首页 > 最新文献

Journal of Information Security and Applications最新文献

英文 中文
BISE: Enhance data sharing security through consortium blockchain and IPFS BISE:通过联盟区块链和IPFS增强数据共享安全性
IF 3.7 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-03-01 Epub Date: 2025-12-05 DOI: 10.1016/j.jisa.2025.104320
Mingxuan Chen , Puhe Hao , Weizhi Meng , Yasen Aizezi , Guozi Sun
Data sharing is pivotal in sectors such as healthcare, finance, and social networking. Encrypting sensitive data, while essential for privacy protection, introduces complexity to data sharing and poses privacy risks when leveraging cloud servers. Blockchain-based searchable encryption offers a balance between privacy preservation and data availability; however, user anonymity remains a significant concern. Traditional storage systems, which rely on centralized servers, limit data stability and scalability. To address these challenges, we have introduced BISE, a solution that leverages the power of blockchain to achieve data integrity, using searchable encryption for secure searches and IPFS for decentralized storage. Constructed on Hyperledger Fabric and IPFS, our system demonstrates efficiency through simulations. This integrated approach ensures data privacy, integrity, and availability, with efficient updates and queries, making it a robust solution for sensitive data sharing in various domains.
数据共享在医疗保健、金融和社交网络等领域至关重要。对敏感数据进行加密虽然对隐私保护至关重要,但会给数据共享带来复杂性,并在利用云服务器时带来隐私风险。基于区块链的可搜索加密在隐私保护和数据可用性之间提供了平衡;然而,用户匿名仍然是一个重大问题。传统的存储系统依赖于集中式服务器,限制了数据的稳定性和可扩展性。为了应对这些挑战,我们引入了BISE,这是一种利用区块链功能实现数据完整性的解决方案,使用可搜索加密进行安全搜索,使用IPFS进行分散存储。本系统基于Hyperledger Fabric和IPFS架构,通过仿真验证了系统的有效性。这种集成的方法确保数据隐私、完整性和可用性,并具有高效的更新和查询,使其成为各种领域中敏感数据共享的健壮解决方案。
{"title":"BISE: Enhance data sharing security through consortium blockchain and IPFS","authors":"Mingxuan Chen ,&nbsp;Puhe Hao ,&nbsp;Weizhi Meng ,&nbsp;Yasen Aizezi ,&nbsp;Guozi Sun","doi":"10.1016/j.jisa.2025.104320","DOIUrl":"10.1016/j.jisa.2025.104320","url":null,"abstract":"<div><div>Data sharing is pivotal in sectors such as healthcare, finance, and social networking. Encrypting sensitive data, while essential for privacy protection, introduces complexity to data sharing and poses privacy risks when leveraging cloud servers. Blockchain-based searchable encryption offers a balance between privacy preservation and data availability; however, user anonymity remains a significant concern. Traditional storage systems, which rely on centralized servers, limit data stability and scalability. To address these challenges, we have introduced BISE, a solution that leverages the power of blockchain to achieve data integrity, using searchable encryption for secure searches and IPFS for decentralized storage. Constructed on Hyperledger Fabric and IPFS, our system demonstrates efficiency through simulations. This integrated approach ensures data privacy, integrity, and availability, with efficient updates and queries, making it a robust solution for sensitive data sharing in various domains.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"97 ","pages":"Article 104320"},"PeriodicalIF":3.7,"publicationDate":"2026-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145685936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LTRAA: Lightweight and transparent remote attestation with anonymity LTRAA:轻量级、透明的远程匿名认证
IF 3.7 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-03-01 Epub Date: 2025-12-27 DOI: 10.1016/j.jisa.2025.104352
Tao Shen , Zikang Wang , Xianlin Yang , Fenhua Bai , Kai Zeng , Chi Zhang , Bei Gong
The development of Internet of Things (IoT) technology is accompanied by security concerns. Remote attestation is an essential technique for ensuring the software integrity of IoT devices. However, most existing remote attestation schemes rely on the assumption that the verifier is trusted, and the assumption of pre-shared keys or other secrets, meaning that the verifier and prover need to be mutually known and able to communicate directly. However, in dynamic and asynchronous networks, such as publish/subscribe networks, these assumptions may not be realistic. In such environments, the prover and verifier have not pre-shared keys, software states, or other secrets, making it impossible to perform attestation. Additionally, public key encryption is expensive for resource-constrained IoT devices. Therefore, this paper proposes a Lightweight and Transparent Remote Attestation with Anonymity (LTRAA). It uses symmetric polynomials instead of public-key encryption for identity authentication. This method allows for the verification of software state and data attestation even when the verifier and prover are unfamiliar with each other, and it is both publicly and transparently verifiable. Moreover, it ensures bidirectional identity authentication for interacting parties under anonymity and traceability, without excessive overhead for resource-constrained devices. Performance experiments on a Raspberry Pi further show that the running overhead is the lowest compared to similar remote attestation schemes such as PROVE and SCRAPS.
物联网(IoT)技术的发展伴随着安全问题。远程认证是确保物联网设备软件完整性的重要技术。然而,大多数现有的远程认证方案依赖于验证者是可信的假设,以及预共享密钥或其他秘密的假设,这意味着验证者和证明者需要相互知道并能够直接通信。然而,在动态和异步网络中,例如发布/订阅网络,这些假设可能不现实。在这样的环境中,证明者和验证者没有预先共享密钥、软件状态或其他秘密,因此无法执行认证。此外,公钥加密对于资源受限的物联网设备来说是昂贵的。为此,本文提出了一种轻量级、透明的远程匿名认证(LTRAA)。它使用对称多项式代替公钥加密进行身份验证。这种方法允许在验证者和证明者彼此不熟悉的情况下验证软件状态和数据证明,并且它是公开和透明的可验证的。此外,它确保了交互各方在匿名和可追溯性下的双向身份认证,不会对资源受限的设备造成过大的开销。在Raspberry Pi上的性能实验进一步表明,与类似的远程认证方案(如PROVE和leftovers)相比,它的运行开销是最低的。
{"title":"LTRAA: Lightweight and transparent remote attestation with anonymity","authors":"Tao Shen ,&nbsp;Zikang Wang ,&nbsp;Xianlin Yang ,&nbsp;Fenhua Bai ,&nbsp;Kai Zeng ,&nbsp;Chi Zhang ,&nbsp;Bei Gong","doi":"10.1016/j.jisa.2025.104352","DOIUrl":"10.1016/j.jisa.2025.104352","url":null,"abstract":"<div><div>The development of Internet of Things (IoT) technology is accompanied by security concerns. Remote attestation is an essential technique for ensuring the software integrity of IoT devices. However, most existing remote attestation schemes rely on the assumption that the verifier is trusted, and the assumption of pre-shared keys or other secrets, meaning that the verifier and prover need to be mutually known and able to communicate directly. However, in dynamic and asynchronous networks, such as publish/subscribe networks, these assumptions may not be realistic. In such environments, the prover and verifier have not pre-shared keys, software states, or other secrets, making it impossible to perform attestation. Additionally, public key encryption is expensive for resource-constrained IoT devices. Therefore, this paper proposes a Lightweight and Transparent Remote Attestation with Anonymity (LTRAA). It uses symmetric polynomials instead of public-key encryption for identity authentication. This method allows for the verification of software state and data attestation even when the verifier and prover are unfamiliar with each other, and it is both publicly and transparently verifiable. Moreover, it ensures bidirectional identity authentication for interacting parties under anonymity and traceability, without excessive overhead for resource-constrained devices. Performance experiments on a Raspberry Pi further show that the running overhead is the lowest compared to similar remote attestation schemes such as PROVE and SCRAPS.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"97 ","pages":"Article 104352"},"PeriodicalIF":3.7,"publicationDate":"2026-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145841424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FedDNA: Behavioural based approach for byzantine defense in federated learning via model fingerprinting and adaptive thresholding 基于模型指纹和自适应阈值的联邦学习拜占庭防御行为方法
IF 3.7 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-03-01 Epub Date: 2026-01-02 DOI: 10.1016/j.jisa.2025.104358
Aditya Garg , Naman Bansal , Sumit Yadav , Nisha Kandhoul , Sanjay K. Dhurandher , Isaac Woungang
Federated Learning presents a distributed system approach that is capable of achieving higher pri- vacy and security guarantees by not sharing its local data. However, federated learning is vulnerable to Byzantine faults, where unreliable or malicious agents can disrupt the central aggregation process and degrade performance. Existing Byzantine-resilient algorithms often face challenges of lim- ited effectiveness under non-independent and identically distributed (non-IID) data distribution. This paper presents the FedDNA Algorithm, a novel adaptive aggregation algorithm that enhances robust- ness by focusing on the internal behaviour of client models rather than just their parameters. FedDNA is based on the concept of a model fingerprint, a unique signature of a machine learning model’s inter- but this manipulation will almost always cause a sudden, detectable change in the model’s internal computations, which is captured by the fingerprint. Another distinguishing feature of FedDNA is its adaptive threshold mechanism based on Median Absolute Deviation (MAD), which dynamically adjusts in response to the internal consistency of client updates, thereby enhancing the algorithm’s robustness against Byzantine behaviour. To evaluate the effectiveness of the proposed approach, an extensive feasibility study was conducted comparing it with existing algorithms. Experimental results indicate that FedDNA achieves good accuracy and stability under Byzantine attacks, outperforming state-of-the-art methods by effectively identifying and mitigating the influence of faulty nodes in both independent and identically distributed (IID) and non-independent and identically distributed (non-IID) data distributions.
联邦学习提出了一种分布式系统方法,能够通过不共享其本地数据来实现更高的隐私性和安全性保证。然而,联邦学习容易受到拜占庭错误的影响,其中不可靠或恶意的代理可能会破坏中心聚合过程并降低性能。现有的拜占庭弹性算法在非独立和同分布(non-IID)数据分布下常常面临有效性有限的挑战。本文提出了一种新的自适应聚合算法FedDNA算法,该算法通过关注客户端模型的内部行为而不仅仅是它们的参数来增强鲁棒性。FedDNA基于模型指纹的概念,这是机器学习模型内部的独特特征,但这种操作几乎总是会导致模型内部计算发生突然的、可检测的变化,这些变化会被指纹捕获。FedDNA的另一个显著特征是其基于中值绝对偏差(MAD)的自适应阈值机制,该机制根据客户端更新的内部一致性动态调整,从而增强了算法对拜占庭行为的鲁棒性。为了评估所提出方法的有效性,将其与现有算法进行了广泛的可行性研究。实验结果表明,FedDNA在拜占庭攻击下具有良好的准确性和稳定性,能够有效识别和减轻独立与同分布(IID)和非独立与同分布(non-IID)数据分布中故障节点的影响,优于现有方法。
{"title":"FedDNA: Behavioural based approach for byzantine defense in federated learning via model fingerprinting and adaptive thresholding","authors":"Aditya Garg ,&nbsp;Naman Bansal ,&nbsp;Sumit Yadav ,&nbsp;Nisha Kandhoul ,&nbsp;Sanjay K. Dhurandher ,&nbsp;Isaac Woungang","doi":"10.1016/j.jisa.2025.104358","DOIUrl":"10.1016/j.jisa.2025.104358","url":null,"abstract":"<div><div>Federated Learning presents a distributed system approach that is capable of achieving higher pri- vacy and security guarantees by not sharing its local data. However, federated learning is vulnerable to Byzantine faults, where unreliable or malicious agents can disrupt the central aggregation process and degrade performance. Existing Byzantine-resilient algorithms often face challenges of lim- ited effectiveness under non-independent and identically distributed (non-IID) data distribution. This paper presents the FedDNA Algorithm, a novel adaptive aggregation algorithm that enhances robust- ness by focusing on the internal behaviour of client models rather than just their parameters. FedDNA is based on the concept of a model fingerprint, a unique signature of a machine learning model’s inter- but this manipulation will almost always cause a sudden, detectable change in the model’s internal computations, which is captured by the fingerprint. Another distinguishing feature of FedDNA is its adaptive threshold mechanism based on Median Absolute Deviation (MAD), which dynamically adjusts in response to the internal consistency of client updates, thereby enhancing the algorithm’s robustness against Byzantine behaviour. To evaluate the effectiveness of the proposed approach, an extensive feasibility study was conducted comparing it with existing algorithms. Experimental results indicate that FedDNA achieves good accuracy and stability under Byzantine attacks, outperforming state-of-the-art methods by effectively identifying and mitigating the influence of faulty nodes in both independent and identically distributed (IID) and non-independent and identically distributed (non-IID) data distributions.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"97 ","pages":"Article 104358"},"PeriodicalIF":3.7,"publicationDate":"2026-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145884190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
γ-M2I: Image-based malware classification via feature spatial transformation γ-M2I:基于图像特征空间变换的恶意软件分类
IF 3.7 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-03-01 Epub Date: 2026-01-07 DOI: 10.1016/j.jisa.2025.104355
Wanhu Nie, Changsheng Zhu
In recent years, the surge in malware variants has made fast and accurate classification a critical cybersecurity challenge. Visualization-based deep learning methods offer promising solutions, among which the State Transition Probability Matrix (STPM) effectively reduces redundancy by modeling binaries as Markov chains. However, STPM is inherently a mathematical statistical model that disregards visual characteristics, resulting in Markov images with inherent flaws such as sparse pixel distribution and insufficient brightness. This paper reveals the fundamental conflict between mathematical semantics and visual perception requirements in STPM visualization and proposes a feature spatial transformation method, γ-M2I, for visual malware classification. The core idea of γ-M2I is to introduce a plug-and-play feature spatial transformation module into traditional STPM visualization schemes to mitigate its intrinsic visual limitations, utilizing spatial transformations (γ-mapping) to optimize feature distribution and enhance the representational capacity of feature maps. This stems from the feature space transformation’s ability to preserve low-frequency state transitions while relatively suppressing high-frequency noise. γ-M2I operates independently of STPM and can be seamlessly integrated into STPM-based frameworks and convolutional neural network architectures. This modular design supports rapid adaptation to advanced models. Extensive experiments conducted on benchmark malware classification datasets, including Malimg and BIG-2015, demonstrate that the proposed method achieves high accuracy rates of 99.82% and 99.46%, with F1-scores of 99.73% and 99.22%, respectively, outperforming existing state-of-the-art approaches. Moreover, it exhibits robustness against evasion techniques employed by malware variants, such as packing, encryption and obfuscation.
近年来,恶意软件变体的激增使得快速准确的分类成为一项关键的网络安全挑战。基于可视化的深度学习方法提供了很好的解决方案,其中状态转移概率矩阵(STPM)通过将二进制文件建模为马尔可夫链有效地减少了冗余。然而,STPM本质上是一种忽略视觉特征的数学统计模型,导致马尔可夫图像具有像素分布稀疏、亮度不足等固有缺陷。本文揭示了STPM可视化中数学语义与视觉感知需求之间的根本冲突,提出了一种用于可视化恶意软件分类的特征空间变换方法γ-M2I。γ-M2I的核心思想是在传统的STPM可视化方案中引入即插即用的特征空间转换模块,利用空间转换(γ映射)优化特征分布,增强特征映射的表示能力,以缓解其固有的视觉局限性。这源于特征空间变换在相对抑制高频噪声的同时保持低频状态转换的能力。γ-M2I独立于STPM工作,可以无缝集成到基于STPM的框架和卷积神经网络架构中。这种模块化设计支持快速适应先进的模型。在Malimg和BIG-2015等基准恶意软件分类数据集上进行的大量实验表明,该方法的准确率高达99.82%和99.46%,f1得分分别为99.73%和99.22%,优于现有的最先进方法。此外,它还展示了对恶意软件变体所采用的规避技术的鲁棒性,例如打包、加密和混淆。
{"title":"γ-M2I: Image-based malware classification via feature spatial transformation","authors":"Wanhu Nie,&nbsp;Changsheng Zhu","doi":"10.1016/j.jisa.2025.104355","DOIUrl":"10.1016/j.jisa.2025.104355","url":null,"abstract":"<div><div>In recent years, the surge in malware variants has made fast and accurate classification a critical cybersecurity challenge. Visualization-based deep learning methods offer promising solutions, among which the State Transition Probability Matrix (STPM) effectively reduces redundancy by modeling binaries as Markov chains. However, STPM is inherently a mathematical statistical model that disregards visual characteristics, resulting in Markov images with inherent flaws such as sparse pixel distribution and insufficient brightness. This paper reveals the fundamental conflict between mathematical semantics and visual perception requirements in STPM visualization and proposes a feature spatial transformation method, <em>γ</em>-M2I, for visual malware classification. The core idea of <em>γ</em>-M2I is to introduce a plug-and-play feature spatial transformation module into traditional STPM visualization schemes to mitigate its intrinsic visual limitations, utilizing spatial transformations (<em>γ</em>-mapping) to optimize feature distribution and enhance the representational capacity of feature maps. This stems from the feature space transformation’s ability to preserve low-frequency state transitions while relatively suppressing high-frequency noise. <em>γ</em>-M2I operates independently of STPM and can be seamlessly integrated into STPM-based frameworks and convolutional neural network architectures. This modular design supports rapid adaptation to advanced models. Extensive experiments conducted on benchmark malware classification datasets, including Malimg and BIG-2015, demonstrate that the proposed method achieves high accuracy rates of 99.82% and 99.46%, with <em>F</em><sub>1</sub>-scores of 99.73% and 99.22%, respectively, outperforming existing state-of-the-art approaches. Moreover, it exhibits robustness against evasion techniques employed by malware variants, such as packing, encryption and obfuscation.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"97 ","pages":"Article 104355"},"PeriodicalIF":3.7,"publicationDate":"2026-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145926053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing large language models: A quantitative assurance framework approach 保护大型语言模型:一种定量保证框架方法
IF 3.7 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-03-01 Epub Date: 2025-12-20 DOI: 10.1016/j.jisa.2025.104351
Sander Stamnes Karlsen , Muhammad Mudassar Yamin , Ehtesham Hashmi , Basel Katt , Mohib Ullah
Large Language Models (LLMs) are increasingly integrated into sensitive domains such as healthcare and autonomous systems, yet adoption is constrained by security risks that conventional assurance methods do not capture. Traditional software assurance techniques are inadequate for LLM-specific vulnerabilities, including prompt injection, insecure output handling, and training data poisoning. We introduce a quantitative security assurance framework for LLM applications that translates security requirements and vulnerabilities into measurable scores. The framework computes an Assurance Metric (AM) as AM=RMVM, where VM is weighted using CVSS v4.0, and maps results to five security assurance levels, making security posture comparable, auditable, and actionable. Requirements span input/output validation, training data, development and deployment, access control, third-party services, and security procedures; vulnerability tests align with the OWASP Top 10 for LLMs (prompt injection, insecure output handling, training data poisoning, denial of service, sensitive information disclosure, overreliance, and model theft). Case study results show uncensored models (e.g., Llama2-uncensored) exhibit significantly higher exposure, especially to prompt injection and output-handling attacks–while censored and fine-tuned models attain higher assurance levels. Significance and impact: the framework provides transparent, quantitative scoring to compare systems, prioritize mitigations, and support evidence-based deployment and governance in high-takes environments, with continuous human oversight emphasized.
大型语言模型(llm)越来越多地集成到医疗保健和自治系统等敏感领域,但其采用受到传统保证方法无法捕获的安全风险的限制。传统的软件保证技术不足以解决llm特定的漏洞,包括提示注入、不安全的输出处理和训练数据中毒。我们为LLM应用程序引入了一个定量的安全保证框架,将安全需求和漏洞转换为可测量的分数。该框架计算保证度量(AM)为AM=RM - VM,其中VM使用CVSS v4.0进行加权,并将结果映射到五个安全保证级别,使安全状态具有可比性,可审计性和可操作性。需求涵盖输入/输出验证、培训数据、开发和部署、访问控制、第三方服务和安全过程;漏洞测试与OWASP十大llm漏洞(提示注入、不安全的输出处理、训练数据中毒、拒绝服务、敏感信息泄露、过度依赖和模型盗窃)保持一致。案例研究结果表明,未经审查的模型(例如,llama2 - uncensorship)表现出明显更高的风险,特别是对提示注入和输出处理攻击,而审查和微调的模型获得更高的保证级别。重要性和影响:该框架提供透明、定量的评分,以比较系统、优先考虑缓解措施,并支持在高需求环境中基于证据的部署和治理,强调持续的人为监督。
{"title":"Securing large language models: A quantitative assurance framework approach","authors":"Sander Stamnes Karlsen ,&nbsp;Muhammad Mudassar Yamin ,&nbsp;Ehtesham Hashmi ,&nbsp;Basel Katt ,&nbsp;Mohib Ullah","doi":"10.1016/j.jisa.2025.104351","DOIUrl":"10.1016/j.jisa.2025.104351","url":null,"abstract":"<div><div>Large Language Models (LLMs) are increasingly integrated into sensitive domains such as healthcare and autonomous systems, yet adoption is constrained by security risks that conventional assurance methods do not capture. Traditional software assurance techniques are inadequate for LLM-specific vulnerabilities, including prompt injection, insecure output handling, and training data poisoning. We introduce a quantitative security assurance framework for LLM applications that translates security requirements and vulnerabilities into measurable scores. The framework computes an Assurance Metric (AM) as <span><math><mrow><mi>A</mi><mi>M</mi><mo>=</mo><mi>R</mi><mi>M</mi><mo>−</mo><mi>V</mi><mi>M</mi></mrow></math></span>, where VM is weighted using CVSS v4.0, and maps results to five security assurance levels, making security posture comparable, auditable, and actionable. Requirements span input/output validation, training data, development and deployment, access control, third-party services, and security procedures; vulnerability tests align with the OWASP Top 10 for LLMs (prompt injection, insecure output handling, training data poisoning, denial of service, sensitive information disclosure, overreliance, and model theft). Case study results show uncensored models (e.g., Llama2-uncensored) exhibit significantly higher exposure, especially to prompt injection and output-handling attacks–while censored and fine-tuned models attain higher assurance levels. Significance and impact: the framework provides transparent, quantitative scoring to compare systems, prioritize mitigations, and support evidence-based deployment and governance in high-takes environments, with continuous human oversight emphasized.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"97 ","pages":"Article 104351"},"PeriodicalIF":3.7,"publicationDate":"2026-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145790944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-based proxy broadcast signcryption supporting multi-message synchronous transmission suitable for cross-institutional EHRs sharing system 基于区块链的代理广播签名加密,支持多消息同步传输,适用于跨机构电子病历共享系统
IF 3.7 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-03-01 Epub Date: 2025-12-20 DOI: 10.1016/j.jisa.2025.104349
Yan Gao , Lunzhi Deng , Yaying Wu , Na Wang , Huawei Huang , Siwei Li
In the modern healthcare system, patients’ electronic health records (EHRs) often need to be shared among various medical institutions to support continuous treatment and cross-institutional collaboration. To maintain the confidentiality and authenticity of medical data, improve data-sharing efficiency, and restrict each institution’s access to only its relevant data, a signcryption scheme capable of simultaneously signcrypting distinct EHRs for multiple receivers is an efficient solution for secure cross-institutional data sharing. This paper introduces a blockchain-based proxy broadcast signcryption (PBSC) scheme supporting multi-message synchronous transmission. In our work, patients delegate their signcryption rights to a trusted proxy medical institution, which signcrypts distinct plaintexts into a single ciphertext and stores the ciphertext off-chain. To enforce secure access, we design a blockchain-based access control mechanism, allowing only authorized users to retrieve and decrypt the off-chain ciphertext. Under the random oracle model, we prove the proposed PBSC scheme is confidential and unforgeable. Comparative analysis shows our scheme reduces computational costs by 50 % versus existing state-of-the-art schemes, thus rendering it highly suitable for secure EHRs sharing.
在现代医疗保健系统中,患者的电子健康记录(EHRs)往往需要在不同的医疗机构之间共享,以支持持续治疗和跨机构协作。为了保持医疗数据的机密性和真实性,提高数据共享效率,并限制每个机构只能访问其相关数据,能够同时为多个接收者对不同的电子病历进行签名加密的签名加密方案是安全跨机构数据共享的有效解决方案。介绍了一种支持多消息同步传输的基于区块链的代理广播签名加密(PBSC)方案。在我们的工作中,患者将其签名加密权委托给可信任的代理医疗机构,该代理医疗机构将不同的明文签名为单个密文,并将密文存储在链下。为了加强安全访问,我们设计了一个基于区块链的访问控制机制,只允许授权用户检索和解密链外密文。在随机oracle模型下,我们证明了所提出的PBSC方案具有保密性和不可伪造性。对比分析表明,我们的方案比现有的最先进的方案减少了50%的计算成本,因此非常适合安全的电子病历共享。
{"title":"Blockchain-based proxy broadcast signcryption supporting multi-message synchronous transmission suitable for cross-institutional EHRs sharing system","authors":"Yan Gao ,&nbsp;Lunzhi Deng ,&nbsp;Yaying Wu ,&nbsp;Na Wang ,&nbsp;Huawei Huang ,&nbsp;Siwei Li","doi":"10.1016/j.jisa.2025.104349","DOIUrl":"10.1016/j.jisa.2025.104349","url":null,"abstract":"<div><div>In the modern healthcare system, patients’ electronic health records (EHRs) often need to be shared among various medical institutions to support continuous treatment and cross-institutional collaboration. To maintain the confidentiality and authenticity of medical data, improve data-sharing efficiency, and restrict each institution’s access to only its relevant data, a signcryption scheme capable of simultaneously signcrypting distinct EHRs for multiple receivers is an efficient solution for secure cross-institutional data sharing. This paper introduces a blockchain-based proxy broadcast signcryption (PBSC) scheme supporting multi-message synchronous transmission. In our work, patients delegate their signcryption rights to a trusted proxy medical institution, which signcrypts distinct plaintexts into a single ciphertext and stores the ciphertext off-chain. To enforce secure access, we design a blockchain-based access control mechanism, allowing only authorized users to retrieve and decrypt the off-chain ciphertext. Under the random oracle model, we prove the proposed PBSC scheme is confidential and unforgeable. Comparative analysis shows our scheme reduces computational costs by 50 % versus existing state-of-the-art schemes, thus rendering it highly suitable for secure EHRs sharing.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"97 ","pages":"Article 104349"},"PeriodicalIF":3.7,"publicationDate":"2026-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145790945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Knit scrambling: A novel image scrambling framework and its demonstration in image encryption 编织置乱:一种新的图像置乱框架及其在图像加密中的应用
IF 3.7 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-03-01 Epub Date: 2025-12-15 DOI: 10.1016/j.jisa.2025.104326
Muhammed Saadetdin KAYA , Kenan İNCE
The exponential growth of visual data and the expansion of resource-constrained IoT platforms have intensified the demand for lightweight yet secure image protection schemes. Conventional ciphers, while cryptographically strong, often fail to meet real-time and hardware-efficiency requirements for image data. To address this gap, this study presents the Knit Scrambling (KS) framework, a textile-inspired deterministic permutation framework designed for reversible image scrambling with linear computational cost. This approach models an image as a sequence interwoven from multiple subsequences following cyclic knitting patterns, ensuring both reversibility and high diffusion. A specific instantiation, termed Triple Check Pattern (TCP), realizes the KS framework by dividing the image into three subsequences and applying cyclic pattern rotations to enhance pixel decorrelation while preserving strict invertibility. The confusion process is integrated with a lightweight diffusion stage based on a key-nonce-derived chaotic keystream generated by a one-dimensional logistic map, eliminating plaintext dependence and enabling per-image uniqueness. Experimental analyses conducted on benchmark color images show near-uniform histograms, high entropy close to eight bits, and strong differential performance, with average NPCR around 99.6 percent and UACI approximately 33.5 percent. Statistical randomness evaluation using the NIST SP 800-22 test suite confirms the scheme’s ability to produce unpredictable ciphertexts, while runtime benchmarking on both desktop and embedded-class hardware demonstrates real-time feasibility. The results indicate that the proposed framework provides an effective and hardware-efficient alternative to existing chaos-based and geometric scrambling approaches for lightweight image encryption in IoT environments. The proposed framework (KS) defines a general textile-inspired permutation model, while its implementation through the TCP algorithm demonstrates how this model can be practically realized to achieve efficient and reversible image scrambling.
视觉数据的指数级增长和资源受限的物联网平台的扩展加剧了对轻量级但安全的图像保护方案的需求。传统的密码虽然密码学很强,但往往不能满足图像数据的实时性和硬件效率要求。为了解决这一差距,本研究提出了针织置乱(KS)框架,这是一种受纺织品启发的确定性排列框架,设计用于具有线性计算成本的可逆图像置乱。这种方法将图像建模为由多个子序列按照循环编织模式交织而成的序列,确保了可逆性和高扩散性。一个具体的实例,称为三重检查模式(TCP),通过将图像划分为三个子序列并应用循环模式旋转来实现KS框架,以增强像素去相关,同时保持严格的可逆性。混淆过程与基于一维逻辑映射生成的键非派生混沌密钥流的轻量级扩散阶段相集成,消除了明文依赖并实现了每个图像的唯一性。对基准彩色图像进行的实验分析显示,直方图接近均匀,高熵接近8位,差异性能强,平均NPCR约为99.6%,UACI约为33.5%。使用NIST SP 800-22测试套件的统计随机性评估证实了该方案产生不可预测的密文的能力,而在桌面和嵌入式类硬件上的运行时基准测试证明了实时可行性。结果表明,所提出的框架为物联网环境中的轻量级图像加密提供了一种有效且硬件效率高的替代方案,可以替代现有的基于混沌和几何置乱的方法。提出的框架(KS)定义了一个通用的纺织品启发的排列模型,而通过TCP算法的实现演示了该模型如何实际实现,以实现高效和可逆的图像置乱。
{"title":"Knit scrambling: A novel image scrambling framework and its demonstration in image encryption","authors":"Muhammed Saadetdin KAYA ,&nbsp;Kenan İNCE","doi":"10.1016/j.jisa.2025.104326","DOIUrl":"10.1016/j.jisa.2025.104326","url":null,"abstract":"<div><div>The exponential growth of visual data and the expansion of resource-constrained IoT platforms have intensified the demand for lightweight yet secure image protection schemes. Conventional ciphers, while cryptographically strong, often fail to meet real-time and hardware-efficiency requirements for image data. To address this gap, this study presents the Knit Scrambling (KS) framework, a textile-inspired deterministic permutation framework designed for reversible image scrambling with linear computational cost. This approach models an image as a sequence interwoven from multiple subsequences following cyclic knitting patterns, ensuring both reversibility and high diffusion. A specific instantiation, termed Triple Check Pattern (TCP), realizes the KS framework by dividing the image into three subsequences and applying cyclic pattern rotations to enhance pixel decorrelation while preserving strict invertibility. The confusion process is integrated with a lightweight diffusion stage based on a key-nonce-derived chaotic keystream generated by a one-dimensional logistic map, eliminating plaintext dependence and enabling per-image uniqueness. Experimental analyses conducted on benchmark color images show near-uniform histograms, high entropy close to eight bits, and strong differential performance, with average NPCR around 99.6 percent and UACI approximately 33.5 percent. Statistical randomness evaluation using the NIST SP 800-22 test suite confirms the scheme’s ability to produce unpredictable ciphertexts, while runtime benchmarking on both desktop and embedded-class hardware demonstrates real-time feasibility. The results indicate that the proposed framework provides an effective and hardware-efficient alternative to existing chaos-based and geometric scrambling approaches for lightweight image encryption in IoT environments. The proposed framework (KS) defines a general textile-inspired permutation model, while its implementation through the TCP algorithm demonstrates how this model can be practically realized to achieve efficient and reversible image scrambling.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"97 ","pages":"Article 104326"},"PeriodicalIF":3.7,"publicationDate":"2026-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145791475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Malicious secure lightweight private set intersection 恶意安全轻量级私有集交集
IF 3.7 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-03-01 Epub Date: 2025-12-27 DOI: 10.1016/j.jisa.2025.104342
Duobin Lyu , Jinsong Wang , Zening Zhao , Zhao Zhao
This paper presents a novel Malicious Secure Private Set Intersection (MSL-PSI) protocol that is lightweight in communication that leverages polynomials and Bloom filters for efficient privacy-preserving set intersection. The protocol requires only a single round of symmetric communication, where both parties simultaneously obtain the intersection result without additional sharing. Under the Universal Composability (UC) framework, MSL-PSI is proven secure against malicious adversaries. Experimental results demonstrate superior performance on small-scale datasets compared to state-of-the-art methods, with significantly lower communication overhead. The protocol’s Bloom filter-based design enables dynamic updates and scalability, making it suitable for applications like privacy-preserving data analysis and contact tracing, particularly in communication-constrained environments.
本文提出了一种新的恶意安全私有集交集(MSL-PSI)协议,该协议利用多项式和Bloom过滤器实现高效的隐私保护集合交集。该协议只需要单轮对称通信,双方同时获得交集结果,无需额外共享。在通用可组合性(UC)框架下,MSL-PSI被证明对恶意对手是安全的。实验结果表明,与最先进的方法相比,在小规模数据集上具有优越的性能,并且通信开销显着降低。该协议基于Bloom过滤器的设计支持动态更新和可扩展性,使其适用于隐私保护数据分析和接触追踪等应用,特别是在通信受限的环境中。
{"title":"Malicious secure lightweight private set intersection","authors":"Duobin Lyu ,&nbsp;Jinsong Wang ,&nbsp;Zening Zhao ,&nbsp;Zhao Zhao","doi":"10.1016/j.jisa.2025.104342","DOIUrl":"10.1016/j.jisa.2025.104342","url":null,"abstract":"<div><div>This paper presents a novel Malicious Secure Private Set Intersection (MSL-PSI) protocol that is lightweight in communication that leverages polynomials and Bloom filters for efficient privacy-preserving set intersection. The protocol requires only a single round of symmetric communication, where both parties simultaneously obtain the intersection result without additional sharing. Under the Universal Composability (UC) framework, MSL-PSI is proven secure against malicious adversaries. Experimental results demonstrate superior performance on small-scale datasets compared to state-of-the-art methods, with significantly lower communication overhead. The protocol’s Bloom filter-based design enables dynamic updates and scalability, making it suitable for applications like privacy-preserving data analysis and contact tracing, particularly in communication-constrained environments.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"97 ","pages":"Article 104342"},"PeriodicalIF":3.7,"publicationDate":"2026-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145841425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy-aware video deanonymization: a configurable pipeline for selective reversal with intelligibility preservation 隐私意识视频去匿名化:一个可配置的管道选择性反转与可理解性保存
IF 3.7 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-03-01 Epub Date: 2026-01-16 DOI: 10.1016/j.jisa.2025.104367
Vasco Simões , João Garcia , Paulo Carreira
The emergence of Computer Vision (CV) in self-driving vehicles, smart retail, and safety monitoring provides substantial economic benefits. However, it also presents significant privacy concerns for individuals captured on video. Standard techniques to mitigate privacy threats in video processing require some form of video anonymization, such as using blurring or other obfuscation operations to redact human figures from the input data before processing or storage. Yet, the irreversible nature of redaction operations hinders the use of CV in valuable applications, such as quality assurance, safety, or fraud litigation.
This paper presents and validates a novel approach for video anonymization that guarantees the anonymity and security of human subjects appearing in the video while maintaining high levels of scene intelligibility. Our approach is based on per-subject episodic key-derived cryptography to securely store data of individuals and enable selective per-subject deanonymization. In this way we can create video streams wherein only consenting subjects can be re-identified. Moreover, our approach can be integrated into CV processing pipelines and, as we also demonstrate, allow for the interchangeability of the visual anonymization techniques, which deliver various degrees of anonymity according to application needs while maintaining significant intelligibility and preserving the scene integrity.
计算机视觉(CV)在自动驾驶汽车、智能零售和安全监控方面的出现提供了巨大的经济效益。然而,这也给被视频捕获的个人带来了严重的隐私问题。缓解视频处理中隐私威胁的标准技术需要某种形式的视频匿名化,例如在处理或存储之前使用模糊或其他混淆操作从输入数据中编辑人物形象。然而,编校操作的不可逆性质阻碍了CV在有价值的应用中的使用,例如质量保证、安全或欺诈诉讼。本文提出并验证了一种新的视频匿名化方法,该方法保证了视频中出现的人类受试者的匿名性和安全性,同时保持了高水平的场景可理解性。我们的方法是基于每个主题的情景密钥派生加密,以安全地存储个人数据,并实现选择性的每个主题去匿名化。通过这种方式,我们可以创建视频流,其中只有同意的主体才能被重新识别。此外,我们的方法可以集成到CV处理管道中,并且,正如我们所展示的,允许视觉匿名化技术的互换性,根据应用需要提供不同程度的匿名,同时保持显著的可理解性和保持场景完整性。
{"title":"Privacy-aware video deanonymization: a configurable pipeline for selective reversal with intelligibility preservation","authors":"Vasco Simões ,&nbsp;João Garcia ,&nbsp;Paulo Carreira","doi":"10.1016/j.jisa.2025.104367","DOIUrl":"10.1016/j.jisa.2025.104367","url":null,"abstract":"<div><div>The emergence of Computer Vision (CV) in self-driving vehicles, smart retail, and safety monitoring provides substantial economic benefits. However, it also presents significant privacy concerns for individuals captured on video. Standard techniques to mitigate privacy threats in video processing require some form of video anonymization, such as using blurring or other obfuscation operations to redact human figures from the input data before processing or storage. Yet, the irreversible nature of redaction operations hinders the use of CV in valuable applications, such as quality assurance, safety, or fraud litigation.</div><div>This paper presents and validates a novel approach for video anonymization that guarantees the anonymity and security of human subjects appearing in the video while maintaining high levels of scene intelligibility. Our approach is based on per-subject episodic key-derived cryptography to securely store data of individuals and enable selective per-subject deanonymization. In this way we can create video streams wherein only consenting subjects can be re-identified. Moreover, our approach can be integrated into CV processing pipelines and, as we also demonstrate, allow for the interchangeability of the visual anonymization techniques, which deliver various degrees of anonymity according to application needs while maintaining significant intelligibility and preserving the scene integrity.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"97 ","pages":"Article 104367"},"PeriodicalIF":3.7,"publicationDate":"2026-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145977325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lattice-based puncturable attribute-based proxy re-encryption scheme in cloud computing 云计算中基于格的可穿透属性代理重加密方案
IF 3.7 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-03-01 Epub Date: 2025-12-05 DOI: 10.1016/j.jisa.2025.104325
Mengdi Zhao, Huiyan Chen, Xi Lin
Governmental and military organizations frequently manage sensitive documents that require both secure distribution and long-term preservation. These documents are typically encrypted and disseminated across multiple departments or agencies under access policies. To ensure confidentiality and accountability, attribute-based proxy re-encryption (ABPRE) allows flexible one-to-many data sharing. However, once receivers’ keys are exposed, unauthorized decryption of historical ciphertexts becomes possible, creating severe risks to national security and organizational integrity. The central challenge lies in reconciling document archiving with effective protection against post-compromise leakage. To tackle this issue, we present a lattice-based puncturable key-policy attribute-based proxy re-encryption (P-KP-ABPRE) scheme. In our design, recipients may autonomously revoke decryption capability for specific tags, thereby revoking access to selected ciphertexts without requiring data owner involvement or global re-encryption. This recipient-driven revocation mechanism not only achieves forward security but also reduces system overhead while preserving the reusability of ciphertexts. Built upon the learning with errors (LWE) assumption, our scheme supports multi-bit encryption, and demonstrates security against quantum attacks and chosen-plaintext attacks (CPA).
政府和军事组织经常管理需要安全分发和长期保存的敏感文件。这些文档通常是加密的,并根据访问策略在多个部门或机构之间传播。为了确保机密性和可问责性,基于属性的代理重加密(ABPRE)允许灵活的一对多数据共享。然而,一旦接收者的密钥被暴露,就有可能对历史密文进行未经授权的解密,从而对国家安全和组织完整性造成严重威胁。核心的挑战在于协调文件存档与有效防止泄漏后的保护。为了解决这个问题,我们提出了一种基于格子的可穿透密钥策略属性的代理重加密方案(P-KP-ABPRE)。在我们的设计中,接收者可以自主撤销特定标签的解密能力,从而撤销对选定密文的访问,而不需要数据所有者参与或全局重新加密。这种由接收方驱动的撤销机制不仅实现了前向安全性,而且在保证密文可重用性的同时降低了系统开销。基于错误学习(LWE)假设,我们的方案支持多比特加密,并演示了对量子攻击和选择明文攻击(CPA)的安全性。
{"title":"Lattice-based puncturable attribute-based proxy re-encryption scheme in cloud computing","authors":"Mengdi Zhao,&nbsp;Huiyan Chen,&nbsp;Xi Lin","doi":"10.1016/j.jisa.2025.104325","DOIUrl":"10.1016/j.jisa.2025.104325","url":null,"abstract":"<div><div>Governmental and military organizations frequently manage sensitive documents that require both secure distribution and long-term preservation. These documents are typically encrypted and disseminated across multiple departments or agencies under access policies. To ensure confidentiality and accountability, attribute-based proxy re-encryption (ABPRE) allows flexible one-to-many data sharing. However, once receivers’ keys are exposed, unauthorized decryption of historical ciphertexts becomes possible, creating severe risks to national security and organizational integrity. The central challenge lies in reconciling document archiving with effective protection against post-compromise leakage. To tackle this issue, we present a lattice-based puncturable key-policy attribute-based proxy re-encryption (P-KP-ABPRE) scheme. In our design, recipients may autonomously revoke decryption capability for specific tags, thereby revoking access to selected ciphertexts without requiring data owner involvement or global re-encryption. This recipient-driven revocation mechanism not only achieves forward security but also reduces system overhead while preserving the reusability of ciphertexts. Built upon the learning with errors (LWE) assumption, our scheme supports multi-bit encryption, and demonstrates security against quantum attacks and chosen-plaintext attacks (CPA).</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"97 ","pages":"Article 104325"},"PeriodicalIF":3.7,"publicationDate":"2026-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145685937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Information Security and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1