default search action
Security and Privacy, Volume 5
Volume 5, Number 1, January 2022
- Victor R. Kebande, Kim-Kwang Raymond Choo:
Finite state machine for cloud forensic readiness as a service (CFRaaS) events.
- Yaser Ebazadeh, Reza Fotohi:
A reliable and secure method for network-layer attack discovery and elimination in mobile ad-hoc networks based on a probabilistic threshold. - Amith Murthy, Muhammad Rizwan Asghar, Wanqing Tu:
Towards a data-driven framework for optimizing security-efficiency tradeoff in QUIC. - Sabra Ben Saad, Adlen Ksentini, Bouziane Brik:
An end-to-end trusted architecture for network slicing in 5G and beyond networks. - Memoona J. Anwar, Asif Qumer Gill, Anthony D. Fitzgibbon, Inam Gull:
PESTLE+ risk analysis model to assess pandemic preparedness of digital ecosystems. - Asmita Manna, Anirban Sengupta, Chandan Mazumdar:
A risk-based methodology for privacy requirements elicitation and control selection. - Yanting Li:
A study of detection of abnormal network traffic: A comparison of multiple algorithms.
- Harshit Bhavnani, Shreyansh Bardia, Aniket Modi, Ujwal Shah:
An extensive review of data security infrastructure and legislature. - Lampis Alevizos, Vinh-Thong Ta, Max Hashem Eiza:
Augmenting zero trust architecture to endpoints using blockchain: A state-of-the-art review.
Volume 5, Number 2, March 2022
- Azza Dandooh, Adel S. El-Fishawy, Fathi E. Abd El-Samie, Ezz El-Din Hemdan:
Secure audio signal transmission based on color image watermarking. - Kevin Martin, Mohamed Rahouti, Moussa Ayyash, Izzat Alsmadi:
Anomaly detection in blockchain using network representation and machine learning. - Ilija Basicevic, Nikola Blazic, Stanislav Ocovaj:
On the use of principal component analysis in the entropy based detection of denial-of-service attacks. - Yuzi Yi, Jingsha He, Nafei Zhu, Xiangjun Ma:
Social influence-based privacy inference attacks in online social networks. - Prashant Nema, Manisha J. Nene:
Quantum web of trust. - Joseph Doyle, Muhammed Golec, Sukhpal Singh Gill:
BlockchainBus: A lightweight framework for secure virtual machine migration in cloud federations using blockchain. - Samer Eldesouky, Walid El Shafai, Hossam Eldin H. Ahmed, Fathi E. Abd El-Samie:
Cancelable electrocardiogram biometric system based on chaotic encryption using three-dimensional logistic map for biometric-based cloud services. - Foad Jalali, Mehran Alidoost Nia, Tatiana Ermakova, Meisam Abdollahi, Benjamin Fabian:
Investigating the role of usable security in developers' intention toward security enhancement in service-oriented applications. - Alessandro Checco, Lorenzo Bracciale, Douglas J. Leith, Giuseppe Bianchi:
OpenNym: Privacy preserving recommending via pseudonymous group authentication.
- Mahbuba Begum, Mohammad Shorif Uddin:
Towards the development of an effective image watermarking system. - Adarsh Kumar, Carlo Ottaviani, Sukhpal Singh Gill, Rajkumar Buyya:
Securing the future internet of things with post-quantum cryptography.
Volume 5, Number 3, May 2022
- Richard Dosselmann, Howard J. Hamilton:
Limiting sensitive values in an anonymized table while reducing information loss via p-proportion. - Prashant Nema, Manisha J. Nene:
Qubits based mutual authentication protocol. - Hemavathi, S. Akhila, Samreen Zubeda, Shashidhara:
DS2AN: Deep stacked sparse autoencoder for secure and fast authentication in HetNets. - Rony Chowdhury Ripan, Md. Moinul Islam, Hamed AlQahtani, Iqbal H. Sarker:
Effectively predicting cyber-attacks through isolation forest learning-based outlier detection. - Fauzia Yasmeen, Mohammad Shorif Uddin:
A novel watermarking scheme based on discrete wavelet transform-singular value decomposition.
- Jigna J. Hathaliya, Sudeep Tanwar, Priyanka Sharma:
Adversarial learning techniques for security and privacy preservation: A comprehensive review. - Raveendra Babu Ponnuru, Basker Palaniswamy, Alavalapati Goutham Reddy, Vanga Odelu, Hyunsung Kim:
A survey on security challenges and protocols of electric vehicle dynamic charging system.
Volume 5, Number 4, July 2022
- Hiten Choudhury:
Enhancing the Elliptic Curve Integrated Encryption Scheme in 5G mobile network for home network identity privacy. - Fanfeng Zeng, Haoyin Bai, Ke Xiao:
Blind watermarking algorithm combining NSCT, DWT, SVD, and HVS. - Yang Lu, Shujun Li:
From data flows to privacy-benefit trade-offs: A user-centric semantic model. - Deepak Chhikara, Saurabh Rana, Ankita Mishra, Dheerendra Mishra:
Construction of elliptic curve cryptography-based authentication protocol for internet of things. - V. Sumithra, Shashidhara, Debajyoti Mukhopadhyay:
Design of a secure and privacy preserving authentication protocol for telecare medical information systems. - Fauzia Yasmeen, Mohammad Shorif Uddin:
An efficient image steganography approach based on QR factorization and singular value decomposition in non-subsampled contourlet transform domain. - Subhas Barman, Samiran Chattopadhyay, Debasis Samanta, Sayantani Barman:
A blockchain-based approach to secure electronic health records using fuzzy commitment scheme. - Dhaneshwar Mardi, Jaydeep Howlader:
Anonymous Bitcoin transaction: A solution using secure multiparty computation. - Surbhi Chhabra, Kusum Lata:
Towards the enhancement of AES IP security using hardware obfuscation technique: A practical approach for secure data transmission in IoT.
- Anuradha Mahasinghe, Youvin Jayasinghe:
An initial step toward a quantum annealing approach to the discrete logarithm problem.
Volume 5, Number 5, September 2022
- Neha Garg, Mohammad Wazid, Jaskaran Singh, Devesh Pratap Singh, Ashok Kumar Das:
Security in IoMT-driven smart healthcare: A comprehensive review and open challenges. - Blake D. Bryant, Hossein Saiedian:
Key challenges in security of IoT devices and securing them with the blockchain technology.
- Somesh Banerjee, Khilesh Kumar, Prajwal Masulkar, Ruhul Amin, Sanjeev Kumar Dwivedi:
Blockchain and IPFS-based reliable land registry system. - Kanos Matyokurehwa, Norman Rudhumbu, Cross Gombiro, Colletor Chipfumbu-Kangara:
Enhanced social engineering framework mitigating against social engineering attacks in higher education. - Steffie Maria Stephen, Arunita Jaekel:
Roadside unit-based pseudonym authentication in vehicular ad hoc network. - Mahmut Dirik:
Predicting credit card fraud using multipurpose classification based on evolutionary rules. - Vasileios Germanos, Wen Zeng:
Model-based risk assessment evaluation. - Shakila Bu-Pasha:
Legal aspects, public interest, and legitimate interest in processing personal data to operate autonomous buses in the regular transportation system. - Siranjeevi Rajamanickam, Satyanarayana Vollala, Natarajan Ramasubramanian:
EAPIOD: ECC based authentication protocol for insider attack protection in IoD scenario. - Boubakeur Annane, Adel Alti, Lamri Laouamer, Hamza Reffad:
Cx-CP-ABE: Context-aware attribute-based access control schema and blockchain technology to ensure scalable and efficient health data privacy. - Yongbing Zhang, Qiuyu Zhang, Yilong Jiang, Yan Yan:
A location privacy protection method based on cipher-text retrieval in cloud environment. - Ravi Bairagi, Preetesh Purohit, Kailash Chandra Bandhu, Ratnesh Litoriya:
A secure and efficient mechanism for scheduling tasks in cloud computing environments.
Volume 5, Number 6, November/December 2022
SURVEY ARTICLES
- N. Renugadevi, Shirisha Thangallapally, Sai Charan Vemula, Stheya Julakanti, Somya Bhatnagar:
Methods for improving the implementation of advanced encryption standard hardware accelerator on field programmable gate array-A survey. - Murat Güzeltepe, Selda Çalkavur:
Skew-cyclic codes based public-key cryptosystem approach.
RESEARCH ARTICLES
- Shubham Rana, Nitesh Kumar, Anand Handa, Sandeep K. Shukla:
Automated Windows behavioral tracing for malware analysis. - May Almousa, Tianyang Zhang, Abdolhossein Sarrafzadeh, Mohd Anwar:
Phishing website detection: How effective are deep learning-based models and hyperparameter optimization? - Dharminder Dharminder, Ankur Nehra, Aditya Arya:
A construction of Chebyshev chaotic map based authenticated key agreement protocol for satellite communication system. - Engin Zeydan, Yekta Turk, Yaman Yagiz Tasbag:
Entropy service for secure real-time mission critical communications. - Mohamad Mulham Belal, Tanmoy Maitra, Debasis Giri, Ashok Kumar Das:
Chaotic neural networks and farfalle construction based parallel keyed secure hash function. - Shivansh Kumar, Ruhul Amin:
Decentralized trade finance using blockchain and lightning network. - Shyam Saurabh, Kishore Sinha:
Perfect secret sharing schemes from combinatorial squares. - Preetam Mukherjee, Anirban Sengupta, Chandan Mazumdar:
"Security Gap" as a metric for enterprise business processes. - Mirmorsal Madani, Homayun Motameni, Hosein Mohamadi:
Fake news detection using deep learning integrating feature extraction, natural language processing, and statistical descriptors. - Shreya Patel, Rinku Dewri:
Private record linkage with linkage maps.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.