- User anonymity-based secure authentication protocol for telemedical server systems
- Lightweight authentication scheme based on modified EAP security for CoAP protocol-based IoMT applications
- Data hiding in the optimal keyframes using circular shifting and mutation operations for improvement in imperceptibility
- Malware detection approach based on deep convolutional neural networks
- Collaborative filtering-based recommendations against shilling attacks with particle swarm optimiser and entropy-based mean clustering
- Data privacy with heuristic anonymisation
- A novel traceback model for DDoS attacks using modified Floyd-Warshall algorithm
- Attack resistant chaos-based cryptosystem by modified baker map and logistic map
- Emerging DNA cryptography-based encryption schemes: a review
- Searching the space of tower field implementations of the 𝔽28 inverter - with applications to AES, Camellia and SM4
23 February 2024
Free sample articles newly available from International Journal of Information and Computer Security
The following sample articles from the International Journal of Information and Computer Security are now available here for free:
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment