


default search action
International Journal of Information and Computer Security, Volume 20
Volume 20, Numbers 1/2, 2023
- Zihao Wei, Siwei Sun, Lei Hu, Man Wei, René Peralta:

Searching the space of tower field implementations of the 픽28 inverter - with applications to AES, Camellia and SM4. 1-26 - Pratyusa Mukherjee, Chittaranjan Pradhan, Rabindra Kumar Barik, Harishchandra Dubey:

Emerging DNA cryptography-based encryption schemes: a review. 27-47 - Debanjan Chatterjee, Barnali Gupta Banik, Abhinandan Banik

:
Attack resistant chaos-based cryptosystem by modified baker map and logistic map. 48-83 - Sherif F. Emara, Sayed Abdelhady, M. Zaki:

A novel traceback model for DDoS attacks using modified Floyd-Warshall algorithm. 84-103 - Sevgi Arca, Rattikorn Hewett:

Data privacy with heuristic anonymisation. 104-132 - Anjani Kumar Verma, Veer Sain Dixit:

Collaborative filtering-based recommendations against shilling attacks with particle swarm optimiser and entropy-based mean clustering. 133-144 - Hoda El Merabet, Abderrahmane Hajraoui:

Malware detection approach based on deep convolutional neural networks. 145-157 - Sahil Gupta, Naresh Kumar Garg:

Data hiding in the optimal keyframes using circular shifting and mutation operations for improvement in imperceptibility. 158-175 - Pritam S. Salankar, Vinay Avasthi, Ashutosh Pasricha:

Lightweight authentication scheme based on modified EAP security for CoAP protocol-based IoMT applications. 176-198 - Sunil Gupta, Pradeep Kumar Arya, Hitesh Kumar Sharma:

User anonymity-based secure authentication protocol for telemedical server systems. 199-219
Volume 20, Numbers 3/4, 2023
- Djalila Belkebir:

DIP-QGA: a secure and robust watermarking technique based on direct image projection and quantum genetic algorithm. 221-247 - Veer Sain Dixit, Akanksha Bansal Chopra:

Push and nuke attacks detection using DNN-HHO algorithm. 248-268 - Saravanan Arumugam

, Sathya Bama S.:
CloudSec (3FA): a multifactor with dynamic click colour-based dynamic authentication for securing cloud environment. 269-294 - Bikash Baruah

, Manash Pratim Dutta, Dhruba K. Bhattacharyya:
An effective ensemble method for missing data imputation. 295-314 - Nayana Hegde, Sunilkumar S. Manvi:

Distributed integrity and non-repudiation scheme in the dynamic vehicular cloud environment. 315-348 - Jagdish Chandra Pandey, Mala Kalra:

An approach for secure data transmission in smart grids. 348-365 - K. Suresh, Rajarshi Pal, S. R. Balasundaram:

A stable cryptographic key generation from fingerprint biometrics using Gray code for secure data storage. 366-398 - Vikas Tiwari, Ajeet Singh, Appala Naidu Tentu, Ashutosh Saxena:

Generation of 8 × 8 S-boxes using 4 × 4 optimal S-boxes. 399-413 - Shalini Subramani

, Munuswamy Selvi
:
Comprehensive review on distributed denial of service attacks in wireless sensor networks. 414-438 - Shalini Subramani

, Munuswamy Selvi
:
Intrusion detection system using RBPSO and fuzzy neuro-genetic classification algorithms in wireless sensor networks. 439-461

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














