Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleSeptember 2024
Reversible data hiding in encrypted image based on key-controlled balanced Huffman coding
Journal of Information Security and Applications (JISA), Volume 84, Issue Chttps://doi.org/10.1016/j.jisa.2024.103833AbstractTo achieve privacy protection and effective management in cloud computing, and solve the problem of existing reversible data hiding in encrypted image (RDH-EI) algorithms being unable to resist existing various attacks, an RDH-EI algorithm based ...
- research-articleSeptember 2024
Dynamic-anonymous privacy-preserving authenticated aggregation for safety-warning system for the Internet of Vehicles
Journal of Information Security and Applications (JISA), Volume 84, Issue Chttps://doi.org/10.1016/j.jisa.2024.103830AbstractCurrently, the connectivity of vehicles using the latest communication and computing technologies has grown as the Internet of Vehicles (IoV). IoV has been utilized to foster an easy traffic flow by sharing safety-warning messages. However, ...
- research-articleSeptember 2024
Enabling security risk assessment and management for business process models
- David G. Rosado,
- Luis E. Sánchez,
- Ángel Jesús Varela-Vaca,
- Antonio Santos-Olmo,
- María Teresa Gómez-López,
- Rafael M. Gasca,
- Eduardo Fernández-Medina
Journal of Information Security and Applications (JISA), Volume 84, Issue Chttps://doi.org/10.1016/j.jisa.2024.103829AbstractBusiness processes (BP) are considered the enterprise’s cornerstone but are increasingly in the spotlight of attacks. Therefore, the design of business processes must consider the security risks and be adequately integrated into the information ...
- research-articleSeptember 2024
Detecting malicious DoH traffic: Leveraging small sample analysis and adversarial networks for detection
Journal of Information Security and Applications (JISA), Volume 84, Issue Chttps://doi.org/10.1016/j.jisa.2024.103827AbstractIn light of the escalating frequency of DNS attacks, it is imperative to bolster user security and privacy through the encryption of DNS queries. However, conventional methods for detecting DNS traffic are no longer effective in identifying ...
- research-articleSeptember 2024
SL3PAKE: Simple Lattice-based Three-party Password Authenticated Key Exchange for post-quantum world
Journal of Information Security and Applications (JISA), Volume 84, Issue Chttps://doi.org/10.1016/j.jisa.2024.103826AbstractThree-party Password Authenticated Key Exchange (3PAKE) is a protocol where two parties generate the same session key with the help of a trusted server. With the evolution of quantum computers, there is a growing need to develop the 3PAKE ...
-
- research-articleSeptember 2024
Specifying cycles of minimal length for commonly used linear layers in block ciphers
Journal of Information Security and Applications (JISA), Volume 84, Issue Chttps://doi.org/10.1016/j.jisa.2024.103824AbstractNonlinear invariant attack applied to lightweight block ciphers relies on the existence of a nonlinear invariant g : F 2 n → F 2 for the round function. Whereas invariants of the entire S-box layer have been studied in terms of the corresponding ...
- research-articleSeptember 2024
Statistical privacy protection for secure data access control in cloud
Journal of Information Security and Applications (JISA), Volume 84, Issue Chttps://doi.org/10.1016/j.jisa.2024.103823AbstractCloud Service Providers (CSPs) allow data owners to migrate their data to resource-rich and powerful cloud servers and provide access to this data by individual users. Some of this data may be highly sensitive and important and CSPs cannot ...
- research-articleSeptember 2024
Ciphertext policy attribute-based encryption scheme supporting Boolean circuits over ideal lattices
Journal of Information Security and Applications (JISA), Volume 84, Issue Chttps://doi.org/10.1016/j.jisa.2024.103822AbstractConsidering the existence of fast implementation methods for multiplication operations over ideal lattices, we constructed a selectively secure ciphertext policy attribute-based encryption scheme supporting Boolean circuits based non-monotonic ...
Highlights- Our scheme is a CPABE scheme over ideal lattices.
- We use non-monotonic LSSS to complete the sharing and reconstruction of secrets.
- Our scheme supports Boolean circuit access structures.
- research-articleSeptember 2024
Disposable identities: Solving web tracking
Journal of Information Security and Applications (JISA), Volume 84, Issue Chttps://doi.org/10.1016/j.jisa.2024.103821AbstractInterrupting the web tracking kill chain is enough to disrupt the tracker’s ability to leverage the collected information; however, this may disrupt the personalized services enjoyed by many. Empowering the user to select which domains can be co-...
- research-articleSeptember 2024
Keeping classical distinguisher and neural distinguisher in balance
Journal of Information Security and Applications (JISA), Volume 84, Issue Chttps://doi.org/10.1016/j.jisa.2024.103816AbstractAt CRYPTO 2019, Gohr pioneered the use of the neural distinguisher (N D) for differential cryptanalysis, sparking growing interest in this approach. However, a key limitation of N D is its inability to analyze as many rounds as the classical ...
- research-articleSeptember 2024
A comprehensive evaluation on the benefits of context based password cracking for digital forensics
Journal of Information Security and Applications (JISA), Volume 84, Issue Chttps://doi.org/10.1016/j.jisa.2024.103809AbstractPassword-based authentication systems have many weaknesses, yet they remain overwhelmingly used and their announced disappearance is still undated. The system admin overcomes the imperfection by skilfully enforcing a strong password policy and ...
- research-articleSeptember 2024
Privacy-preserving geo-tagged image search in edge–cloud computing for IoT
Journal of Information Security and Applications (JISA), Volume 84, Issue Chttps://doi.org/10.1016/j.jisa.2024.103808AbstractThe Internet of Things (IoT) generates a significant volume of geo-tagged images via surveillance sensors in edge–cloud computing environments. Image search is essential to facilitate information sharing, data analysis, and strategic decision-...
Highlights- Single-to-multi searchable encryption model on geo-tagged images.
- Secure nearest neighbor queries on geo-tagged images.
- Secure pruning based on the extended locality-sensitive hashing.
- Distance calculation from an encrypted ...
- research-articleSeptember 2024
A novel link fabrication attack detection method for low-latency SDN networks
Journal of Information Security and Applications (JISA), Volume 84, Issue Chttps://doi.org/10.1016/j.jisa.2024.103807AbstractThe application of Software-defined Networking (SDN) in low-latency scenarios, such as 6G, has received immense attention. Notably, our research reveals that SDN remains susceptible to link fabrication attacks (LFA) in low-latency environments, ...
- research-articleSeptember 2024
Efficient handover authentication protocol with message integrity for mobile clients in wireless mesh networks
Journal of Information Security and Applications (JISA), Volume 84, Issue Chttps://doi.org/10.1016/j.jisa.2024.103806AbstractWireless Mesh Network (WMN) has become the most favorable choice among various networking options due to its distributed nature. It offers continuous Internet services, in comparison with other conventional networks, through a self-healing and ...
- research-articleSeptember 2024
PCPHE: A privacy comparison protocol for vulnerability detection based on homomorphic encryption
Journal of Information Security and Applications (JISA), Volume 84, Issue Chttps://doi.org/10.1016/j.jisa.2024.103805AbstractNowadays, many security service providers have their own vulnerability databases and consider them as corporate property. How to ensure the normal use of client while protecting the privacy of these assets has become a problem that needs to be ...
- research-articleSeptember 2024
Puncturable-based broadcast encryption with tracking for preventing malicious encryptors in cloud file sharing
Journal of Information Security and Applications (JISA), Volume 84, Issue Chttps://doi.org/10.1016/j.jisa.2024.103803AbstractCloud file sharing (CFS) in cloud storage is one of the essential tools for enterprises to improve their core competitiveness. In the sharing process, user dynamic management and players/readers abuse has always been a problem that needs to be ...
Highlights- Prevent malicious encryptors. We use the feature of uniform distribution of hash output to hash random numbers, which makes it impossible to embed the random trapdoor.
- Dynamic management of users. We incorporate puncture encryption ...
- research-articleSeptember 2024
GMADV: An android malware variant generation and classification adversarial training framework
Journal of Information Security and Applications (JISA), Volume 84, Issue Chttps://doi.org/10.1016/j.jisa.2024.103800AbstractAndroid malware uses anti-reverse analysis and APK shelling technology, which leads to the failure of the classification method based on decompiled features and the reduction of the classification accuracy based on single file features. Moreover, ...
- research-articleSeptember 2024
Digital image steganalysis using entropy driven deep neural network
Journal of Information Security and Applications (JISA), Volume 84, Issue Chttps://doi.org/10.1016/j.jisa.2024.103799Context-aware steganography techniques are quite popular due to their robustness. However, steganography techniques are misused to hide inappropriate information in some occurrences. In this paper, a new entropy-driven convolutional neural network is ...
- research-articleSeptember 2024
A statistical verification method of random permutations for hiding countermeasure against side-channel attacks
Journal of Information Security and Applications (JISA), Volume 84, Issue Chttps://doi.org/10.1016/j.jisa.2024.103797AbstractHiding countermeasure is among the best-known secure implementation techniques designed to counteract side-channel attacks. It uses a permutation algorithm to shuffle data. In today’s Post-Quantum Cryptography (PQC), hiding countermeasure has ...
Graphical abstractDisplay Omitted
- research-articleMarch 2024
Crypto-space image steganography based on blind flipping
Journal of Information Security and Applications (JISA), Volume 79, Issue Chttps://doi.org/10.1016/j.jisa.2023.103660AbstractReversible data hiding (RDH) for digital images is a widely studied steganography that ensures the carrier image can be restored without distortion. Due to the popularity of Internet applications, a lot of research reports focus on the RDH for ...