首页 > 最新文献

International Journal of Information and Computer Security最新文献

英文 中文
A bio-inspired algorithm for enhancing DNA cryptography 一种增强DNA密码的仿生算法
Q3 Engineering Pub Date : 2023-01-01 DOI: 10.1504/ijics.2023.10055396
Kheira Lakel, F. Bendella
{"title":"A bio-inspired algorithm for enhancing DNA cryptography","authors":"Kheira Lakel, F. Bendella","doi":"10.1504/ijics.2023.10055396","DOIUrl":"https://doi.org/10.1504/ijics.2023.10055396","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enriching blockchain with spatial keyword query processing 用空间关键字查询处理丰富区块链
Q3 Engineering Pub Date : 2023-01-01 DOI: 10.1504/ijics.2023.133369
Muhammad Kashif Azhar, Bin Yao, Zhongpu Chen
Recently, after successfully revolutionising financial services, blockchain is now transforming a variety of other domains. However, current working abstraction requires technology to have more maturity from several key perspectives, and linear data processing is one of them. Blockchain, with its core characteristics like immutability, traceability, and decentralisation, has the potential to support various types of data. Currently, we find this design an ideal model to support spatial data structures, which, to the best of our knowledge, is a novel feature. We lead this opportunity to enrich blockchain with efficient spatial keyword data. We introduce spatial keyword index for block (SKIB), which is a cryptographically signed tree, thus maintaining the storage and integrity of original data from its spatial topological contexts. To demonstrate our work, we implement both textual first and spatial first pruning techniques. The comprehensive evaluation shows that SKIB provides efficient spatial keyword data processing on blockchains.
最近,在成功革新金融服务之后,区块链正在改变其他各种领域。然而,当前的工作抽象从几个关键的角度要求技术更加成熟,线性数据处理就是其中之一。区块链具有不变性、可追溯性和去中心化等核心特征,有可能支持各种类型的数据。目前,我们发现这种设计是支持空间数据结构的理想模型,据我们所知,这是一个新颖的特征。我们利用这个机会,用高效的空间关键字数据丰富区块链。我们引入了块的空间关键字索引(SKIB),它是一种加密签名树,从而从其空间拓扑上下文中维护原始数据的存储和完整性。为了演示我们的工作,我们实现了文本优先和空间优先的修剪技术。综合评价表明,SKIB提供了高效的区块链空间关键字数据处理。
{"title":"Enriching blockchain with spatial keyword query processing","authors":"Muhammad Kashif Azhar, Bin Yao, Zhongpu Chen","doi":"10.1504/ijics.2023.133369","DOIUrl":"https://doi.org/10.1504/ijics.2023.133369","url":null,"abstract":"Recently, after successfully revolutionising financial services, blockchain is now transforming a variety of other domains. However, current working abstraction requires technology to have more maturity from several key perspectives, and linear data processing is one of them. Blockchain, with its core characteristics like immutability, traceability, and decentralisation, has the potential to support various types of data. Currently, we find this design an ideal model to support spatial data structures, which, to the best of our knowledge, is a novel feature. We lead this opportunity to enrich blockchain with efficient spatial keyword data. We introduce spatial keyword index for block (SKIB), which is a cryptographically signed tree, thus maintaining the storage and integrity of original data from its spatial topological contexts. To demonstrate our work, we implement both textual first and spatial first pruning techniques. The comprehensive evaluation shows that SKIB provides efficient spatial keyword data processing on blockchains.","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135495323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic group signature scheme using ideal lattices 基于理想格的动态群签名方案
Q3 Engineering Pub Date : 2023-01-01 DOI: 10.1504/ijics.2023.133366
M.H. Abhilash, B.B. Amberker
{"title":"Dynamic group signature scheme using ideal lattices","authors":"M.H. Abhilash, B.B. Amberker","doi":"10.1504/ijics.2023.133366","DOIUrl":"https://doi.org/10.1504/ijics.2023.133366","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135495324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementation of a secret sharing-based masking scheme against side-channel attack for ultra-lightweight ciphers in IoT 针对物联网中超轻量密码的侧信道攻击的基于秘密共享的屏蔽方案的实现
Q3 Engineering Pub Date : 2023-01-01 DOI: 10.1504/ijics.2023.132725
Swapnil Sutar, Vikas Tiwari, Ajeet Singh
{"title":"Implementation of a secret sharing-based masking scheme against side-channel attack for ultra-lightweight ciphers in IoT","authors":"Swapnil Sutar, Vikas Tiwari, Ajeet Singh","doi":"10.1504/ijics.2023.132725","DOIUrl":"https://doi.org/10.1504/ijics.2023.132725","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67039747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust watermarking of Medical Images using SVM and hybrid DWT-SVD 基于SVM和混合DWT-SVD的医学图像鲁棒水印
Q3 Engineering Pub Date : 2023-01-01 DOI: 10.1504/ijics.2023.10057699
H. Singh, K. Singh
{"title":"Robust watermarking of Medical Images using SVM and hybrid DWT-SVD","authors":"H. Singh, K. Singh","doi":"10.1504/ijics.2023.10057699","DOIUrl":"https://doi.org/10.1504/ijics.2023.10057699","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67039768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new architecture with a new protocol for m-payment 移动支付的新架构和新协议
Q3 Engineering Pub Date : 2023-01-01 DOI: 10.1504/ijics.2023.10054871
Abdelkader Belkhir, Boukers Saâd
{"title":"A new architecture with a new protocol for m-payment","authors":"Abdelkader Belkhir, Boukers Saâd","doi":"10.1504/ijics.2023.10054871","DOIUrl":"https://doi.org/10.1504/ijics.2023.10054871","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Robust Feature Points Based Screen-shooting Resilient Watermarking Scheme 基于鲁棒特征点的截屏弹性水印方案
Q3 Engineering Pub Date : 2023-01-01 DOI: 10.1504/ijics.2023.10056328
Yuan Jia, Ruixia Yan, Lingyun Gao
{"title":"A Robust Feature Points Based Screen-shooting Resilient Watermarking Scheme","authors":"Yuan Jia, Ruixia Yan, Lingyun Gao","doi":"10.1504/ijics.2023.10056328","DOIUrl":"https://doi.org/10.1504/ijics.2023.10056328","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Behavioral analysis and Results of Malware and Ransomware using optimal behavioral feature set 基于最优行为特征集的恶意软件和勒索软件行为分析及结果
Q3 Engineering Pub Date : 2023-01-01 DOI: 10.1504/ijics.2023.10059326
Balaji M. Patil, Laxmi B. Bhagwat
{"title":"Behavioral analysis and Results of Malware and Ransomware using optimal behavioral feature set","authors":"Balaji M. Patil, Laxmi B. Bhagwat","doi":"10.1504/ijics.2023.10059326","DOIUrl":"https://doi.org/10.1504/ijics.2023.10059326","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135650044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Method of Speech Information Hiding in Inactive Frame Based on Pitch Modulation 基于基音调制的非活动帧语音信息隐藏方法
Q3 Engineering Pub Date : 2022-01-01 DOI: 10.1504/ijics.2022.10047375
Zhijun Wu, Chenlei Zhang, Junjun Guo
{"title":"A Method of Speech Information Hiding in Inactive Frame Based on Pitch Modulation","authors":"Zhijun Wu, Chenlei Zhang, Junjun Guo","doi":"10.1504/ijics.2022.10047375","DOIUrl":"https://doi.org/10.1504/ijics.2022.10047375","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FFRR: a software diversity technique for defending against buffer overflow attacks FFRR:一种用于防御缓冲区溢出攻击的软件多样性技术
Q3 Engineering Pub Date : 2022-01-01 DOI: 10.1504/ijics.2022.10047404
N. Raghu Kisore, K. S. Shiva Kumar
{"title":"FFRR: a software diversity technique for defending against buffer overflow attacks","authors":"N. Raghu Kisore, K. S. Shiva Kumar","doi":"10.1504/ijics.2022.10047404","DOIUrl":"https://doi.org/10.1504/ijics.2022.10047404","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Information and Computer Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1