首页 > 最新文献

Journal of Information Security and Applications最新文献

英文 中文
ABA-LEP: Autonomous Bidirectional Authentication and Lightweight Encryption Protocol for drones under ARM architecture ARM架构下无人机自主双向认证和轻量级加密协议ABA-LEP
IF 3.7 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-10-16 DOI: 10.1016/j.jisa.2025.104268
Qian Zhou , Jiayang Wu , Weizhi Meng
Secure communication protocols for drones are crucial in ensuring safety in potentially threatening network environments. However, existing protocols often suffer from weak autonomy, lack of optimization for ARM architecture, and inefficient utilization of lightweight cryptographic algorithms. To address these issues, this paper designs and analyzes an Autonomous Bidirectional Authentication and Lightweight Encryption Protocol (ABA-LEP) for drones under ARM architecture. The protocol optimizes the fixed-point scalar multiplication in SM2 for ARM architecture to accelerate authentication and key agreement efficiency, and employs simple operations like one-time pad limited XOR for lightweight secure communication encryption. Experiments conducted on the ARM Cortex M-4 based CrazyFlie 2.1 drone demonstrate that, in resource-constrained environments, the ABA-LEP achieves a performance improvement of up to 80.18% in fixed-point scalar multiplication with a 256-bit operand, compared to existing techniques. Additionally, the number of transmitted messages per unit time increases by up to 97.02%. The protocol’s resilience against multiple types of attacks has also been verified using the formal verification tool ProVerif.
无人机的安全通信协议对于确保潜在威胁网络环境中的安全至关重要。然而,现有协议往往存在自主性弱、缺乏针对ARM架构的优化、轻量级加密算法利用率低等问题。为了解决这些问题,本文设计并分析了ARM架构下无人机自主双向认证和轻量级加密协议(ABA-LEP)。该协议针对ARM架构优化了SM2中的定点标量乘法,提高了身份验证和密钥协议效率,并采用一次性pad限制XOR等简单操作实现轻量级安全通信加密。在基于ARM Cortex M-4的crazyfly 2.1无人机上进行的实验表明,在资源受限的环境下,与现有技术相比,ABA-LEP在256位操作数的定点标量乘法中实现了高达80.18%的性能提升。此外,单位时间内传输的消息数量增加了97.02%。该协议对多种类型攻击的弹性也已使用正式验证工具ProVerif进行了验证。
{"title":"ABA-LEP: Autonomous Bidirectional Authentication and Lightweight Encryption Protocol for drones under ARM architecture","authors":"Qian Zhou ,&nbsp;Jiayang Wu ,&nbsp;Weizhi Meng","doi":"10.1016/j.jisa.2025.104268","DOIUrl":"10.1016/j.jisa.2025.104268","url":null,"abstract":"<div><div>Secure communication protocols for drones are crucial in ensuring safety in potentially threatening network environments. However, existing protocols often suffer from weak autonomy, lack of optimization for ARM architecture, and inefficient utilization of lightweight cryptographic algorithms. To address these issues, this paper designs and analyzes an Autonomous Bidirectional Authentication and Lightweight Encryption Protocol (ABA-LEP) for drones under ARM architecture. The protocol optimizes the fixed-point scalar multiplication in SM2 for ARM architecture to accelerate authentication and key agreement efficiency, and employs simple operations like one-time pad limited XOR for lightweight secure communication encryption. Experiments conducted on the ARM Cortex M-4 based CrazyFlie 2.1 drone demonstrate that, in resource-constrained environments, the ABA-LEP achieves a performance improvement of up to 80.18% in fixed-point scalar multiplication with a 256-bit operand, compared to existing techniques. Additionally, the number of transmitted messages per unit time increases by up to 97.02%. The protocol’s resilience against multiple types of attacks has also been verified using the formal verification tool ProVerif.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"95 ","pages":"Article 104268"},"PeriodicalIF":3.7,"publicationDate":"2025-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145334788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient U-shape invertible neural network for large-capacity image steganography 大容量图像隐写的高效u型可逆神经网络
IF 3.7 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-10-15 DOI: 10.1016/j.jisa.2025.104237
Le Zhang , Tong Li , Yao Lu , Yuanrong Xu , Guangming Lu
Image steganography ensures covert communication by hiding secret information within cover images. The existing low-capacity steganography methods achieve satisfactory performances when hiding limited binary information within a cover image. However, it is still a challenge to recover high-quality revealed secret images from highly secure stego images with limited computational cost for large-capacity image steganography. This paper proposes an Efficient U-shape Invertible Neural Network (EUIN-Net) for large-capacity image steganography. Due to the gradual fusion and separation properties of the U-shape invertible mechanism, our EUIN-Net comprehensively fuses the secret and cover images on different scales and depths in the forward hiding process. Besides, the proposed EUIN-Net also maintains the independence of the cover and secret information in the backward revealing process. Moreover, the long-range dependency can be retrieved through using the skip connections between each pair U-shape invertible blocks. The above factors can drive our EUIN-Net to promote the quality of stego and revealed secret images. Furthermore, the shared and multi-scale characteristics of the U-shaped invertible blocks during the hiding and revealing stages contribute to significant reductions of our EUIN-Net in the model size, Flops, and GPU Memory occupancies. Extensive experiments demonstrate that the proposed EUIN-Net can achieve satisfactory performances with limited computational cost for large-capacity image steganography.
图像隐写术通过在封面图像中隐藏秘密信息来确保秘密通信。现有的低容量隐写方法可以在封面图像中隐藏有限的二进制信息,达到令人满意的效果。然而,对于大容量图像隐写来说,如何在计算成本有限的情况下,从高度安全的隐写图像中恢复高质量的暴露秘密图像仍然是一个挑战。提出了一种高效的u形可逆神经网络(EUIN-Net)用于大容量图像隐写。由于u型可逆机制的渐进融合和分离特性,我们的EUIN-Net在前向隐藏过程中全面融合了不同尺度和深度的秘密和掩盖图像。此外,所提出的EUIN-Net在反向揭示过程中还保持了掩护信息和秘密信息的独立性。此外,还可以利用u型可逆块对之间的跳变连接来获取远程依赖关系。上述因素可以推动我们的EUIN-Net提高隐去和揭露秘密图像的质量。此外,u形可逆块在隐藏和显示阶段的共享和多尺度特征有助于显著减少我们的EUIN-Net在模型尺寸、Flops和GPU内存占用方面的性能。大量实验表明,本文提出的EUIN-Net可以在有限的计算成本下获得令人满意的大容量图像隐写性能。
{"title":"Efficient U-shape invertible neural network for large-capacity image steganography","authors":"Le Zhang ,&nbsp;Tong Li ,&nbsp;Yao Lu ,&nbsp;Yuanrong Xu ,&nbsp;Guangming Lu","doi":"10.1016/j.jisa.2025.104237","DOIUrl":"10.1016/j.jisa.2025.104237","url":null,"abstract":"<div><div>Image steganography ensures covert communication by hiding secret information within cover images. The existing low-capacity steganography methods achieve satisfactory performances when hiding limited binary information within a cover image. However, it is still a challenge to recover high-quality revealed secret images from highly secure stego images with limited computational cost for large-capacity image steganography. This paper proposes an Efficient U-shape Invertible Neural Network (EUIN-Net) for large-capacity image steganography. Due to the gradual fusion and separation properties of the U-shape invertible mechanism, our EUIN-Net comprehensively fuses the secret and cover images on different scales and depths in the forward hiding process. Besides, the proposed EUIN-Net also maintains the independence of the cover and secret information in the backward revealing process. Moreover, the long-range dependency can be retrieved through using the skip connections between each pair U-shape invertible blocks. The above factors can drive our EUIN-Net to promote the quality of stego and revealed secret images. Furthermore, the shared and multi-scale characteristics of the U-shaped invertible blocks during the hiding and revealing stages contribute to significant reductions of our EUIN-Net in the model size, Flops, and GPU Memory occupancies. Extensive experiments demonstrate that the proposed EUIN-Net can achieve satisfactory performances with limited computational cost for large-capacity image steganography.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"94 ","pages":"Article 104237"},"PeriodicalIF":3.7,"publicationDate":"2025-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145324330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A real-time automated attack-defense graph generation approach 一种实时自动攻击防御图生成方法
IF 3.7 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-10-15 DOI: 10.1016/j.jisa.2025.104266
Kéren A. Saint-Hilaire , Christopher Neal , Frédéric Cuppens , Nora Boulahia-Cuppens , Francesca Bassi , Makhlouf Hadji
With the increase in cyberattacks, developing appropriate strategies to mitigate and prevent them is essential. In the literature, tools exist that either help prevent or mitigate them. Attack graphs help define mitigation strategies because they help represent and visualize the attacker’s position on a system. However, the mitigation actions are not instantiated on the attack graph. This paper proposes an approach to generate an automated attack-defense graph based on real-time monitored system alerts and an extensive and comprehensive state-of-the-art review. We propose to enrich logical attack graphs generated by a logical reasoner. The enrichment process is possible thanks to a vulnerability ontology that infers additional impacts for an exploited vulnerability. We propose a countermeasure selection approach based on graph matching to generate an optimal Incident Response (IR) playbook. We propose instantiating the generated playbook’s IR actions to get an attack-defense graph in real-time. This instantiation is done thanks to anti-correlation. The anti-correlation ensures that the countermeasures are instantiated on the appropriate attack graph nodes. Only the IR actions whose execution can be launched automatically are applied. We validate our approach using two use-case scenarios that target critical industrial infrastructures. We analyze the countermeasures instantiated on the attack graphs for the scenarios that can achieve the attack goal. We evaluated the approach concerning the security relevance of instantiated countermeasures in attack graphs for several attack paths. The countermeasures instantiated on a node are always relevant to the attacker’s action represented by this node. We also evaluate the approach regarding time performance, considering several situations for the use-case scenarios. The generation time depends on the number of vulnerabilities involved in the scenario. The generation time is on average 0.161 s when the playbook has been generated before the attack defense graph generation process.
随着网络攻击的增加,制定适当的策略来减轻和预防它们至关重要。在文献中,存在帮助预防或减轻它们的工具。攻击图有助于定义缓解策略,因为它们有助于表示和可视化攻击者在系统中的位置。但是,缓解操作没有在攻击图上实例化。本文提出了一种基于实时监控系统警报和广泛而全面的最新技术审查来生成自动攻击防御图的方法。我们提出丰富由逻辑推理器生成的逻辑攻击图。由于漏洞本体可以推断出被利用漏洞的额外影响,因此丰富过程成为可能。我们提出了一种基于图匹配的对策选择方法来生成最优事件响应(IR)剧本。我们建议实例化生成的剧本的IR动作,以实时获得攻击防御图。这个实例化是通过反相关实现的。反相关性确保在适当的攻击图节点上实例化对策。只有可以自动启动的IR操作才会被应用。我们使用两个针对关键工业基础设施的用例场景来验证我们的方法。我们分析了在攻击图上实例化的能够达到攻击目标的对策。我们评估了几种攻击路径的攻击图中实例化对策的安全相关性方法。在节点上实例化的对策总是与该节点所表示的攻击者的行为相关。我们还评估了关于时间性能的方法,考虑了用例场景的几种情况。生成时间取决于场景中涉及的漏洞数量。在攻击防御图生成之前,剧本已经生成,生成时间平均为0.161 s。
{"title":"A real-time automated attack-defense graph generation approach","authors":"Kéren A. Saint-Hilaire ,&nbsp;Christopher Neal ,&nbsp;Frédéric Cuppens ,&nbsp;Nora Boulahia-Cuppens ,&nbsp;Francesca Bassi ,&nbsp;Makhlouf Hadji","doi":"10.1016/j.jisa.2025.104266","DOIUrl":"10.1016/j.jisa.2025.104266","url":null,"abstract":"<div><div>With the increase in cyberattacks, developing appropriate strategies to mitigate and prevent them is essential. In the literature, tools exist that either help prevent or mitigate them. Attack graphs help define mitigation strategies because they help represent and visualize the attacker’s position on a system. However, the mitigation actions are not instantiated on the attack graph. This paper proposes an approach to generate an automated attack-defense graph based on real-time monitored system alerts and an extensive and comprehensive state-of-the-art review. We propose to enrich logical attack graphs generated by a logical reasoner. The enrichment process is possible thanks to a vulnerability ontology that infers additional impacts for an exploited vulnerability. We propose a countermeasure selection approach based on graph matching to generate an optimal Incident Response (IR) playbook. We propose instantiating the generated playbook’s IR actions to get an attack-defense graph in real-time. This instantiation is done thanks to anti-correlation. The anti-correlation ensures that the countermeasures are instantiated on the appropriate attack graph nodes. Only the IR actions whose execution can be launched automatically are applied. We validate our approach using two use-case scenarios that target critical industrial infrastructures. We analyze the countermeasures instantiated on the attack graphs for the scenarios that can achieve the attack goal. We evaluated the approach concerning the security relevance of instantiated countermeasures in attack graphs for several attack paths. The countermeasures instantiated on a node are always relevant to the attacker’s action represented by this node. We also evaluate the approach regarding time performance, considering several situations for the use-case scenarios. The generation time depends on the number of vulnerabilities involved in the scenario. The generation time is on average 0.161 s when the playbook has been generated before the attack defense graph generation process.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"94 ","pages":"Article 104266"},"PeriodicalIF":3.7,"publicationDate":"2025-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145324328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
HCCAS: A hierarchical consensus-based certificateless aggregate signcryption scheme for drone networks HCCAS:一种基于分层共识的无人机网络无证书聚合签名加密方案
IF 3.7 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-10-15 DOI: 10.1016/j.jisa.2025.104260
Junfeng Tian, Zhengping Jiang, Yilun Jin
Drone networks are dynamic and cooperative networks composed of multiple drones through wireless communication, which are widely used in search and rescue, patrol, and monitoring missions. Although multi-drone collaboration alleviates the limitations of individual drones in terms of computational and communication capabilities, large-scale deployments still face dual challenges of data security and communication efficiency. To address these issues, we propose a hierarchical consensus-based certificateless aggregate signcryption called the HCCAS scheme. Within each local airspace, a drone with superior computational and communication capabilities is elected as a local leader using the PBFT consensus algorithm. This local leader is responsible for aggregating the signcryption from all drones within its region. Subsequently, local leaders elect a global leader via the RAFT consensus algorithm, which transmits the total aggregated signcryption to the ground control station. In addition, HCCAS incorporates a pseudonym validity mechanism to provide conditional identity privacy protection. An efficient forgery localization mechanism based on a two-dimensional array is also designed, significantly reducing the computational overhead during verification. Compared with existing schemes, HCCAS achieves multiple security goals while reducing average computational cost and communication overhead by 52.09% and 39.69%, respectively. These results indicate enhanced adaptability and practicality in resource-constrained environments.
无人机网络是由多架无人机通过无线通信组成的动态协同网络,广泛应用于搜救、巡逻、监控等领域。尽管多无人机协作减轻了单个无人机在计算和通信能力方面的局限性,但大规模部署仍然面临数据安全和通信效率的双重挑战。为了解决这些问题,我们提出了一种基于分层共识的无证书聚合签名加密,称为HCCAS方案。在每个本地空域内,使用PBFT共识算法选出一架具有卓越计算和通信能力的无人机作为本地领导者。这个本地领导者负责收集其区域内所有无人机的签名密码。随后,本地领导者通过RAFT共识算法选出一个全局领导者,该全局领导者将总聚合签名加密传输到地面控制站。此外,HCCAS还结合了假名有效性机制,提供有条件的身份隐私保护。设计了一种有效的基于二维数组的伪造定位机制,大大减少了验证过程中的计算开销。与现有方案相比,HCCAS在实现多个安全目标的同时,平均计算成本和通信开销分别降低了52.09%和39.69%。这些结果表明,在资源受限的环境中增强了适应性和实用性。
{"title":"HCCAS: A hierarchical consensus-based certificateless aggregate signcryption scheme for drone networks","authors":"Junfeng Tian,&nbsp;Zhengping Jiang,&nbsp;Yilun Jin","doi":"10.1016/j.jisa.2025.104260","DOIUrl":"10.1016/j.jisa.2025.104260","url":null,"abstract":"<div><div>Drone networks are dynamic and cooperative networks composed of multiple drones through wireless communication, which are widely used in search and rescue, patrol, and monitoring missions. Although multi-drone collaboration alleviates the limitations of individual drones in terms of computational and communication capabilities, large-scale deployments still face dual challenges of data security and communication efficiency. To address these issues, we propose a hierarchical consensus-based certificateless aggregate signcryption called the HCCAS scheme. Within each local airspace, a drone with superior computational and communication capabilities is elected as a local leader using the PBFT consensus algorithm. This local leader is responsible for aggregating the signcryption from all drones within its region. Subsequently, local leaders elect a global leader via the RAFT consensus algorithm, which transmits the total aggregated signcryption to the ground control station. In addition, HCCAS incorporates a pseudonym validity mechanism to provide conditional identity privacy protection. An efficient forgery localization mechanism based on a two-dimensional array is also designed, significantly reducing the computational overhead during verification. Compared with existing schemes, HCCAS achieves multiple security goals while reducing average computational cost and communication overhead by 52.09% and 39.69%, respectively. These results indicate enhanced adaptability and practicality in resource-constrained environments.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"94 ","pages":"Article 104260"},"PeriodicalIF":3.7,"publicationDate":"2025-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145324326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cloud-assisted verifiable and traceable multi-party threshold private set intersection protocol for ride-sharing scheme 基于云辅助的可验证可追溯的多方阈值私有集交叉口协议
IF 3.7 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-10-14 DOI: 10.1016/j.jisa.2025.104256
Qing Wu , Xijia Dong , Leyou Zhang , Yue Lei , Ziquan Zhao
In recent years, ride-sharing services have experienced widespread adoption due to their ability to significantly reduce travel costs and carbon emissions. However, as the demand for ride-sharing increases, users are faced with growing challenges related to privacy protection and data security during the process of sharing transportation resources. In particular, there is a pressing need for effective solutions to mitigate the risks of the leakage of personally sensitive information and insufficient security verification. To address these challenges, a cloud-assisted, traceable ride-sharing scheme is proposed, leveraging a multi-party threshold private set intersection (MP-TPSI) protocol integrated with a digital signature verification mechanism. The proposed framework comprises an innovative MP-TPSI protocol, which includes two primary components: a multi-party cardinality testing phase that employs a secure comparison protocol (SCP) to determine if the intersection size surpasses a predefined threshold, coupled with a Proof of Ownership protocol to trace malicious users; and a PSI phase that securely computes the intersection using cloud-assisted computation. Furthermore, digital signature technology is incorporated to establish a robust verification framework, which ensures the authenticity of user identities and effectively mitigates the risks associated with ride mismatches and privacy leakage. Finally, comparative evaluation results demonstrate that the proposed MP-TPSI protocol achieves effective privacy protection with lower communication and computational overhead compared to existing schemes.
近年来,拼车服务因其显著降低出行成本和碳排放的能力而得到广泛采用。然而,随着拼车需求的增加,用户在共享交通资源的过程中面临着越来越多的隐私保护和数据安全方面的挑战。特别是,迫切需要有效的解决方案,以减轻个人敏感信息泄露和安全验证不足的风险。为了应对这些挑战,提出了一种云辅助的、可追踪的拼车方案,利用集成了数字签名验证机制的多方阈值私有集交叉口(MP-TPSI)协议。提议的框架包括一个创新的MP-TPSI协议,它包括两个主要组成部分:一个多方基数测试阶段,该阶段采用安全比较协议(SCP)来确定交集大小是否超过预定义的阈值,再结合所有权证明协议来跟踪恶意用户;以及使用云辅助计算安全地计算十字路口的PSI阶段。此外,采用数字签名技术建立了强大的验证框架,确保了用户身份的真实性,并有效降低了乘车不匹配和隐私泄露的风险。最后,对比评估结果表明,与现有方案相比,所提出的MP-TPSI协议以更低的通信和计算开销实现了有效的隐私保护。
{"title":"Cloud-assisted verifiable and traceable multi-party threshold private set intersection protocol for ride-sharing scheme","authors":"Qing Wu ,&nbsp;Xijia Dong ,&nbsp;Leyou Zhang ,&nbsp;Yue Lei ,&nbsp;Ziquan Zhao","doi":"10.1016/j.jisa.2025.104256","DOIUrl":"10.1016/j.jisa.2025.104256","url":null,"abstract":"<div><div>In recent years, ride-sharing services have experienced widespread adoption due to their ability to significantly reduce travel costs and carbon emissions. However, as the demand for ride-sharing increases, users are faced with growing challenges related to privacy protection and data security during the process of sharing transportation resources. In particular, there is a pressing need for effective solutions to mitigate the risks of the leakage of personally sensitive information and insufficient security verification. To address these challenges, a cloud-assisted, traceable ride-sharing scheme is proposed, leveraging a multi-party threshold private set intersection (MP-TPSI) protocol integrated with a digital signature verification mechanism. The proposed framework comprises an innovative MP-TPSI protocol, which includes two primary components: a multi-party cardinality testing phase that employs a secure comparison protocol (SCP) to determine if the intersection size surpasses a predefined threshold, coupled with a Proof of Ownership protocol to trace malicious users; and a PSI phase that securely computes the intersection using cloud-assisted computation. Furthermore, digital signature technology is incorporated to establish a robust verification framework, which ensures the authenticity of user identities and effectively mitigates the risks associated with ride mismatches and privacy leakage. Finally, comparative evaluation results demonstrate that the proposed MP-TPSI protocol achieves effective privacy protection with lower communication and computational overhead compared to existing schemes.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"94 ","pages":"Article 104256"},"PeriodicalIF":3.7,"publicationDate":"2025-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145324327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Real-time Automotive Ethernet Intrusion Detection Using Sliding Window-Based Temporal Convolutional Residual Attention Networks 基于滑动窗口的时间卷积剩余注意网络的实时汽车以太网入侵检测
IF 3.7 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-10-13 DOI: 10.1016/j.jisa.2025.104263
Yuren Zhang, Jiapeng Xiu
As vehicles become more intelligent and connected, automotive Ethernet is gradually replacing the traditional CAN bus as the backbone of in-vehicle networks. However, this transition introduces new security vulnerabilities. This paper presents a novel centralized network architecture and explores potential intrusion threats. Existing intrusion detection methods struggle to handle automotive Ethernet protocols universally and typically use a single machine learning network structure. Additionally, these models often fail to ensure temporal sensitivity and real-time performance. To address these issues, we propose Sliding Window-Based Temporal Convolutional Residual Attention Networks (SW-TempCRAN), a real-time intrusion detection system tailored for automotive Ethernet environments. SW-TempCRAN integrates several novel components, including protocol-general windowed feature extraction, time-aware positional encoding, convolutional residual attention networks and MLP classification with sequence-feature aggregation. It uses custom protocol-parsing scripts to extract key header and merge payload data, and combines Convolutional Neural Networks (CNN) with attention residual mechanisms. This design allows the model to capture attack patterns over time, identify local features and compress the computational load. We also improve positional encoding to better suit network traffic data, ensuring time sensitivity, while pre-generating the encoding matrix to avoid real-time computation complexity. Experiments on two public datasets show SW-TempCRAN outperforms state-of-the-art methods in evaluation metrics. SW-TempCRAN achieves F1-scores of 99.82 % and 98.05 % on two datasets, with a detection delay of less than 1.5 ms on a server testbed.
随着汽车智能化和互联化程度的提高,汽车以太网正逐渐取代传统的CAN总线,成为车载网络的骨干。然而,这种转换引入了新的安全漏洞。本文提出了一种新的集中式网络架构,并探讨了潜在的入侵威胁。现有的入侵检测方法难以处理通用的汽车以太网协议,并且通常使用单一的机器学习网络结构。此外,这些模型往往不能保证时间敏感性和实时性。为了解决这些问题,我们提出了基于滑动窗口的时间卷积剩余注意力网络(SW-TempCRAN),这是一种针对汽车以太网环境量身定制的实时入侵检测系统。SW-TempCRAN集成了几个新组件,包括协议通用窗口特征提取,时间感知位置编码,卷积剩余注意网络和序列特征聚合的MLP分类。它使用自定义协议解析脚本来提取关键头和合并有效负载数据,并将卷积神经网络(CNN)与注意力残留机制相结合。这种设计允许模型随时间捕获攻击模式,识别局部特征并压缩计算负载。我们还改进了位置编码以更好地适应网络流量数据,保证了时间敏感性,同时预生成编码矩阵以避免实时计算的复杂性。在两个公共数据集上的实验表明,SW-TempCRAN在评估指标方面优于最先进的方法。SW-TempCRAN在两个数据集上的f1得分分别为99.82%和98.05%,在服务器测试台上的检测延迟小于1.5 ms。
{"title":"Real-time Automotive Ethernet Intrusion Detection Using Sliding Window-Based Temporal Convolutional Residual Attention Networks","authors":"Yuren Zhang,&nbsp;Jiapeng Xiu","doi":"10.1016/j.jisa.2025.104263","DOIUrl":"10.1016/j.jisa.2025.104263","url":null,"abstract":"<div><div>As vehicles become more intelligent and connected, automotive Ethernet is gradually replacing the traditional CAN bus as the backbone of in-vehicle networks. However, this transition introduces new security vulnerabilities. This paper presents a novel centralized network architecture and explores potential intrusion threats. Existing intrusion detection methods struggle to handle automotive Ethernet protocols universally and typically use a single machine learning network structure. Additionally, these models often fail to ensure temporal sensitivity and real-time performance. To address these issues, we propose Sliding Window-Based Temporal Convolutional Residual Attention Networks (SW-TempCRAN), a real-time intrusion detection system tailored for automotive Ethernet environments. SW-TempCRAN integrates several novel components, including protocol-general windowed feature extraction, time-aware positional encoding, convolutional residual attention networks and MLP classification with sequence-feature aggregation. It uses custom protocol-parsing scripts to extract key header and merge payload data, and combines Convolutional Neural Networks (CNN) with attention residual mechanisms. This design allows the model to capture attack patterns over time, identify local features and compress the computational load. We also improve positional encoding to better suit network traffic data, ensuring time sensitivity, while pre-generating the encoding matrix to avoid real-time computation complexity. Experiments on two public datasets show SW-TempCRAN outperforms state-of-the-art methods in evaluation metrics. SW-TempCRAN achieves F1-scores of 99.82 % and 98.05 % on two datasets, with a detection delay of less than 1.5 ms on a server testbed.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"94 ","pages":"Article 104263"},"PeriodicalIF":3.7,"publicationDate":"2025-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145324329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sym-CS-HFL: A secure and efficient solution for privacy-preserving heterogeneous federated learning sm - cs - hfl:一种安全有效的保护隐私的异构联邦学习解决方案
IF 3.7 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-10-11 DOI: 10.1016/j.jisa.2025.104253
Jinzhao Wang , Wenlong Tian , Junwei Tang , Xuming Ye , Yaping Wan , Zhiyong Xu , Lingna Chen
In the era of big data, deep learning models play a crucial role in identifying underlying patterns within data. However, the need for large volumes of training data, often scattered across various organizations with privacy constraints, poses a significant challenge. Federated Learning (FL) addresses this by enabling the collaborative training of models without sharing the underlying data. Despite its promise, FL encounters challenges with model privacy leakage and computational overhead, particularly when dealing with non-identically distributed (Non-IID) data. To overcome these challenges, we introduce Sym-CS-HFL, a novel Privacy-Preserving Federated Learning (PPFL) framework that combines Symmetric Homomorphic Encryption with a Local Adaptive Aggregation (LAA) scheme. Our approach minimizes the reliance on asymmetric keys, simplifying the encryption process and reducing computational overhead. We implement a DCT-Neural Network Compressive Sensing Scheme to decrease communication costs substantially. Furthermore, the LAA scheme addresses the heterogeneity in Non-IID data, enhancing model convergence and accuracy. Our experiments on diverse datasets, including MNIST, FashionMNIST, CIFAR-10/100, and AG News, demonstrate that Sym-CS-HFL achieves a Top-3 test accuracy while significantly reducing communication overhead by 15.2× to 74× compared to existing HE schemes. The computational overhead is also reduced, with training times only 1.1× to 1.8× that of plaintext training. These results underscore Sym-CS-HFL’s effectiveness in maintaining high performance and privacy in PPFL.
在大数据时代,深度学习模型在识别数据中的潜在模式方面发挥着至关重要的作用。然而,对大量训练数据的需求(通常分散在具有隐私限制的各种组织中)构成了一个重大挑战。联邦学习(FL)通过在不共享底层数据的情况下支持模型的协作训练来解决这个问题。尽管前途光明,但FL遇到了模型隐私泄露和计算开销的挑战,特别是在处理非同分布(Non-IID)数据时。为了克服这些挑战,我们引入了一种新的隐私保护联邦学习(PPFL)框架,该框架结合了对称同态加密和本地自适应聚合(LAA)方案。我们的方法最大限度地减少了对非对称密钥的依赖,简化了加密过程并减少了计算开销。我们实现了一种dct -神经网络压缩感知方案,大大降低了通信成本。此外,LAA方案解决了非iid数据的异构性,提高了模型的收敛性和准确性。我们在包括MNIST、FashionMNIST、CIFAR-10/100和AG News在内的不同数据集上进行的实验表明,与现有HE方案相比,symm - cs - hfl实现了前3名的测试精度,同时显着降低了15.2到74倍的通信开销。计算开销也降低了,训练次数仅为明文训练的1.1 - 1.8倍。这些结果强调了symm - cs - hfl在PPFL中保持高性能和隐私的有效性。
{"title":"Sym-CS-HFL: A secure and efficient solution for privacy-preserving heterogeneous federated learning","authors":"Jinzhao Wang ,&nbsp;Wenlong Tian ,&nbsp;Junwei Tang ,&nbsp;Xuming Ye ,&nbsp;Yaping Wan ,&nbsp;Zhiyong Xu ,&nbsp;Lingna Chen","doi":"10.1016/j.jisa.2025.104253","DOIUrl":"10.1016/j.jisa.2025.104253","url":null,"abstract":"<div><div>In the era of big data, deep learning models play a crucial role in identifying underlying patterns within data. However, the need for large volumes of training data, often scattered across various organizations with privacy constraints, poses a significant challenge. Federated Learning (FL) addresses this by enabling the collaborative training of models without sharing the underlying data. Despite its promise, FL encounters challenges with model privacy leakage and computational overhead, particularly when dealing with non-identically distributed (Non-IID) data. To overcome these challenges, we introduce Sym-CS-HFL, a novel Privacy-Preserving Federated Learning (PPFL) framework that combines Symmetric Homomorphic Encryption with a Local Adaptive Aggregation (LAA) scheme. Our approach minimizes the reliance on asymmetric keys, simplifying the encryption process and reducing computational overhead. We implement a DCT-Neural Network Compressive Sensing Scheme to decrease communication costs substantially. Furthermore, the LAA scheme addresses the heterogeneity in Non-IID data, enhancing model convergence and accuracy. Our experiments on diverse datasets, including MNIST, FashionMNIST, CIFAR-10/100, and AG News, demonstrate that Sym-CS-HFL achieves a Top-3 test accuracy while significantly reducing communication overhead by <span><math><mrow><mn>15</mn><mo>.</mo><mn>2</mn><mo>×</mo></mrow></math></span> to <span><math><mrow><mn>74</mn><mo>×</mo></mrow></math></span> compared to existing HE schemes. The computational overhead is also reduced, with training times only <span><math><mrow><mn>1</mn><mo>.</mo><mn>1</mn><mo>×</mo></mrow></math></span> to <span><math><mrow><mn>1</mn><mo>.</mo><mn>8</mn><mo>×</mo></mrow></math></span> that of plaintext training. These results underscore Sym-CS-HFL’s effectiveness in maintaining high performance and privacy in PPFL.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"94 ","pages":"Article 104253"},"PeriodicalIF":3.7,"publicationDate":"2025-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145324332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CodeSearchAttack: Enhancing soft-label black-box adversarial attacks on code CodeSearchAttack:增强对代码的软标签黑盒对抗性攻击
IF 3.7 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-10-10 DOI: 10.1016/j.jisa.2025.104258
Xin Pu , Xi Xiong , Yuanyuan Li , Zhaorong Liu , Yan Yu
Adversarial attacks on code data face significant challenges due to its discrete and non-differentiable nature. Soft-label black-box code adversarial attacks, in particular, are a highly complex task, with research in this area still in its early stages. Existing methods leave room for improvement in performance. For instance, greedy search-based attacks often get trapped in local optima, resulting in excessive perturbations. To tackle these challenges, we propose a novel framework, CodeSearchAttack, for crafting high-quality adversarial examples. CodeSearchAttack leverages constrained K-means to identify diverse substitutions in the variable embedding space and employs an improved beam search to craft adversarial examples. Additionally, it calculates variable importance using information derived from soft labels. Experiments on four code classification tasks demonstrate that CodeSearchAttack significantly outperforms state-of-the-art baseline methods. Under a query budget of 100, CodeSearchAttack achieves superior attack efficacy compared to existing soft-label attacks.
由于代码数据的离散性和不可微性,对抗性攻击面临着巨大的挑战。特别是软标签黑盒代码对抗性攻击,是一项非常复杂的任务,该领域的研究仍处于早期阶段。现有的方法在性能上有改进的余地。例如,基于贪婪搜索的攻击经常陷入局部最优,导致过度的扰动。为了应对这些挑战,我们提出了一个新的框架,CodeSearchAttack,用于制作高质量的对抗性示例。CodeSearchAttack利用约束K-means来识别变量嵌入空间中的不同替换,并采用改进的波束搜索来制作对抗性示例。此外,它使用从软标签派生的信息计算变量重要性。在四个代码分类任务上的实验表明,CodeSearchAttack显著优于最先进的基线方法。在查询预算为100的情况下,CodeSearchAttack的攻击效率优于现有的软标签攻击。
{"title":"CodeSearchAttack: Enhancing soft-label black-box adversarial attacks on code","authors":"Xin Pu ,&nbsp;Xi Xiong ,&nbsp;Yuanyuan Li ,&nbsp;Zhaorong Liu ,&nbsp;Yan Yu","doi":"10.1016/j.jisa.2025.104258","DOIUrl":"10.1016/j.jisa.2025.104258","url":null,"abstract":"<div><div>Adversarial attacks on code data face significant challenges due to its discrete and non-differentiable nature. Soft-label black-box code adversarial attacks, in particular, are a highly complex task, with research in this area still in its early stages. Existing methods leave room for improvement in performance. For instance, greedy search-based attacks often get trapped in local optima, resulting in excessive perturbations. To tackle these challenges, we propose a novel framework, CodeSearchAttack, for crafting high-quality adversarial examples. CodeSearchAttack leverages constrained K-means to identify diverse substitutions in the variable embedding space and employs an improved beam search to craft adversarial examples. Additionally, it calculates variable importance using information derived from soft labels. Experiments on four code classification tasks demonstrate that CodeSearchAttack significantly outperforms state-of-the-art baseline methods. Under a query budget of 100, CodeSearchAttack achieves superior attack efficacy compared to existing soft-label attacks.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"94 ","pages":"Article 104258"},"PeriodicalIF":3.7,"publicationDate":"2025-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145265374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A security-enhanced three-party authentication and key agreement scheme for smart grid communication 一种安全增强的智能电网通信三方认证与密钥协商方案
IF 3.7 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-10-10 DOI: 10.1016/j.jisa.2025.104254
Qi Yuan , Zhuoqian He , Xiangjun Cheng , Ying Xia , Yue Shao
Securing communications within smart grids presents a critical challenge, particularly due to the increasing vulnerability of conventional authenticated key agreement schemes to quantum computing threats. Furthermore, ensuring robust security against physical attacks on devices like smart meters while maintaining low computational and communication overhead remains a significant hurdle. To address this issue, this study proposes NTRU-P3AKE (NTRU-based Three-Party Authenticated Key Exchange). This novel scheme integrates the Nth-Truncated Ring Unit (NTRU) algorithm with Physical Unclonable Functions (PUFs) and fuzzy extractors, enabling robust authentication and key agreement among smart meters, the control center, and service providers. The NTRU-P3AKE scheme supports registration via an open channel. It leverages NTRU to mitigate quantum threats, employs PUFs to resist physical attacks, and ensures forward security through dynamic random number updates. The proposed scheme’s security is rigorously evaluated via informal security analysis and formal verification. The latter uses the ProVerif tool and Burrows–Abadi–Needham (BAN) logic analysis. Comprehensive evaluations validate its exceptional efficiency, achieving a 99.0% reduction in computational overhead (0.244 ms) compared to the most computationally intensive scheme, a 70.8% reduction in communication cost (1440 bits) versus the most bandwidth-heavy approach, and a 79.4% reduction in energy consumption on smart meters (0.166 mJ) relative to the most energy-intensive protocol. These advancements make the proposed solution particularly suitable for resource-constrained smart grid environments requiring both high security and operational efficiency.
保护智能电网内的通信是一项重大挑战,特别是由于传统的身份验证密钥协议方案越来越容易受到量子计算威胁。此外,确保对智能电表等设备进行物理攻击的强大安全性,同时保持较低的计算和通信开销仍然是一个重大障碍。为了解决这个问题,本研究提出了ntrui - p3ake(基于ntrui的三方认证密钥交换)。该方案将n -截断环单元(NTRU)算法与物理不可克隆函数(puf)和模糊提取器相结合,实现了智能电表、控制中心和服务提供商之间的鲁棒认证和密钥协议。nru - p3ake方案支持通过开放通道注册。它利用NTRU来缓解量子威胁,利用puf来抵御物理攻击,并通过动态随机数更新来确保前向安全性。通过非正式安全分析和正式验证,对所提出方案的安全性进行了严格的评估。后者使用ProVerif工具和Burrows-Abadi-Needham (BAN)逻辑分析。综合评估验证了其卓越的效率,与最计算密集的方案相比,计算开销减少99.0% (0.244 ms),通信成本(1440比特)减少70.8%,与最耗能的协议相比,智能电表能耗减少79.4%(0.166兆焦耳)。这些进步使所提出的解决方案特别适合资源受限的智能电网环境,需要高安全性和运行效率。
{"title":"A security-enhanced three-party authentication and key agreement scheme for smart grid communication","authors":"Qi Yuan ,&nbsp;Zhuoqian He ,&nbsp;Xiangjun Cheng ,&nbsp;Ying Xia ,&nbsp;Yue Shao","doi":"10.1016/j.jisa.2025.104254","DOIUrl":"10.1016/j.jisa.2025.104254","url":null,"abstract":"<div><div>Securing communications within smart grids presents a critical challenge, particularly due to the increasing vulnerability of conventional authenticated key agreement schemes to quantum computing threats. Furthermore, ensuring robust security against physical attacks on devices like smart meters while maintaining low computational and communication overhead remains a significant hurdle. To address this issue, this study proposes NTRU-P3AKE (NTRU-based Three-Party Authenticated Key Exchange). This novel scheme integrates the Nth-Truncated Ring Unit (NTRU) algorithm with Physical Unclonable Functions (PUFs) and fuzzy extractors, enabling robust authentication and key agreement among smart meters, the control center, and service providers. The NTRU-P3AKE scheme supports registration via an open channel. It leverages NTRU to mitigate quantum threats, employs PUFs to resist physical attacks, and ensures forward security through dynamic random number updates. The proposed scheme’s security is rigorously evaluated via informal security analysis and formal verification. The latter uses the ProVerif tool and Burrows–Abadi–Needham (BAN) logic analysis. Comprehensive evaluations validate its exceptional efficiency, achieving a 99.0% reduction in computational overhead (0.244 ms) compared to the most computationally intensive scheme, a 70.8% reduction in communication cost (1440 bits) versus the most bandwidth-heavy approach, and a 79.4% reduction in energy consumption on smart meters (0.166 mJ) relative to the most energy-intensive protocol. These advancements make the proposed solution particularly suitable for resource-constrained smart grid environments requiring both high security and operational efficiency.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"94 ","pages":"Article 104254"},"PeriodicalIF":3.7,"publicationDate":"2025-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145265393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-mediated semi-quantum key distribution protocol with cyclic topology 具有循环拓扑结构的多中介半量子密钥分发协议
IF 3.7 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-10-10 DOI: 10.1016/j.jisa.2025.104257
Zhenye Du, Youlong Yang, Kaitian Gao
Mediated semi-quantum key distribution (M-SQKD) is a class of quantum cryptographic protocols that allow two or more legitimate classical users to share a string of secure keys with the help of a third-party quantum server. Research has shown that these protocols remain valid even if the server is an adversary. Recently, two circular M-SQKD (CM-SQKD) protocols have emerged, where the server and all legitimate users form a topological loop when transmitting qubits. In this paper, we extend two existing CM-SQKD protocols, one based on a single state and the other on an entangled state, into multi-mediated versions. In the asymptotic case, we derive new bounds for the key rate of the two protocols and give noise tolerances, thus proving their unconditional security. In particular, we improve on previous results when only one mediator works.
中介半量子密钥分发(M-SQKD)是一类量子加密协议,它允许两个或多个合法的经典用户在第三方量子服务器的帮助下共享一串安全密钥。研究表明,即使服务器是对手,这些协议仍然有效。最近,出现了两种圆形M-SQKD (CM-SQKD)协议,其中服务器和所有合法用户在传输量子比特时形成拓扑环路。本文将现有的两种基于单态和纠缠态的CM-SQKD协议扩展为多中介版本。在渐近情况下,我们给出了两种协议密钥率的新边界,并给出了噪声容限,从而证明了它们的无条件安全性。特别是,当只有一个中介起作用时,我们改进了以前的结果。
{"title":"Multi-mediated semi-quantum key distribution protocol with cyclic topology","authors":"Zhenye Du,&nbsp;Youlong Yang,&nbsp;Kaitian Gao","doi":"10.1016/j.jisa.2025.104257","DOIUrl":"10.1016/j.jisa.2025.104257","url":null,"abstract":"<div><div>Mediated semi-quantum key distribution (M-SQKD) is a class of quantum cryptographic protocols that allow two or more legitimate classical users to share a string of secure keys with the help of a third-party quantum server. Research has shown that these protocols remain valid even if the server is an adversary. Recently, two circular M-SQKD (CM-SQKD) protocols have emerged, where the server and all legitimate users form a topological loop when transmitting qubits. In this paper, we extend two existing CM-SQKD protocols, one based on a single state and the other on an entangled state, into multi-mediated versions. In the asymptotic case, we derive new bounds for the key rate of the two protocols and give noise tolerances, thus proving their unconditional security. In particular, we improve on previous results when only one mediator works.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"94 ","pages":"Article 104257"},"PeriodicalIF":3.7,"publicationDate":"2025-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145265373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Information Security and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1