Journal: IJICS

Volume 25, Issue 3/4

203 -- 233Ken Naganuma, Masayuki Yoshino, Noboru Kunihiro, Atsuo Inoue, Yukinori Matsuoka, Mineaki Okazaki. Post-quantum zk-SNARKs from QAPs
234 -- 264Nan Wang, Yuqin Luo, Hao Liu, Haibo Tian. A user transaction privacy protection protocol supporting regulations on account-based blockchain
265 -- 291Devender Kumar, Deepak Kumar Sharma, Parth Jain, Sumit Bhati, Amit Kumar. Cryptanalysis and improvement of a secure communication protocol for smart healthcare system
292 -- 332Kalyani Nikhilesh Pampattiwar, Pallavi Vijay Chavan. Blockchain-based composite access control and secret sharing-based data distribution for security-aware deployments
333 -- 350T. E. Jisha, Thomas Monoth. Contrast enhancement in probabilistic visual cryptography schemes: a pixel count based approach
351 -- 366Lu Zhang, Yan Sun, Yingfei Xu, Hongfeng Zhu. IDMS quantum password-authenticated key exchange protocols
367 -- 403Emmanuel Adu-Mensah, Solomon Odei-Appiah, Joseph Kwame Adjei, Enoch Ayivor. The role of user awareness in the information technology and security governance nexus - evidence from Ghana's banking industry

Volume 25, Issue 1/2

1 -- 17Jing Zhang, Yufei Zhao, Jiawei Zhang, Lin Guo, Xiaoqin Zhang. Feature-driven intrusion detection method based on improved CNN and LSTM
18 -- 30Zexi Li, Kefan Cheng, Yan Sun, Hongfeng Zhu. Efficient multi-party quantum key agreement protocol based on new bell state encoding mode
31 -- 52Dongwen Zhang, Shaohua Zhang, Guanghua Zhang, Naiwen Yu. WTSEMal: a malware classification scheme based on wavelet and SE-Resnet
53 -- 77Jaimandeep Singh, Naveen Kumar Chaudhary. Unified singular protocol flow for OAuth ecosystem
78 -- 95Sahil Gupta, Naresh Kumar Garg. Adaptive highly secure and imperceptible video steganography for medical images via deep convolutional neural network
96 -- 115Bhavani Ranbida, Debabala Swain, Bijay Kumar Paikaray. Image forgery detection on multi-resolution splicing attacks using DCT and DWT
116 -- 140R. Rajeshwari, M. P. Anuradha. Robust intrusion detection techniques on improved features selection generalised variable precision rough set
141 -- 166Salim Khemis, Yacine Amara, Mohamed Akrem Benatia. Improving greedy adversarial attacks on text classification
167 -- 188Rashmi Shirole, Shiva Murthy Govind Swamy. Intensity-based randomised image steganography technique with novel AES encryption
189 -- 201Kefan Cheng, Lu Zhang, Yan Sun, Hongfeng Zhu. A novel blockchain consensus protocol with quantum private comparison for internet of vehicles