- Roland Schmitz. Use of SHDM in commutative watermarking encryption. EURASIP J. Information Security, 2021(1):1, 2021.
- Carrie Wright, Darryl Stewart. Understanding visual lip-based biometric authentication for mobile devices. EURASIP J. Information Security, 2020:3, 2020.
- Junfeng Tian, Zilong Wang, Zhen Li. Low-cost data partitioning and encrypted backup scheme for defending against co-resident attacks. EURASIP J. Information Security, 2020:7, 2020.
- Olga Taran, Shideh Rezaeifar, Taras Holotyak, Slava Voloshynovskiy. Machine learning through cryptographic glasses: combating adversarial attacks by key-based diversified aggregation. EURASIP J. Information Security, 2020:10, 2020.
- Keming Dong, Hyoung Joong Kim, Xiaohan Yu, Xiaoqing Feng. Reversible data hiding for binary images based on adaptive overlapping pattern. EURASIP J. Information Security, 2020:11, 2020.
- Philipp Muth, Matthias Geihs, Tolga Arul, Johannes Buchmann 0001, Stefan Katzenbeisser 0001. ∗. EURASIP J. Information Security, 2020:9, 2020.
- Hanwei Zhang, Yannis Avrithis, Teddy Furon, Laurent Amsaleg. Smooth adversarial examples. EURASIP J. Information Security, 2020:15, 2020.
- Davood Noori, Hassan Shakeri, Masood Niazi Torshiz. Scalable, efficient, and secure RFID with elliptic curve cryptosystem for Internet of Things in healthcare environment. EURASIP J. Information Security, 2020:13, 2020.
- Elakkiya Ellavarason, Richard M. Guest, Farzin Deravi. Evaluation of stability of swipe gesture authentication across usage scenarios of mobile device. EURASIP J. Information Security, 2020:4, 2020.
- Oluwakemi Christiana Abikoye, Abdullahi Abubakar, Ahmad Dokoro Haruna, Noah Oluwatobi Akande, Anthonia Aderonke Kayode. A novel technique to prevent SQL injection and cross-site scripting attacks using Knuth-Morris-Pratt string match algorithm. EURASIP J. Information Security, 2020:14, 2020.