


default search action
Security and Privacy, Volume 3
Volume 3, Number 1, January 2020
- Sankhanil Dey
, Amlan Chakrabarti, Ranjan Ghosh:
4-bit Boolean functions in generation and cryptanalysis of secure 4-bit crypto S-boxes. - Mahdi Nikooghadam, Haleh Amintoosi
:
A secure and robust elliptic curve cryptography-based mutual authentication scheme for session initiation protocol.
- Shohreh Hosseinzadeh
, Bernardo Sequeiros, Pedro R. M. Inácio, Ville Leppänen
:
Recent trends in applying TPM to cloud computing. - Amir A. Khwaja
, Muniba Murtaza, Hafiz F. Ahmed:
A security feature framework for programming languages to minimize application layer vulnerabilities.
Volume 3, Number 2, March 2020
- Carlisle Adams
:
A privacy-preserving Blockchain with fine-grained access control. - Umair Sarfraz
, Sherali Zeadally
, Masoom Alam:
Outsourcing IOTA proof-of-work to volunteer public devices. - El Habib Boudjema, Sergey Verlan
, Lynda Mokdad
, Christèle Faure:
VYPER: Vulnerability detection in binary code. - Fenia Ferra
, Isabel Wagner
, Eerke A. Boiten
, Lee Hadlington, Ismini Psychoula
, Richard Snape
:
Challenges in assessing privacy impact: Tales from the front lines.
Volume 3, Number 3, May 2020
- Rajeev Singh
, Sudeep Tanwar
, Teek Parval Sharma:
Utilization of blockchain for mitigating the distributed denial of service attacks.
- Mahmoud Elkhodr
, Belal Alsinglawi:
Data provenance and trust establishment in the Internet of Things. - Mohit Kumar Sharma
, Manisha J. Nene
:
Two-factor authentication using biometric based quantum operations. - Ismaila Adeniyi Kamil, Sunday Oyinlola Ogundoyin
:
On the security of privacy-preserving authentication scheme with full aggregation in vehicular ad hoc network. - Dharminder Dharminder
, Dheerendra Mishra
:
Understanding signcryption security in standard model. - Elias P. Duarte Jr.
, Carmem S. Hara, Pedro R. Torres Jr., Christian Gomes:
BackStreamDB: A stream processing engine for backbone traffic monitoring with anomaly detection.
Volume 3, Number 4, July 2020
Special Issue Articles
- George Stergiopoulos, Nick Kapetanas, Efstratios Vasilellis
, Dimitris Gritzalis
:
Leaking supervisory controls and data acquisition commands over unpadded TCP/IP encryption through differential packet size analysis. - Waheeb Yaqub
, Ibrahim Kamel, Zeyar Aung:
Toward watermarking compressed data in columnar database architectures. - Sana Belguith
, Nesrine Kaaniche, Giovanni Russello:
CUPS: Secure opportunistic cloud of things framework based on attribute-based encryption scheme supporting access policy update.
Volume 3, Number 5, September 2020
- Olufunso Stephen Olorunsola, Francisca Nonyelum Ogwueleka, Abraham E. Evwiekpaefe:
Assessment of privacy and security perception of biometric technology case study of Kaduna state tertiary academic institutions.
- Shaik Vaseem Akram
, Praveen Kumar Malik
, Rajesh Singh, Anita Gehlot, Sudeep Tanwar
:
Adoption of blockchain technology in various realms: Opportunities and challenges. - Al-Batool Al-Ghamdi, Ameenah Al-Sulami, Asia Othman Aljahdali
:
On the security and confidentiality of quantum key distribution.
- Tuuli Siiskonen
, Mika Rantonen
:
Detecting Stuxnet-like data integrity attacks. - Sankhanil Dey
, Amlan Chakrabarti, Ranjan Ghosh:
A new algorithm to find monic irreducible polynomials over extended Galois field GF(pq) using positional arithmetic. - Pandit Byomakesha Dash, Janmenjoy Nayak
, Bighnaraj Naik, Etuari Oram, SK Hafizul Islam
:
Model based IoT security framework using multiclass adaptive boosting with SMOTE. - Chandrashekhar Meshram
, Rabha W. Ibrahim, Sarita Gajbhiye Meshram, Kailash Wamanrao Kalare
, Sunil D. Bagde:
An efficient ID-based cryptographic technique using IFP and GDLP. - Jeyakumar Samantha Tharani
, Nalin A. G. Arachchilage
:
Understanding phishers' strategies of mimicking uniform resource locators to leverage phishing attacks: A machine learning approach. - Ahmet Fatih Mustacoglu
, Ferhat Özgür Çatak
, Geoffrey C. Fox:
Password-based encryption approach for securing sensitive data. - Mfanasibili Ngwenya
, Mpho Ngoepe:
A framework for data security, privacy, and trust in "consumer internet of things" assemblages in South Africa. - Brooke Nodeland
, Scott Belshaw:
Establishing a criminal justice cyber lab to develop and enhance professional and educational opportunities.
Volume 3, Number 6, November 2020
- Yuriy Khanas, Michal Borecki
:
Research on the use of algorithms for matrix transformations for encrypting text information. - Ankitha Vaddeti, Deepthi Vidiyala, Vineetha Puritipati, Raveendra Babu Ponnuru
, Ji Sun Shin, Goutham Reddy Alavalapati
:
Graphical passwords: Behind the attainment of goals. - Giddeon Njamngang Angafor
, Iryna Yevseyeva
, Ying He
:
Game-based learning: A review of tabletop exercises for cybersecurity incident response training. - Akhila G. P., Gayathri R., Keerthana S., Angelin Gladston
:
A machine learning framework for domain generating algorithm based malware detection. - Morris Ntonja
, Moses Ashawa
:
Examining artifacts generated by setting Facebook Messenger as a default SMS application on Android: Implication for personal data privacy. - Mohit Kumar Sharma, Manisha J. Nene:
Dual factor third-party biometric-based authentication scheme using quantum one time passwords†. - Sourav Kunal
, Parth Gandhi, Ronak Sutariya, Hardik Tarpara:
A secure software defined networking for distributed environment.
- Mahdi Daghmehchi Firoozjaei
, Rongxing Lu, Ali A. Ghorbani:
An evaluation framework for privacy-preserving solutions applicable for blockchain-based internet-of-things platforms.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.