EURASIP Journal on Information Security, Volume 2022
Articles
1.) Improved scheme and evaluation method for progressive visual cryptography. --Binh Le Thanh Thai, Hidema Tanaka and Kohtaro Watanabe
2.) Human-artificial intelligence approaches for secure analysis in CAPTCHA codes. --Nghia Dinh and Lidia Ogiela
3.) “Alexa, What’s a Phishing Email?”: Training users to spot phishing emails using a voice assistant. --Filipo Sharevski and Peter Jachim
4.) Behavior-based user authentication on mobile devices in various usage contexts. --Dmytro Progonov, Valentyna Cherniakova, Pavlo Kolesnichenko and Andriy Oliynyk
5.) Presentation attack detection and biometric recognition in a challenge-response formalism. --Erwin Haasnoot, Luuk J. Spreeuwers and Raymond N. J. Veldhuis
6.) Robust video steganography for social media sharing based on principal component analysis. --Pingan Fan, Hong Zhang and Xianfeng Zhao
7.) On the methodology of fingerprint template protection schemes conception : meditations on the reliability. --Ayoub Lahmidi, Chouaib Moujahdi, Khalid Minaoui and Mohammed Rziza
8.) DIPPAS: a deep image prior PRNU anonymization scheme. --Francesco Picetti, Sara Mandelli, Paolo Bestagini, Vincenzo Lipari and Stefano Tubaro
9.) Secure machine learning against adversarial samples at test time. --Jing Lin, Laurent L. Njilla and Kaiqi Xiong
1.) Improved scheme and evaluation method for progressive visual cryptography. --Binh Le Thanh Thai, Hidema Tanaka and Kohtaro Watanabe
2.) Human-artificial intelligence approaches for secure analysis in CAPTCHA codes. --Nghia Dinh and Lidia Ogiela
3.) “Alexa, What’s a Phishing Email?”: Training users to spot phishing emails using a voice assistant. --Filipo Sharevski and Peter Jachim
4.) Behavior-based user authentication on mobile devices in various usage contexts. --Dmytro Progonov, Valentyna Cherniakova, Pavlo Kolesnichenko and Andriy Oliynyk
5.) Presentation attack detection and biometric recognition in a challenge-response formalism. --Erwin Haasnoot, Luuk J. Spreeuwers and Raymond N. J. Veldhuis
6.) Robust video steganography for social media sharing based on principal component analysis. --Pingan Fan, Hong Zhang and Xianfeng Zhao
7.) On the methodology of fingerprint template protection schemes conception : meditations on the reliability. --Ayoub Lahmidi, Chouaib Moujahdi, Khalid Minaoui and Mohammed Rziza
8.) DIPPAS: a deep image prior PRNU anonymization scheme. --Francesco Picetti, Sara Mandelli, Paolo Bestagini, Vincenzo Lipari and Stefano Tubaro
9.) Secure machine learning against adversarial samples at test time. --Jing Lin, Laurent L. Njilla and Kaiqi Xiong
Binh Le Thanh Thai - Personal Name
Nghia Dinh - Personal Name
Filipo Sharevski - Personal Name
Dmytro Progonov - Personal Name
Erwin Haasnoot - Personal Name
Pingan Fan - Personal Name
Ayoub Lahmidi - Personal Name
Francesco Picetti - Personal Name
Jing Lin - Personal Name
Nghia Dinh - Personal Name
Filipo Sharevski - Personal Name
Dmytro Progonov - Personal Name
Erwin Haasnoot - Personal Name
Pingan Fan - Personal Name
Ayoub Lahmidi - Personal Name
Francesco Picetti - Personal Name
Jing Lin - Personal Name
Volume 2022
2510-523X
e-Journal PTI
Inggris
Springer Nature
2022
Cambridge, United Kingdom
LOADING LIST...
LOADING LIST...