期刊: JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021; 58 ()
Along with the development of Internet of Things (IoT) technology and Vehicular Ad-Hoc Networks (VANETs), security and effectiveness of road utilizati......
期刊: JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021; 58 ()
Blockchain has penetrated numerous domains such as, industries, government agencies, online voting, and healthcare, etc. Among these domains, healthca......
期刊: JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021; 59 ()
Currently, encryption (such as the Transport Layer Security protocol) is used by increasingly more network applications to protect their security and ......
期刊: JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021; 61 ()
Presently, more and more electronic medical records (EMR) are used to replace traditional recording methods. However, there has potential safety hazar......
期刊: JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021; 58 ()
The concept of transparency order (denoted by TO) is an important criterion of (n, m)-functions to resist against differential power analysis (DPA). I......
期刊: JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021; 58 ()
Biometric template data protection is critical in preventing user privacy and identity from leakage. Random projection based cancelable biometrics is ......
期刊: JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021; 58 ()
Secret sharing of (k, n)-threshold is naturally used to assist in security-assurance applications in smart systems. It can ensure a high level of data......
期刊: JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021; 61 ()
To reduce the local storage burden and enjoy the conveniently ubiquitous access, an increasing number of individuals and enterprises prefer to outsour......
期刊: JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021; 58 ()
Over the last decade, secure multi-party computation (MPC) has made a great stride from a major theoretical area to the multi-functional tool for buil......
期刊: JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021; 61 ()
Y In this paper, a (k, n, m)-intragroup and intergroup secret image sharing ((ISIS)-S-2) scheme for the multi-group (i.e., m-group) environment is inv......
期刊: JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021; 58 ()
In recent years, QR code is popular online and offline, and it is an ideal media for secret sharing. This paper utilizes the error correction capacity......
期刊: JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021; 60 ()
Low-rate Denial of Service (LDoS) attacks use the low-rate requests to achieve the occupation of the network resources and have strong concealment. Th......
期刊: JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021; 61 ()
Detecting malicious domain names generated by domain generation algorithms is critical for defending the network against sophisticated attacks. In the......
期刊: JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021; 61 ()
With the development of the electronic healthcare industry, telemedicine diagnosis (TMD) has become a more flexible and convenient way. In the general......
期刊: JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021; 58 ()
With the rapid development of drone technology, drones are frequently used in all aspects of urban safety, such as emergency disaster monitoring, publ......