![](https://dblp.org/img/logo.ua.320x120.png)
![](https://dblp.org/img/dropdown.dark.16x16.png)
![](https://dblp.org/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.org/img/search.dark.16x16.png)
![search dblp](https://dblp.org/img/search.dark.16x16.png)
default search action
Security and Privacy, Volume 5
Volume 5, Number 1, January 2022
- Victor R. Kebande
, Kim-Kwang Raymond Choo
:
Finite state machine for cloud forensic readiness as a service (CFRaaS) events.
- Yaser Ebazadeh
, Reza Fotohi
:
A reliable and secure method for network-layer attack discovery and elimination in mobile ad-hoc networks based on a probabilistic threshold. - Amith Murthy, Muhammad Rizwan Asghar
, Wanqing Tu
:
Towards a data-driven framework for optimizing security-efficiency tradeoff in QUIC. - Sabra Ben Saad
, Adlen Ksentini
, Bouziane Brik
:
An end-to-end trusted architecture for network slicing in 5G and beyond networks. - Memoona J. Anwar
, Asif Qumer Gill
, Anthony D. Fitzgibbon, Inam Gull:
PESTLE+ risk analysis model to assess pandemic preparedness of digital ecosystems. - Asmita Manna
, Anirban Sengupta
, Chandan Mazumdar:
A risk-based methodology for privacy requirements elicitation and control selection. - Yanting Li
:
A study of detection of abnormal network traffic: A comparison of multiple algorithms.
- Harshit Bhavnani
, Shreyansh Bardia
, Aniket Modi
, Ujwal Shah
:
An extensive review of data security infrastructure and legislature. - Lampis Alevizos
, Vinh-Thong Ta, Max Hashem Eiza
:
Augmenting zero trust architecture to endpoints using blockchain: A state-of-the-art review.
Volume 5, Number 2, March 2022
- Azza Dandooh, Adel S. El-Fishawy, Fathi E. Abd El-Samie, Ezz El-Din Hemdan
:
Secure audio signal transmission based on color image watermarking. - Kevin Martin, Mohamed Rahouti
, Moussa Ayyash
, Izzat Alsmadi
:
Anomaly detection in blockchain using network representation and machine learning. - Ilija Basicevic
, Nikola Blazic, Stanislav Ocovaj:
On the use of principal component analysis in the entropy based detection of denial-of-service attacks. - Yuzi Yi
, Jingsha He, Nafei Zhu, Xiangjun Ma:
Social influence-based privacy inference attacks in online social networks. - Prashant Nema
, Manisha J. Nene
:
Quantum web of trust. - Joseph Doyle
, Muhammed Golec
, Sukhpal Singh Gill
:
BlockchainBus: A lightweight framework for secure virtual machine migration in cloud federations using blockchain. - Samer Eldesouky, Walid El Shafai
, Hossam Eldin H. Ahmed, Fathi E. Abd El-Samie:
Cancelable electrocardiogram biometric system based on chaotic encryption using three-dimensional logistic map for biometric-based cloud services. - Foad Jalali, Mehran Alidoost Nia
, Tatiana Ermakova, Meisam Abdollahi, Benjamin Fabian:
Investigating the role of usable security in developers' intention toward security enhancement in service-oriented applications. - Alessandro Checco
, Lorenzo Bracciale, Douglas J. Leith
, Giuseppe Bianchi:
OpenNym: Privacy preserving recommending via pseudonymous group authentication.
- Mahbuba Begum
, Mohammad Shorif Uddin
:
Towards the development of an effective image watermarking system. - Adarsh Kumar
, Carlo Ottaviani
, Sukhpal Singh Gill
, Rajkumar Buyya
:
Securing the future internet of things with post-quantum cryptography.
Volume 5, Number 3, May 2022
- Richard Dosselmann
, Howard J. Hamilton:
Limiting sensitive values in an anonymized table while reducing information loss via p-proportion. - Prashant Nema
, Manisha J. Nene:
Qubits based mutual authentication protocol. - Hemavathi, S. Akhila, Samreen Zubeda, Shashidhara
:
DS2AN: Deep stacked sparse autoencoder for secure and fast authentication in HetNets. - Rony Chowdhury Ripan, Md. Moinul Islam
, Hamed AlQahtani, Iqbal H. Sarker
:
Effectively predicting cyber-attacks through isolation forest learning-based outlier detection. - Fauzia Yasmeen
, Mohammad Shorif Uddin
:
A novel watermarking scheme based on discrete wavelet transform-singular value decomposition.
- Jigna J. Hathaliya, Sudeep Tanwar
, Priyanka Sharma:
Adversarial learning techniques for security and privacy preservation: A comprehensive review. - Raveendra Babu Ponnuru
, Basker Palaniswamy
, Alavalapati Goutham Reddy
, Vanga Odelu, Hyunsung Kim:
A survey on security challenges and protocols of electric vehicle dynamic charging system.
Volume 5, Number 4, July 2022
- Hiten Choudhury
:
Enhancing the Elliptic Curve Integrated Encryption Scheme in 5G mobile network for home network identity privacy. - Fanfeng Zeng, Haoyin Bai
, Ke Xiao:
Blind watermarking algorithm combining NSCT, DWT, SVD, and HVS. - Yang Lu
, Shujun Li:
From data flows to privacy-benefit trade-offs: A user-centric semantic model. - Deepak Chhikara
, Saurabh Rana, Ankita Mishra
, Dheerendra Mishra
:
Construction of elliptic curve cryptography-based authentication protocol for internet of things. - V. Sumithra, Shashidhara
, Debajyoti Mukhopadhyay:
Design of a secure and privacy preserving authentication protocol for telecare medical information systems. - Fauzia Yasmeen
, Mohammad Shorif Uddin:
An efficient image steganography approach based on QR factorization and singular value decomposition in non-subsampled contourlet transform domain. - Subhas Barman
, Samiran Chattopadhyay
, Debasis Samanta, Sayantani Barman:
A blockchain-based approach to secure electronic health records using fuzzy commitment scheme. - Dhaneshwar Mardi
, Jaydeep Howlader
:
Anonymous Bitcoin transaction: A solution using secure multiparty computation. - Surbhi Chhabra
, Kusum Lata:
Towards the enhancement of AES IP security using hardware obfuscation technique: A practical approach for secure data transmission in IoT.
- Anuradha Mahasinghe
, Youvin Jayasinghe:
An initial step toward a quantum annealing approach to the discrete logarithm problem.
Volume 5, Number 5, September 2022
- Neha Garg
, Mohammad Wazid
, Jaskaran Singh
, Devesh Pratap Singh, Ashok Kumar Das
:
Security in IoMT-driven smart healthcare: A comprehensive review and open challenges. - Blake D. Bryant, Hossein Saiedian
:
Key challenges in security of IoT devices and securing them with the blockchain technology.
- Somesh Banerjee, Khilesh Kumar, Prajwal Masulkar, Ruhul Amin
, Sanjeev Kumar Dwivedi
:
Blockchain and IPFS-based reliable land registry system. - Kanos Matyokurehwa
, Norman Rudhumbu, Cross Gombiro, Colletor Chipfumbu-Kangara:
Enhanced social engineering framework mitigating against social engineering attacks in higher education. - Steffie Maria Stephen, Arunita Jaekel
:
Roadside unit-based pseudonym authentication in vehicular ad hoc network. - Mahmut Dirik
:
Predicting credit card fraud using multipurpose classification based on evolutionary rules. - Vasileios Germanos, Wen Zeng
:
Model-based risk assessment evaluation. - Shakila Bu-Pasha
:
Legal aspects, public interest, and legitimate interest in processing personal data to operate autonomous buses in the regular transportation system. - Siranjeevi Rajamanickam, Satyanarayana Vollala
, Natarajan Ramasubramanian:
EAPIOD: ECC based authentication protocol for insider attack protection in IoD scenario. - Boubakeur Annane, Adel Alti, Lamri Laouamer
, Hamza Reffad
:
Cx-CP-ABE: Context-aware attribute-based access control schema and blockchain technology to ensure scalable and efficient health data privacy. - Yongbing Zhang
, Qiuyu Zhang
, Yilong Jiang, Yan Yan:
A location privacy protection method based on cipher-text retrieval in cloud environment. - Ravi Bairagi, Preetesh Purohit, Kailash Chandra Bandhu
, Ratnesh Litoriya
:
A secure and efficient mechanism for scheduling tasks in cloud computing environments.
Volume 5, Number 6, November/December 2022
SURVEY ARTICLES
- N. Renugadevi
, Shirisha Thangallapally, Sai Charan Vemula, Stheya Julakanti, Somya Bhatnagar:
Methods for improving the implementation of advanced encryption standard hardware accelerator on field programmable gate array-A survey. - Murat Güzeltepe, Selda Çalkavur
:
Skew-cyclic codes based public-key cryptosystem approach.
RESEARCH ARTICLES
- Shubham Rana, Nitesh Kumar, Anand Handa
, Sandeep K. Shukla:
Automated Windows behavioral tracing for malware analysis. - May Almousa, Tianyang Zhang, Abdolhossein Sarrafzadeh, Mohd Anwar
:
Phishing website detection: How effective are deep learning-based models and hyperparameter optimization? - Dharminder Dharminder
, Ankur Nehra, Aditya Arya:
A construction of Chebyshev chaotic map based authenticated key agreement protocol for satellite communication system. - Engin Zeydan
, Yekta Turk, Yaman Yagiz Tasbag:
Entropy service for secure real-time mission critical communications. - Mohamad Mulham Belal, Tanmoy Maitra
, Debasis Giri
, Ashok Kumar Das
:
Chaotic neural networks and farfalle construction based parallel keyed secure hash function. - Shivansh Kumar, Ruhul Amin
:
Decentralized trade finance using blockchain and lightning network. - Shyam Saurabh
, Kishore Sinha
:
Perfect secret sharing schemes from combinatorial squares. - Preetam Mukherjee
, Anirban Sengupta, Chandan Mazumdar:
"Security Gap" as a metric for enterprise business processes. - Mirmorsal Madani, Homayun Motameni
, Hosein Mohamadi:
Fake news detection using deep learning integrating feature extraction, natural language processing, and statistical descriptors. - Shreya Patel, Rinku Dewri
:
Private record linkage with linkage maps.
![](https://dblp.org/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.