- Jen-Ho Yang. A multi-gateway authentication and key-agreement scheme on wireless sensor networks for IoT. EURASIP J. Information Security, 2023(1):2, December 2023.
- Balaji Rao Katika, Kannan Karthik. Image life trails based on contrast reduction models for face counter-spoofing. EURASIP J. Information Security, 2023(1):1, December 2023.
- Arslan Ali, Andrea Migliorati, Tiziano Bianchi, Enrico Magli. Gaussian class-conditional simplex loss for accurate, adversarially robust deep classifier training. EURASIP J. Information Security, 2023(1):3, December 2023.
- Filipo Sharevski, Peter Jachim. "Alexa, What's a Phishing Email?": Training users to spot phishing emails using a voice assistant. EURASIP J. Information Security, 2022(1):7, 2022.
- Dmytro Progonov, Valentyna Cherniakova, Pavel V. Kolesnichenko, Andriy Oliynyk. Behavior-based user authentication on mobile devices in various usage contexts. EURASIP J. Information Security, 2022(1):6, 2022.
- Pingan Fan, Hong Zhang 0005, Xianfeng Zhao. Robust video steganography for social media sharing based on principal component analysis. EURASIP J. Information Security, 2022(1):4, 2022.
- Binh Le Thanh Thai, Hidema Tanaka, Kohtaro Watanabe. Improved scheme and evaluation method for progressive visual cryptography. EURASIP J. Information Security, 2022(1):9, 2022.
- Ayoub Lahmidi, Chouaib Moujahdi, Khalid Minaoui, Mohammed Rziza. On the methodology of fingerprint template protection schemes conception : meditations on the reliability. EURASIP J. Information Security, 2022(1):3, 2022.
- Francesco Picetti, Sara Mandelli, Paolo Bestagini, Vincenzo Lipari, Stefano Tubaro. DIPPAS: a deep image prior PRNU anonymization scheme. EURASIP J. Information Security, 2022(1):2, 2022.
- Jing Lin, Laurent L. Njilla, Kaiqi Xiong. Secure machine learning against adversarial samples at test time. EURASIP J. Information Security, 2022(1):1, 2022.