default search action
Security and Privacy, Volume 6
Volume 6, Number 1, January/February 2023
RESEARCH ARTICLES
- Emanuela Marasco, Massimiliano Albanese, Venkata Vamsi Ram Patibandla, Anudeep Vurity, Sumanth Sai Sriram:
Biometric multi-factor authentication: On the usability of the FingerPIN scheme. - Palak Chandrakar, Rashi Bagga, Yogesh Kumar, Sanjeev Kumar Dwivedi, Ruhul Amin:
Blockchain based security protocol for device to device secure communication in internet of things networks. - C. Madan Kumar, Ruhul Amin, M. Brindha:
Cryptanalysis and improvement of REAS-TMIS: Resource-efficient authentication scheme for telecare medical information system. - Pimal Khanpara, Kruti Lavingia, Rajvi Trivedi, Sudeep Tanwar, Amit Verma, Ravi Sharma:
A context-aware internet of things-driven security scheme for smart homes. - Hamidreza Damghani, Soheila Estaji, Leila Damghani:
Providing robust and reversible watermarking algorithm and detection of malicious manipulation. - Ashutosh Aithekar, Pratik Gupta, Dharminder Dharminder:
A provably secure, shortest, and efficient identity based signcryption technique in the standard model. - Egide Nkurunziza, Lawrence Tandoh, Issameldeen Elfadul, Fagen Li:
ECAAP-SG: Efficient certificateless anonymous authentication protocol for SG. - Kaushal Shah, Sarth Kanani, Shivam Patel, Manan Devani, Sudeep Tanwar, Amit Verma, Ravi Sharma:
Blockchain-based object detection scheme using federated learning. - Shanil Sharma, Dheerendra Mishra, Saurabh Rana:
A privacy oriented authorized key agreement framework for vehicular edge computing.
SURVEY PAPERS
- Fatima Salahdine, Tao Han, Ning Zhang:
Security in 5G and beyond recent advances and future challenges. - Guglielmo Maccario, Maurizio Naldi:
Privacy in smart speakers: A systematic literature review. - Munmun Bhattacharya, Sandip Roy, Samiran Chattopadhyay, Ashok Kumar Das, Sachin Shetty:
A comprehensive survey on online social networks security and privacy issues: Threats, machine learning-based solutions, and open challenges.
Volume 6, Number 2, March/April 2023
EDITORIAL
- Alireza Souri, Eyhab Al-Masri, Saru Kumari:
Blockchain architecture and methodologies for internet of things environment.
SPECIAL ISSUE ARTICLES
- Erni Zhang:
Economic supply chain management of advanced manufacturing industry based on blockchain technology. - Lin Wang:
Optimization algorithm of digital media sharing platform based on blockchain technology. - Rongxia Wang, Zhifang Liu, Fen He, Weihuang Yang:
Protection and detection of physical hazards for the intelligent system under industrial Internet of Things by neural network. - Yunhui Hao:
Intelligent control of electric automation instrumentation based on blockchain. - Qiang Li:
Evaluation of enterprise financial investment environment based on block-chain and cloud computing. - Liping Wang:
Financial risk analysis system and supervision based on big data and blockchain technology. - Baicheng Zhang:
The strategy guidance of business English intercultural communication based on blockchain security and genetic algorithms. - Lei Hu:
Implementation of the expansion of sensor information storage based on the Internet of Things and cloud computing. - Yeping Zhen:
Design of library smart cloud service system based on blockchain technology. - Ruijun Wang:
Convergence model of "cloud + VR" technology on account of mobile Internet of Things and exhibition industry. - Yue Wang:
Import and export trade forecasting algorithm based on blockchain security and PSO optimized hybrid RVM model. - Baorui Cai, Bin Zhang, Jinding He, Rongkui Zhang, Wenlin Yan:
The risks brought by blockchain applications to the safe operation of power grids. - Jinfeng Zhang, Dongdong Zhang:
Internet of things network intrusion detection model based on quantum artificial fish group and fuzzy kernel clustering algorithm. - Jingdong Zhou:
Information construction of construction project management based on internet of things blockchain. - Juanling Wang:
Research on the construction of accounting information audit quality control system based on blockchain. - Haiping Yu:
Application of blockchain technology in the data processing security system of financial enterprises.
Volume 6, Number 3, May/June 2023
OPINION PAPER
- Saeed Banaeian Far, Azadeh Imani Rad:
What are the benefits and opportunities of launching a Metaverse for NEOM city?
RESEARCH ARTICLES
- Vivek Kumar, Sangram Ray, Dipanwita Sadhukhan, Jayashree Karmakar, Mou Dasgupta:
Enhanced pairing-free identity-based broadcast authentication protocol in WSN using ElGamal ECC. - Gaurav Mittal, Sunil Kumar, Sandeep Kumar:
An efficient procedure for online/offline ID-based signature using extended chaotic maps and group ring. - Houssem Benimam, Said Sadoudi, Djamel Teguig:
Software defined radio implementation of a secure waveform for real-time data transmission using universal software radio peripheral. - Uddalak Chatterjee, Sangram Ray, Sharmistha Adhikari, Muhammad Khurram Khan, Mou Dasgupta:
Efficient and secure e-voting scheme using elliptic curve cryptography. - Keshav Kaushik, Adarsh Kumar:
Demystifying quantum blockchain for healthcare. - Haiyan Xiao, Lifang Wang:
Differential fault analysis on the lightweight block cipher plug-in plug-out. - Zhikui Chen, Muhammad Zeeshan Haider, Naiwen Luo, Shuo Yu, Xu Yuan, Yaochen Zhang, Tayyaba Noreen:
Reputation-based partition scheme for IoT security. - Ismaeel Abiodun Sikiru, Lukman Abiodun Olawoyin, Nasir Faruk, Abdulkarim Ayopo Oloyede, Abubakar Abdulkarim, Imam-Fulani Yusuf Olayinka, Olugbenga A. Sowande, Salisu Garba, Agbotiname Lucky Imoize:
Physical layer security using boundary technique for emerging wireless communication systems. - Zaid Shakir Al-Attar, Tarek Abbes, Faouzi Zerai:
Privacy-preserving hands-free voice authentication leveraging edge technology.
SURVEY PAPERS
- Akshay Kumar, Rajneesh Rani, Samayveer Singh:
A survey of recent advances in image steganography. - Ali Kamil Abed, Angesh Anupam:
Review of security issues in Internet of Things and artificial intelligence-driven solutions.
SHORT COMMUNICATION
- Saeed Banaeian Far, Maryam Rajabzadeh Asaar, Afrooz Haghbin:
Zero-knowledge-based distributed auditing protocol.
Volume 6, Number 4, July/August 2023
SPECIAL ISSUE ARTICLES
- Ikjot Saini, Sherif Saad, Arunita Jaekel:
Evaluating the effectiveness of pseudonym changing strategies for location privacy in vehicular ad-hoc network. - Marina Danchovsky Ibrishimova, Kin Fun Li:
Discerning cyber threatening incidents from ordinary events using sentiment analysis and logistic regression. - Stephan Moritz, Osmanbey Uzunkol:
Secure delegation of group exponentiations: Efficient and fully verifiable schemes with two servers†. - Manu Banga, Abhay Bansal:
Proposed software faults detection using hybrid approach.
RESEARCH ARTICLES
- N. Malarvizhi, R. Priya, Rajaram Bhavani:
An enhanced reversible image steganography using distributive Tian's method. - N. Renugadevi, Stheya Julakanti, Sai Charan Vemula, Somya Bhatnagar, Shirisha Thangallapally:
Low area and high throughput implementation of advanced encryption standard hardware accelerator on FPGA using Mux-Demux pair. - Zhuang Du, Mohammad S. Obaidat, Guowei Wu, Kuei-Fang Hsiao:
An efficient caching security approach for content-centric mobile networks in internet of things systems. - Thais Sardá:
An onion with layers of hope and fear: A cross-case analysis of the media representation of Tor Network reflecting theoretical perspectives of new technologies. - Lan Zhang, Bin Yu, Liangsheng He:
Differential analysis of the NBC algorithm based on mixed integer linear programming model. - Ibifubara Iganibo, Massimiliano Albanese, Marc Mosko, Eric Bier, Alejandro E. Brito:
An attack volume metric.
Volume 6, Number 5, September/October 2023
RESEARCH ARTICLES
- Dimitrios Vasilopoulos, Melek Önen, Refik Molva, Kaoutar Elkhiyaoui:
Proofs of Data Reliability: Verification of reliable data storage with automatic maintenance†. - Youssef F. Sallam, Samy Abd El-Nabi, Walid El-Shafai, Hossam Eldin H. Ahmed, Adel A. Saleeb, Nirmeen A. El-Bahnasawy, Fathi E. Abd El-Samie:
Efficient implementation of image representation, visual geometry group with 19 layers and residual network with 152 layers for intrusion detection from UNSW-NB15 dataset. - Sathiya Devi Shanmugam, Arumugam Bhuvaneswari:
Design of efficient storage and retrieval of medical records in blockchain based on InterPlanetary File System and modified bloom tree. - Aryaman, Nenavath Srinivas Naik, Satyanarayana Vollala, Ruhul Amin:
Detecting and predicting countermeasures against clickjacking. - Unsub Zia, Mark McCartney, Bryan W. Scotney, Jorge Martínez, Ali Sajjad:
A resource efficient pseudo random number generator based on sawtooth maps for Internet of Things. - Usha Kiran, Rajat Moona, Santosh Biswas:
A protocol to establish trust on biometric authentication devices. - Sunil Kumar, Dilip Kumar:
Performance evaluation and design of B-128 modified Blowfish algorithm. - Sameer Farooq, Priyanka Chawla, Neeraj Kumar:
A cryptographic security framework for hybrid Cloud-Internet of Things network. - Komal Pursharthi, Dheerendra Mishra:
On the security of ring learning with error-based key exchange protocol against signal leakage attack.
SURVEY PAPERS
- Malaram Kumhar, Jitendra Bhatia:
Software-defined networks-enabled fog computing for IoT-based healthcare: Security, challenges and opportunities. - Srikanth Pulipeti, Adarsh Kumar:
Secure quantum computing for healthcare sector: A short analysis. - Iqbal H. Sarker:
Multi-aspects AI-based modeling and adversarial learning for cybersecurity intelligence and robustness: A comprehensive overview. - Pimal Khanpara, Ishwa Shah, Sudeep Tanwar, Amit Verma, Ravi Sharma:
Toward the internet of things forensics: A data analytics perspective. - Chandan Trivedi, Udai Pratap Rao, Keyur Parmar, Pronaya Bhattacharya, Sudeep Tanwar, Ravi Sharma:
A transformative shift toward blockchain-based IoT environments: Consensus, smart contracts, and future directions.
CASE STUDY
- Shweta Gupta, Adesh Kumar:
Study on early accurate diagnosis and treatment of COVID-19 with smart phone tracking using bionics.
Volume 6, Number 6, November/December 2023
SURVEY ARTICLES
- Awais Khan Jumani, Jinglun Shi, Asif Ali Laghari, Zhihui Hu, Aftab ul Nabi, Huang Qian:
Fog computing security: A review. - Aejaz Nazir Lone, Suhel Mustajab, Mahfooz Alam:
A comprehensive study on cybersecurity challenges and opportunities in the IoT world.
RESEARCH ARTICLES
- Shilpa Mahajan:
Phishing uniform resource locator detection using machine learning: A step towards secure system. - Pankaj Kumar, Mohammad Wazid, Devesh Pratap Singh, Jaskaran Singh, Ashok Kumar Das, Youngho Park, Joel J. P. C. Rodrigues:
Explainable artificial intelligence envisioned security mechanism for cyber threat hunting. - Kanika Agrawal, Mayank Aggarwal, Sudeep Tanwar:
MyEasyHealthcare: An efficient and secure three-tier blockchain-based healthcare system. - Xu Wang, Jui-Chuan Liu, Chin-Chen Chang:
A novel reversible data hiding scheme for VQ codebooks. - Ajish Sreedharan, K. S. Anil Kumar:
Effect of Hadamard multiplication on bloom filter and double bloom filter transformations. - Atefeh Hemmati, Mani Zarei, Alireza Souri:
Blockchain-based internet of vehicles (BIoV): A systematic review of surveys and reviews. - Chi Ho Lau, Kai-Hau Yeung, Fan Yan, Sammy Chan:
Blockchain-based authentication and secure communication in IoT networks. - Wenjun Luo, Die Lai, Zesen Dai:
Research on disturbing white-box cryptography algorithm based on local differential privacy.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.