoc networks. 102425 - Qinwen Hu, Se-Young Yu, Muhammad Rizwan Asghar:
Analysing performance issues of open-source intrusion detection systems in high-speed networks. 102426 - Shyamalendu Kandar, Bibhas Chandra Dhara:
A verifiable secret sharing scheme with combiner verification and cheater identification. 102430 - Zakiah Zulkefli, Manmeet Mahinderjit Singh:
Sentient-based Access Control model: A mitigation technique for Advanced Persistent Threats in Smartphones. 102431 - Guohua Tian, Hua Ma, Ying Xie, Zhenhua Liu:
Randomized deduplication with ownership management and data sharing in cloud storage. 102432 - Peng Wang, Tao Xiang, Xiaoguo Li, Hong Xiang:
Public key encryption with conjunctive keyword search on lattice. 102433 - Mohamed Amine Belhamra, El Mamoun Souidi:
Steganography over Redundant Residue Number System Codes. 102434 - Kamalakanta Sethi, Ankit Pradhan, Padmalochan Bera:
Practical traceable multi-authority CP-ABE with outsourcing decryption and access policy updation. 102435 - Kamalesh Acharya:
Secure and efficient public key multi-channel broadcast encryption schemes. 102436 - Adesh Kumari, Srinivas Jangirala, M. Yahya Abbasi, Vinod Kumar, Mansaf Alam:
ESEAP: ECC based secure and efficient mutual authentication protocol using smart card. 102443 - Xi Gao, Lei Yu, Houhua He, Xiaoyu Wang, Yiwen Wang:
A research of security in website account binding. 102444 - Ekhlas Abbas Albahrani, Amal Abdulbaqi Maryoosh, Sadeq H. Lafta:
Block image encryption based on modified playfair and chaotic system. 102445 - Raditya Arief, Nima Khakzad, Wolter Pieters:
Mitigating cyberattack related domino effects in process plants via ICS segmentation. 102450 - Dongping Wang, Tiegang Gao:
An efficient USM sharpening detection method for small-size JPEG image. 102451 - Xiaotian Wu, Ching-Nung Yang, Yi-Yun Yang:
A hybrid scheme for enhancing recovered image quality in polynomial based secret image sharing by modify-and-recalculate strategy. 102452 - Zhiyan Xu, Debiao He, Huaqun Wang, Pandi Vijayakumar, Kim-Kwang Raymond Choo:
A novel proxy-oriented public auditing scheme for cloud-based medical cyber physical systems. 102453 - Reyhaneh Rabaninejad, Mahmoud Ahmadian-Attari, Maryam Rajabzadeh Asaar, Mohammad Reza Aref:
A lightweight identity-based provable data possession supporting users' identity privacy and traceability. 102454 - B. Asvija, Eswari Rajagopal, M. B. Bijoy:
Bayesian attack graphs for platform virtualized infrastructures in clouds. 102455 - Karanbir Singh, Kanwalvir Singh Dhindsa, Deepa Nehra:
T-CAD: A threshold based collaborative DDoS attack detection in multiple autonomous systems. 102457 - Mordechai Guri, Yosef A. Solewicz, Yuval Elovici:
Speaker-to-speaker covert ultrasonic communication. 102458 - Yanan Li, Ming Xia, Xin Liu, Gaobo Yang:
Identification of various image retargeting techniques using hybrid features. 102459 - Preeti Mishra, Ishita Verma, Saurabh Gupta:
KVMInspector: KVM Based introspection approach to detect malware in cloud environment. 102460 - Aleksi Peltonen, Mohit Sethi, Tuomas Aura:
Formal verification of misbinding attacks on secure device pairing and bootstrapping. 102461 - Stelvio Cimato, Gabriele Gianini, Maryam Sepehri, Rasool Asal, Ernesto Damiani:
A cryptographic cloud-based approach for the mitigation of the airline cargo cancellation problem. 102462
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.