Pub Date : 2023-01-01DOI: 10.1504/ijics.2023.10055396
Kheira Lakel, F. Bendella
{"title":"A bio-inspired algorithm for enhancing DNA cryptography","authors":"Kheira Lakel, F. Bendella","doi":"10.1504/ijics.2023.10055396","DOIUrl":"https://doi.org/10.1504/ijics.2023.10055396","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"21 1","pages":"436-456"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.1504/ijics.2023.133369
Muhammad Kashif Azhar, Bin Yao, Zhongpu Chen
Recently, after successfully revolutionising financial services, blockchain is now transforming a variety of other domains. However, current working abstraction requires technology to have more maturity from several key perspectives, and linear data processing is one of them. Blockchain, with its core characteristics like immutability, traceability, and decentralisation, has the potential to support various types of data. Currently, we find this design an ideal model to support spatial data structures, which, to the best of our knowledge, is a novel feature. We lead this opportunity to enrich blockchain with efficient spatial keyword data. We introduce spatial keyword index for block (SKIB), which is a cryptographically signed tree, thus maintaining the storage and integrity of original data from its spatial topological contexts. To demonstrate our work, we implement both textual first and spatial first pruning techniques. The comprehensive evaluation shows that SKIB provides efficient spatial keyword data processing on blockchains.
{"title":"Enriching blockchain with spatial keyword query processing","authors":"Muhammad Kashif Azhar, Bin Yao, Zhongpu Chen","doi":"10.1504/ijics.2023.133369","DOIUrl":"https://doi.org/10.1504/ijics.2023.133369","url":null,"abstract":"Recently, after successfully revolutionising financial services, blockchain is now transforming a variety of other domains. However, current working abstraction requires technology to have more maturity from several key perspectives, and linear data processing is one of them. Blockchain, with its core characteristics like immutability, traceability, and decentralisation, has the potential to support various types of data. Currently, we find this design an ideal model to support spatial data structures, which, to the best of our knowledge, is a novel feature. We lead this opportunity to enrich blockchain with efficient spatial keyword data. We introduce spatial keyword index for block (SKIB), which is a cryptographically signed tree, thus maintaining the storage and integrity of original data from its spatial topological contexts. To demonstrate our work, we implement both textual first and spatial first pruning techniques. The comprehensive evaluation shows that SKIB provides efficient spatial keyword data processing on blockchains.","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135495323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.1504/ijics.2023.133366
M.H. Abhilash, B.B. Amberker
{"title":"Dynamic group signature scheme using ideal lattices","authors":"M.H. Abhilash, B.B. Amberker","doi":"10.1504/ijics.2023.133366","DOIUrl":"https://doi.org/10.1504/ijics.2023.133366","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135495324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.1504/ijics.2023.132725
Swapnil Sutar, Vikas Tiwari, Ajeet Singh
{"title":"Implementation of a secret sharing-based masking scheme against side-channel attack for ultra-lightweight ciphers in IoT","authors":"Swapnil Sutar, Vikas Tiwari, Ajeet Singh","doi":"10.1504/ijics.2023.132725","DOIUrl":"https://doi.org/10.1504/ijics.2023.132725","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"21 1","pages":"336-359"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67039747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.1504/ijics.2023.10057699
H. Singh, K. Singh
{"title":"Robust watermarking of Medical Images using SVM and hybrid DWT-SVD","authors":"H. Singh, K. Singh","doi":"10.1504/ijics.2023.10057699","DOIUrl":"https://doi.org/10.1504/ijics.2023.10057699","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67039768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.1504/ijics.2023.10054871
Abdelkader Belkhir, Boukers Saâd
{"title":"A new architecture with a new protocol for m-payment","authors":"Abdelkader Belkhir, Boukers Saâd","doi":"10.1504/ijics.2023.10054871","DOIUrl":"https://doi.org/10.1504/ijics.2023.10054871","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.1504/ijics.2023.10059326
Balaji M. Patil, Laxmi B. Bhagwat
{"title":"Behavioral analysis and Results of Malware and Ransomware using optimal behavioral feature set","authors":"Balaji M. Patil, Laxmi B. Bhagwat","doi":"10.1504/ijics.2023.10059326","DOIUrl":"https://doi.org/10.1504/ijics.2023.10059326","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135650044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.1504/ijics.2022.10047375
Zhijun Wu, Chenlei Zhang, Junjun Guo
{"title":"A Method of Speech Information Hiding in Inactive Frame Based on Pitch Modulation","authors":"Zhijun Wu, Chenlei Zhang, Junjun Guo","doi":"10.1504/ijics.2022.10047375","DOIUrl":"https://doi.org/10.1504/ijics.2022.10047375","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.1504/ijics.2022.10047404
N. Raghu Kisore, K. S. Shiva Kumar
{"title":"FFRR: a software diversity technique for defending against buffer overflow attacks","authors":"N. Raghu Kisore, K. S. Shiva Kumar","doi":"10.1504/ijics.2022.10047404","DOIUrl":"https://doi.org/10.1504/ijics.2022.10047404","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}