Pub Date : 2022-01-01DOI: 10.1504/ijics.2022.10047994
N. Garg, Sahil Gupta
{"title":"Data hiding in the optimal keyframes using circular shifting and mutation operations for improvement in imperceptibility","authors":"N. Garg, Sahil Gupta","doi":"10.1504/ijics.2022.10047994","DOIUrl":"https://doi.org/10.1504/ijics.2022.10047994","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67031040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.1504/ijics.2022.10049533
Ashutosh Kumar, G. Verma
{"title":"A Secure Access control model based on Improved Attribute-Based Cryptosystem in Cloud Environment","authors":"Ashutosh Kumar, G. Verma","doi":"10.1504/ijics.2022.10049533","DOIUrl":"https://doi.org/10.1504/ijics.2022.10049533","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67031059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.1504/ijics.2022.10051391
K. Vara Prasad, P. Trinatha Rao
{"title":"Reinforcement learning-based cooperative sensing in cognitive radio networks for primary user detection","authors":"K. Vara Prasad, P. Trinatha Rao","doi":"10.1504/ijics.2022.10051391","DOIUrl":"https://doi.org/10.1504/ijics.2022.10051391","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67031066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.1504/ijics.2022.10044091
K. A. K. Patro, B. Acharya
{"title":"An Efficient Two-level Image Encryption System using Chaotic Maps","authors":"K. A. K. Patro, B. Acharya","doi":"10.1504/ijics.2022.10044091","DOIUrl":"https://doi.org/10.1504/ijics.2022.10044091","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.1504/ijics.2022.10045346
J. Rani, V. S.
{"title":"Auto-Encoder based Technique for Effective Detection of Frauds in Social Networks","authors":"J. Rani, V. S.","doi":"10.1504/ijics.2022.10045346","DOIUrl":"https://doi.org/10.1504/ijics.2022.10045346","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.1504/ijics.2022.10047407
N. Gayathri, P. V. Reddy, A. Babu
{"title":"Pairing-based strong key-insulated signature scheme","authors":"N. Gayathri, P. V. Reddy, A. Babu","doi":"10.1504/ijics.2022.10047407","DOIUrl":"https://doi.org/10.1504/ijics.2022.10047407","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67031006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.1504/ijics.2022.10047992
Zhongpu Chen, M. Azhar, Bin Yao
{"title":"Enriching Blockchain with Spatial Keyword Query Processing","authors":"Zhongpu Chen, M. Azhar, Bin Yao","doi":"10.1504/ijics.2022.10047992","DOIUrl":"https://doi.org/10.1504/ijics.2022.10047992","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"52 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67031031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.1504/ijics.2022.10051390
D. Jinwala, Mukti Padhya
{"title":"Revocable key aggregate searchable encryption with user privacy and anonymity","authors":"D. Jinwala, Mukti Padhya","doi":"10.1504/ijics.2022.10051390","DOIUrl":"https://doi.org/10.1504/ijics.2022.10051390","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"198 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67031064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure exchange and incentivised collaboration of machine learning models and datasets using blockchain","authors":"Jessica Judith D', N.A. souza, R. Padmavathy, Abhinav Dayal, Harika Gnanaveni, Sreenu Ponnada","doi":"10.1504/ijics.2022.127171","DOIUrl":"https://doi.org/10.1504/ijics.2022.127171","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.1504/ijics.2022.10043106
V. S. Shekhawat, Yuvraj Singh Malhi
{"title":"Two-Level Machine Learning Driven Intrusion Detection Model for IoT Environments","authors":"V. S. Shekhawat, Yuvraj Singh Malhi","doi":"10.1504/ijics.2022.10043106","DOIUrl":"https://doi.org/10.1504/ijics.2022.10043106","url":null,"abstract":"","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67030821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}