International Journal of Information and Computer Security最新文献

筛选
英文 中文
JPBlock: augmenting security of current journal and paper publication processes using blockchain and smart contract JPBlock:使用区块链和智能合约增强当前期刊和论文出版过程的安全性
International Journal of Information and Computer Security Pub Date : 2023-01-01 DOI: 10.1504/ijics.2023.132733
J. Odoom, Xiaofang Huang, R. S. Soglo
{"title":"JPBlock: augmenting security of current journal and paper publication processes using blockchain and smart contract","authors":"J. Odoom, Xiaofang Huang, R. S. Soglo","doi":"10.1504/ijics.2023.132733","DOIUrl":"https://doi.org/10.1504/ijics.2023.132733","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"21 1","pages":"262-292"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67039975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A method of speech information hiding in inactive frame based on pitch modulation 一种基于基音调制的非活动帧语音信息隐藏方法
International Journal of Information and Computer Security Pub Date : 2023-01-01 DOI: 10.1504/ijics.2023.133367
Zhijun Wu, Chenlei Zhang, Junjun Guo
{"title":"A method of speech information hiding in inactive frame based on pitch modulation","authors":"Zhijun Wu, Chenlei Zhang, Junjun Guo","doi":"10.1504/ijics.2023.133367","DOIUrl":"https://doi.org/10.1504/ijics.2023.133367","url":null,"abstract":"To solve the problem that the speech information hiding algorithm based on random position selection and matrix coding has insufficient hiding capacity, the paper proposes a novel pitch modulation steganography method based on inactive frame. In this method, the least significant bit (LSB) replacement method is adopted for inactive frames, and the speech information hiding algorithm based on random position selection and matrix coding is adopted for active frames, which realises the pitch modulation information hiding method based on inactive frames. Finally, simulation experiments are carried out for the pitch modulation information hiding method based on inactive frames. The results indicate that the maximum hiding capacity of the algorithm in this paper can reach 241.67 bps, which significantly improves the hiding capacity, and at the same time the concealment has also been improved to a certain extent.","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135495530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cryptanalysis of Common Prime RSA with Two Decryption Exponents: Jochemsz and May Approach 具有两个解密指数的公共素数RSA的密码分析:Jochemsz和May方法
International Journal of Information and Computer Security Pub Date : 2023-01-01 DOI: 10.1504/ijics.2023.10051701
R. Kumar, S.Mithilesh Krishna
{"title":"Cryptanalysis of Common Prime RSA with Two Decryption Exponents: Jochemsz and May Approach","authors":"R. Kumar, S.Mithilesh Krishna","doi":"10.1504/ijics.2023.10051701","DOIUrl":"https://doi.org/10.1504/ijics.2023.10051701","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance evaluation of various deep convolutional neural network models through classification of malware 基于恶意软件分类的各种深度卷积神经网络模型的性能评估
International Journal of Information and Computer Security Pub Date : 2023-01-01 DOI: 10.1504/ijics.2023.10052186
Samrat Kumar Dey, M. Rahman, Md Arman Hossain, Maria Afnan, Zareen Tasneem
{"title":"Performance evaluation of various deep convolutional neural network models through classification of malware","authors":"Samrat Kumar Dey, M. Rahman, Md Arman Hossain, Maria Afnan, Zareen Tasneem","doi":"10.1504/ijics.2023.10052186","DOIUrl":"https://doi.org/10.1504/ijics.2023.10052186","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"21 1","pages":"414-435"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PBDG: A Malicious Code Detection Method Based on Precise Behavior Dependency Graph 基于精确行为依赖图的恶意代码检测方法
International Journal of Information and Computer Security Pub Date : 2023-01-01 DOI: 10.1504/ijics.2023.10052187
Qi Gao, Mengmeng Yang, Chenghua Tang, Baohua Qiang
{"title":"PBDG: A Malicious Code Detection Method Based on Precise Behavior Dependency Graph","authors":"Qi Gao, Mengmeng Yang, Chenghua Tang, Baohua Qiang","doi":"10.1504/ijics.2023.10052187","DOIUrl":"https://doi.org/10.1504/ijics.2023.10052187","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A comprehensive survey on fuzzy-based intelligent intrusion detection system for internet of things 基于模糊的物联网智能入侵检测系统综述
International Journal of Information and Computer Security Pub Date : 2023-01-01 DOI: 10.1504/ijics.2023.132724
U. Nandhini, Svn Santhosh Kumar
{"title":"A comprehensive survey on fuzzy-based intelligent intrusion detection system for internet of things","authors":"U. Nandhini, Svn Santhosh Kumar","doi":"10.1504/ijics.2023.132724","DOIUrl":"https://doi.org/10.1504/ijics.2023.132724","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"21 1","pages":"383-398"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67039685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Image Encryption Using Hybrid Grey Wolf Optimization and Chaotic Map 基于混合灰狼优化和混沌映射的图像加密
International Journal of Information and Computer Security Pub Date : 2023-01-01 DOI: 10.1504/ijics.2023.10057701
Waleed Ameen Mahmoud Al Jawher, Ali Akram Abdul Kareem
{"title":"An Image Encryption Using Hybrid Grey Wolf Optimization and Chaotic Map","authors":"Waleed Ameen Mahmoud Al Jawher, Ali Akram Abdul Kareem","doi":"10.1504/ijics.2023.10057701","DOIUrl":"https://doi.org/10.1504/ijics.2023.10057701","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67039908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Searching the space of tower field implementations of the 𝔽<SUB align="right">2<SUP align="right">8</SUP> inverter - with applications to AES, Camellia and SM4 搜索塔场空间实现的𝔽&lt;SUB align="right"&gt;2&lt;SUP align="right"&gt;8&lt;/SUP&gt;变频器-适用于AES, Camellia和SM4
International Journal of Information and Computer Security Pub Date : 2023-01-01 DOI: 10.1504/ijics.2023.127999
Zihao Wei, Siwei Sun, Lei Hu, Man Wei, René Peralta
{"title":"Searching the space of tower field implementations of the 𝔽&lt;SUB align=\"right\"&gt;2&lt;SUP align=\"right\"&gt;8&lt;/SUP&gt; inverter - with applications to AES, Camellia and SM4","authors":"Zihao Wei, Siwei Sun, Lei Hu, Man Wei, René Peralta","doi":"10.1504/ijics.2023.127999","DOIUrl":"https://doi.org/10.1504/ijics.2023.127999","url":null,"abstract":"No AccessSearching the space of tower field implementations of the 𝔽28 inverter - with applications to AES, Camellia and SM4Zihao Wei, Siwei Sun, Lei Hu, Man Wei and René PeraltaZihao WeiState Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China, Siwei SunState Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China, Lei HuState Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China, Man WeiState Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China and René PeraltaComputer Security Division, NIST, 100 Bureau Drive, Stop 8930, Gaithersburg, MD 20899-8930, USAPublished Online:December 21, 2022pp 1-26https://doi.org/10.1504/IJICS.2023.127999PDF ToolsAdd to FavouritesDownload CitationsTrack Citations Share this article on social mediaShareShare onFacebookTwitterLinkedInReddit AboutAbstractThe tower field implementation of the 𝔽28 inverter is not only the key technique for compact implementations of the S-boxes of several internationally standardised block ciphers such as AES, Camellia, and SM4, but also the underlying structure many side-channel attack resistant AES implementations rely on. In this work, we conduct an exhaustive study of the tower field representations of the 𝔽28 inverter with normal bases by applying several state-of-the-art combinatorial logic minimisation techniques. As a result, we achieve improved implementations of the AES, Camellia and SM4 S-boxes in terms of area footprint. Surprisingly, we are still able to improve the currently known most compact implementation of the AES S-box from CHES 2018 by 5.5 GE, beating the record again. For Camellia and SM4, the improvements are even more significant. The Verilog codes of our implementations of the AES, Camellia and SM4 S-boxes are openly available.Keywordstower field, inverter, S-box, AES, Camellia, SM4 Next article FiguresReferencesRelatedDetails Volume 20Issue 1-22023 ISSN: 1744-1765eISSN: 1744-1773 HistoryPublished onlineDecember 21, 2022 Copyright © 2023 Inderscience Enterprises Ltd.Keywordstower fieldinverterS-boxAESCamelliaSM4Authors and AffiliationsZihao Wei1 Siwei Sun2 Lei Hu3 Man Wei4 René Peralta5 1. State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing 1000","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134996520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Ensemble Learning Algorithms with Feature Reduction Mechanism for Intrusion Detection System 基于特征约简机制的入侵检测系统集成学习算法
International Journal of Information and Computer Security Pub Date : 2023-01-01 DOI: 10.1504/ijics.2023.10050595
M. P. Dutta, Subhasish Banerjee, Gulab Sah
{"title":"Ensemble Learning Algorithms with Feature Reduction Mechanism for Intrusion Detection System","authors":"M. P. Dutta, Subhasish Banerjee, Gulab Sah","doi":"10.1504/ijics.2023.10050595","DOIUrl":"https://doi.org/10.1504/ijics.2023.10050595","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"366 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
User Driven General Framework to Cap the Joins in Secure Group Communication 限制安全组通信连接的用户驱动通用框架
International Journal of Information and Computer Security Pub Date : 2023-01-01 DOI: 10.1504/ijics.2023.10052719
Purushothama B. R, Payal Sharma
{"title":"User Driven General Framework to Cap the Joins in Secure Group Communication","authors":"Purushothama B. R, Payal Sharma","doi":"10.1504/ijics.2023.10052719","DOIUrl":"https://doi.org/10.1504/ijics.2023.10052719","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信