Found: 15
Select item for more details and to access through your institution.
Scalable, efficient, and secure RFID with elliptic curve cryptosystem for Internet of Things in healthcare environment.
- Published in:
- EURASIP Journal on Information Security, 2020, v. 2020, n. 1, p. 1, doi. 10.1186/s13635-020-00114-x
- By:
- Publication type:
- Article
Trembling triggers: exploring the sensitivity of backdoors in DNN-based face recognition.
- Published in:
- EURASIP Journal on Information Security, 2020, v. 2020, n. 1, p. 1, doi. 10.1186/s13635-020-00104-z
- By:
- Publication type:
- Article
Machine learning through cryptographic glasses: combating adversarial attacks by key-based diversified aggregation.
- Published in:
- EURASIP Journal on Information Security, 2020, v. 2020, n. 1, p. 1, doi. 10.1186/s13635-020-00106-x
- By:
- Publication type:
- Article
ELSA: efficient long-term secure storage of large datasets (full version) ∗.
- Published in:
- EURASIP Journal on Information Security, 2020, v. 2020, n. 1, p. 1, doi. 10.1186/s13635-020-00108-9
- By:
- Publication type:
- Article
Reversible data hiding for binary images based on adaptive overlapping pattern.
- Published in:
- EURASIP Journal on Information Security, 2020, v. 2020, n. 1, p. 1, doi. 10.1186/s13635-020-00107-w
- By:
- Publication type:
- Article
Smooth adversarial examples.
- Published in:
- EURASIP Journal on Information Security, 2020, v. 2020, n. 1, p. N.PAG, doi. 10.1186/s13635-020-00112-z
- By:
- Publication type:
- Article
A novel technique to prevent SQL injection and cross-site scripting attacks using Knuth-Morris-Pratt string match algorithm.
- Published in:
- EURASIP Journal on Information Security, 2020, v. 2020, n. 1, p. N.PAG, doi. 10.1186/s13635-020-00113-y
- By:
- Publication type:
- Article
IoT cyber risk: a holistic analysis of cyber risk assessment frameworks, risk vectors, and risk ranking process.
- Published in:
- EURASIP Journal on Information Security, 2020, v. 2020, n. 1, p. 1, doi. 10.1186/s13635-020-00111-0
- By:
- Publication type:
- Article
Low-cost data partitioning and encrypted backup scheme for defending against co-resident attacks.
- Published in:
- EURASIP Journal on Information Security, 2020, v. 2020, n. 1, p. 1, doi. 10.1186/s13635-020-00110-1
- By:
- Publication type:
- Article
Swapped face detection using deep learning and subjective assessment.
- Published in:
- EURASIP Journal on Information Security, 2020, v. 2020, n. 1, p. 1, doi. 10.1186/s13635-020-00109-8
- By:
- Publication type:
- Article
Evaluation of stability of swipe gesture authentication across usage scenarios of mobile device.
- Published in:
- EURASIP Journal on Information Security, 2020, v. 2020, n. 1, p. 1, doi. 10.1186/s13635-020-00103-0
- By:
- Publication type:
- Article
Deep neural rejection against adversarial examples.
- Published in:
- EURASIP Journal on Information Security, 2020, v. 2020, n. 1, p. 1, doi. 10.1186/s13635-020-00105-y
- By:
- Publication type:
- Article
Understanding visual lip-based biometric authentication for mobile devices.
- Published in:
- EURASIP Journal on Information Security, 2020, v. 2020, n. 1, p. 1, doi. 10.1186/s13635-020-0102-6
- By:
- Publication type:
- Article
Keystroke biometrics in the encrypted domain: a first study on search suggestion functions of web search engines.
- Published in:
- EURASIP Journal on Information Security, 2020, v. 2020, n. 1, p. 1, doi. 10.1186/s13635-020-0100-8
- By:
- Publication type:
- Article
Combining PRNU and noiseprint for robust and efficient device source identification.
- Published in:
- EURASIP Journal on Information Security, 2020, v. 2020, n. 1, p. 1, doi. 10.1186/s13635-020-0101-7
- By:
- Publication type:
- Article