International Journal of Information and Computer Security最新文献

筛选
英文 中文
A bio-inspired algorithm for enhancing DNA cryptography 一种增强DNA密码的仿生算法
International Journal of Information and Computer Security Pub Date : 2023-01-01 DOI: 10.1504/ijics.2023.10055396
Kheira Lakel, F. Bendella
{"title":"A bio-inspired algorithm for enhancing DNA cryptography","authors":"Kheira Lakel, F. Bendella","doi":"10.1504/ijics.2023.10055396","DOIUrl":"https://doi.org/10.1504/ijics.2023.10055396","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"21 1","pages":"436-456"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enriching blockchain with spatial keyword query processing 用空间关键字查询处理丰富区块链
International Journal of Information and Computer Security Pub Date : 2023-01-01 DOI: 10.1504/ijics.2023.133369
Muhammad Kashif Azhar, Bin Yao, Zhongpu Chen
{"title":"Enriching blockchain with spatial keyword query processing","authors":"Muhammad Kashif Azhar, Bin Yao, Zhongpu Chen","doi":"10.1504/ijics.2023.133369","DOIUrl":"https://doi.org/10.1504/ijics.2023.133369","url":null,"abstract":"Recently, after successfully revolutionising financial services, blockchain is now transforming a variety of other domains. However, current working abstraction requires technology to have more maturity from several key perspectives, and linear data processing is one of them. Blockchain, with its core characteristics like immutability, traceability, and decentralisation, has the potential to support various types of data. Currently, we find this design an ideal model to support spatial data structures, which, to the best of our knowledge, is a novel feature. We lead this opportunity to enrich blockchain with efficient spatial keyword data. We introduce spatial keyword index for block (SKIB), which is a cryptographically signed tree, thus maintaining the storage and integrity of original data from its spatial topological contexts. To demonstrate our work, we implement both textual first and spatial first pruning techniques. The comprehensive evaluation shows that SKIB provides efficient spatial keyword data processing on blockchains.","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135495323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic group signature scheme using ideal lattices 基于理想格的动态群签名方案
International Journal of Information and Computer Security Pub Date : 2023-01-01 DOI: 10.1504/ijics.2023.133366
M.H. Abhilash, B.B. Amberker
{"title":"Dynamic group signature scheme using ideal lattices","authors":"M.H. Abhilash, B.B. Amberker","doi":"10.1504/ijics.2023.133366","DOIUrl":"https://doi.org/10.1504/ijics.2023.133366","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135495324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementation of a secret sharing-based masking scheme against side-channel attack for ultra-lightweight ciphers in IoT 针对物联网中超轻量密码的侧信道攻击的基于秘密共享的屏蔽方案的实现
International Journal of Information and Computer Security Pub Date : 2023-01-01 DOI: 10.1504/ijics.2023.132725
Swapnil Sutar, Vikas Tiwari, Ajeet Singh
{"title":"Implementation of a secret sharing-based masking scheme against side-channel attack for ultra-lightweight ciphers in IoT","authors":"Swapnil Sutar, Vikas Tiwari, Ajeet Singh","doi":"10.1504/ijics.2023.132725","DOIUrl":"https://doi.org/10.1504/ijics.2023.132725","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"21 1","pages":"336-359"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67039747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust watermarking of Medical Images using SVM and hybrid DWT-SVD 基于SVM和混合DWT-SVD的医学图像鲁棒水印
International Journal of Information and Computer Security Pub Date : 2023-01-01 DOI: 10.1504/ijics.2023.10057699
H. Singh, K. Singh
{"title":"Robust watermarking of Medical Images using SVM and hybrid DWT-SVD","authors":"H. Singh, K. Singh","doi":"10.1504/ijics.2023.10057699","DOIUrl":"https://doi.org/10.1504/ijics.2023.10057699","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67039768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new architecture with a new protocol for m-payment 移动支付的新架构和新协议
International Journal of Information and Computer Security Pub Date : 2023-01-01 DOI: 10.1504/ijics.2023.10054871
Abdelkader Belkhir, Boukers Saâd
{"title":"A new architecture with a new protocol for m-payment","authors":"Abdelkader Belkhir, Boukers Saâd","doi":"10.1504/ijics.2023.10054871","DOIUrl":"https://doi.org/10.1504/ijics.2023.10054871","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Robust Feature Points Based Screen-shooting Resilient Watermarking Scheme 基于鲁棒特征点的截屏弹性水印方案
International Journal of Information and Computer Security Pub Date : 2023-01-01 DOI: 10.1504/ijics.2023.10056328
Yuan Jia, Ruixia Yan, Lingyun Gao
{"title":"A Robust Feature Points Based Screen-shooting Resilient Watermarking Scheme","authors":"Yuan Jia, Ruixia Yan, Lingyun Gao","doi":"10.1504/ijics.2023.10056328","DOIUrl":"https://doi.org/10.1504/ijics.2023.10056328","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Behavioral analysis and Results of Malware and Ransomware using optimal behavioral feature set 基于最优行为特征集的恶意软件和勒索软件行为分析及结果
International Journal of Information and Computer Security Pub Date : 2023-01-01 DOI: 10.1504/ijics.2023.10059326
Balaji M. Patil, Laxmi B. Bhagwat
{"title":"Behavioral analysis and Results of Malware and Ransomware using optimal behavioral feature set","authors":"Balaji M. Patil, Laxmi B. Bhagwat","doi":"10.1504/ijics.2023.10059326","DOIUrl":"https://doi.org/10.1504/ijics.2023.10059326","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135650044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Method of Speech Information Hiding in Inactive Frame Based on Pitch Modulation 基于基音调制的非活动帧语音信息隐藏方法
International Journal of Information and Computer Security Pub Date : 2022-01-01 DOI: 10.1504/ijics.2022.10047375
Zhijun Wu, Chenlei Zhang, Junjun Guo
{"title":"A Method of Speech Information Hiding in Inactive Frame Based on Pitch Modulation","authors":"Zhijun Wu, Chenlei Zhang, Junjun Guo","doi":"10.1504/ijics.2022.10047375","DOIUrl":"https://doi.org/10.1504/ijics.2022.10047375","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FFRR: a software diversity technique for defending against buffer overflow attacks FFRR:一种用于防御缓冲区溢出攻击的软件多样性技术
International Journal of Information and Computer Security Pub Date : 2022-01-01 DOI: 10.1504/ijics.2022.10047404
N. Raghu Kisore, K. S. Shiva Kumar
{"title":"FFRR: a software diversity technique for defending against buffer overflow attacks","authors":"N. Raghu Kisore, K. S. Shiva Kumar","doi":"10.1504/ijics.2022.10047404","DOIUrl":"https://doi.org/10.1504/ijics.2022.10047404","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信