EURASIP Journal on Information Security, Vol. 2024
Articles
1. Performance comparison of quantum-safe multivariate polynomial public key encapsulation algorithm. --Randy Kuang, Maria Perepechaenko, Ryan Toth and Michel Barbeau
2. Errorless robust JPEG steganography using steganographic polar codes. --Jimin Zhang, Xiaolei He and Yun Cao
3. Mining digital identity insights: patent analysis using NLP. --Matthew Comb and Andrew Martin. --Arkan Hammoodi Hasan Kabla, Achmad Husni Thamrin, Mohammed Anbar, Selvakumar Manickam and Shankar Karuppayah
4. Retraction Note: RFID tag recognition model for Internet of Things for training room management. --Shengqi Wu
5. Retraction Note: The design of network security protection trust management system based on an improved hidden Markov model. --Shaojun Chen
6. Retraction Note: Hierarchical energy-saving routing algorithm using fuzzy logic in wireless sensor networks. --Dan Wang, Qing Wu and Ming Hu
7. Retraction Note: Improved RFID mutual authentication protocol against exhaustive attack in the context of big data. --Kongze Li
8. Retraction Note: Research on privacy and secure storage protection of personalized medical data based on hybrid encryption. --Jialu Lv
9. Retraction Note: Node fault diagnosis algorithm for wireless sensor networks based on BN and WSN. --Ming Li
10. Retraction Note: Efficient identity security authentication method based on improved R-LWE algorithm in IoT environment. --Lin Yang
11. Retraction Note: IoT devices and data availability optimization by ANN and KNN. --Zhiqiang Chen, Zhihua Song, Tao Zhang and Yong Wei
12. Retraction Note: Network security threat detection technology based on EPSO-BP algorithm. --Zhu Lan
13. Machine learning security and privacy: a review of threats and countermeasures. --Anum Paracha, Junaid Arshad, Mohamed Ben Farah and Khalid Ismail
14. Intelligent multi-agent model for energy-efficient communication in wireless sensor networks. --Kiran Saleem, Lei Wang, Salil Bharany, Khmaies Ouahada, Ateeq Ur Rehman and Habib Hamam
15. FEDDBN-IDS: federated deep belief network-based wireless network intrusion detection system. --M. Nivaashini, E. Suganya, S. Sountharrajan, M. Prabu and Durga Prasad Bavirisetti
16. Cancelable templates for secure face verification based on deep learning and random projections. --Arslan Ali, Andrea Migliorati, Tiziano Bianchi and Enrico Magli
17. RETRACTED ARTICLE: Network security threat detection technology based on EPSO-BP algorithm. --Zhu Lan
1. Performance comparison of quantum-safe multivariate polynomial public key encapsulation algorithm. --Randy Kuang, Maria Perepechaenko, Ryan Toth and Michel Barbeau
2. Errorless robust JPEG steganography using steganographic polar codes. --Jimin Zhang, Xiaolei He and Yun Cao
3. Mining digital identity insights: patent analysis using NLP. --Matthew Comb and Andrew Martin. --Arkan Hammoodi Hasan Kabla, Achmad Husni Thamrin, Mohammed Anbar, Selvakumar Manickam and Shankar Karuppayah
4. Retraction Note: RFID tag recognition model for Internet of Things for training room management. --Shengqi Wu
5. Retraction Note: The design of network security protection trust management system based on an improved hidden Markov model. --Shaojun Chen
6. Retraction Note: Hierarchical energy-saving routing algorithm using fuzzy logic in wireless sensor networks. --Dan Wang, Qing Wu and Ming Hu
7. Retraction Note: Improved RFID mutual authentication protocol against exhaustive attack in the context of big data. --Kongze Li
8. Retraction Note: Research on privacy and secure storage protection of personalized medical data based on hybrid encryption. --Jialu Lv
9. Retraction Note: Node fault diagnosis algorithm for wireless sensor networks based on BN and WSN. --Ming Li
10. Retraction Note: Efficient identity security authentication method based on improved R-LWE algorithm in IoT environment. --Lin Yang
11. Retraction Note: IoT devices and data availability optimization by ANN and KNN. --Zhiqiang Chen, Zhihua Song, Tao Zhang and Yong Wei
12. Retraction Note: Network security threat detection technology based on EPSO-BP algorithm. --Zhu Lan
13. Machine learning security and privacy: a review of threats and countermeasures. --Anum Paracha, Junaid Arshad, Mohamed Ben Farah and Khalid Ismail
14. Intelligent multi-agent model for energy-efficient communication in wireless sensor networks. --Kiran Saleem, Lei Wang, Salil Bharany, Khmaies Ouahada, Ateeq Ur Rehman and Habib Hamam
15. FEDDBN-IDS: federated deep belief network-based wireless network intrusion detection system. --M. Nivaashini, E. Suganya, S. Sountharrajan, M. Prabu and Durga Prasad Bavirisetti
16. Cancelable templates for secure face verification based on deep learning and random projections. --Arslan Ali, Andrea Migliorati, Tiziano Bianchi and Enrico Magli
17. RETRACTED ARTICLE: Network security threat detection technology based on EPSO-BP algorithm. --Zhu Lan
Ming Li - Personal Name
Nivaashini, M. - Personal Name
Saleem, Kiran - Personal Name
Paracha, Anum - Personal Name
Lan, Zhu - Personal Name
Chen, Zhiqiang - Personal Name
Yang, Lin - Personal Name
Jialu Lv - Personal Name
Kongze Li - Personal Name
Chen, Shaojun - Personal Name
Shengqi Wu - Personal Name
Kabla, Arkan Hammoodi Hasan - Personal Name
Zhang, Jimin - Personal Name
Kuang, Randy - Personal Name
Wang, Dan - Personal Name
Ali, Arslan - Personal Name
Nivaashini, M. - Personal Name
Saleem, Kiran - Personal Name
Paracha, Anum - Personal Name
Lan, Zhu - Personal Name
Chen, Zhiqiang - Personal Name
Yang, Lin - Personal Name
Jialu Lv - Personal Name
Kongze Li - Personal Name
Chen, Shaojun - Personal Name
Shengqi Wu - Personal Name
Kabla, Arkan Hammoodi Hasan - Personal Name
Zhang, Jimin - Personal Name
Kuang, Randy - Personal Name
Wang, Dan - Personal Name
Ali, Arslan - Personal Name
Vol. 2024
2510-523X
e-Journal PTI
Inggris
Springer Nature Singapore Pte Ltd.
2024
Cambridge, United Kingdom
LOADING LIST...
LOADING LIST...