Journal: Information Systems Security

Volume 29, Issue 6

267 -- 283Femi Emmanuel Ayo, Sakinat Oluwabukonla Folorunso, Adebayo Abayomi-Alli, Adebola Olayinka Adekunle, Joseph Bamidele Awotunde. Network intrusion detection based on deep learning model optimized with rule-based hybrid feature selection
284 -- 296Yuancheng Li, Haiyan Hou, Wenping Chen. A privacy-preserving multi-keyword ranked retrieval scheme in cloud computing
297 -- 309Ali Cherif Khalfallah, Naima Hadj-Said, Ali Pacha Adda. A new chaotic encrypted image based on the trigonometric circle
310 -- 326Abdalla Alameen, Ashu Gupta. Fitness rate-based rider optimization enabled for optimal task scheduling in cloud
327 -- 340Samir Chabbi, Rachid Boudour, Fouzi Semchedine, Djalel Chefrour. Dynamic array PIN: A novel approach to secure NFC electronic payment between ATM and smartphone
341 -- 365Zakaria Hassan Abdelwahab, Talaat A. Elgarf, Abdelhalim Zekry. Approved algorithmic security enhancement of stream cipher for advanced mobile communications
366 -- 381Thakkalapally Preethi, B. B. Amberker. Lattice-based group signature scheme without random oracle