We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 10,000 results
  1. Performance comparison of quantum-safe multivariate polynomial public key encapsulation algorithm

    A novel quantum-safe key encapsulation algorithm, called Multivariate Polynomial Public Key (MPPK), was recently proposed by Kuang, Perepechaenko,...

    Randy Kuang, Maria Perepechaenko, ... Michel Barbeau in EURASIP Journal on Information Security
    Article Open access 09 July 2024
  2. Physiologic Changes with an Exposure to a New Concept Conducted Electrical Weapon (T10™) in Human Volunteers

    Axon Enterprise, Inc. has developed a new concept Conducted Electrical Weapon (CEW), the T10. Instead of the traditional high-voltage, electrically...

    D. M. Dawes, J. D. Ho, ... S. K. Knack in Human Factors and Mechanical Engineering for Defense and Safety
    Article 08 July 2024
  3. Errorless robust JPEG steganography using steganographic polar codes

    Recently, a robust steganographic algorithm that achieves errorless robustness against JPEG recompression has been proposed. The method employs a...

    Jimin Zhang, **aolei He, Yun Cao in EURASIP Journal on Information Security
    Article Open access 04 July 2024
  4. Mining digital identity insights: patent analysis using NLP

    The field of digital identity innovation has grown significantly over the last 30 years, with over 6000 technology patents registered worldwide....

    Matthew Comb, Andrew Martin in EURASIP Journal on Information Security
    Article Open access 03 July 2024
  5. Peer-to-peer botnets: exploring behavioural characteristics and machine/deep learning-based detection

    The orientation of emerging technologies on the Internet is moving toward decentralisation. Botnets have always been one of the biggest threats to...

    Arkan Hammoodi Hasan Kabla, Achmad Husni Thamrin, ... Shankar Karuppayah in EURASIP Journal on Information Security
    Article Open access 27 May 2024
  6. Retraction Note: The design of network security protection trust management system based on an improved hidden Markov model

    This article has been retracted. Please see the Retraction Notice for more detail: https://doi.org/10.1186/s13635-023-00146-z.

    Article Open access 13 May 2024
  7. Retraction Note: RFID tag recognition model for Internet of Things for training room management

    This article has been retracted. Please see the Retraction Notice for more detail: https://doi.org/10.1186/s13635-024-00154-7

    Article Open access 13 May 2024
  8. Retraction Note: Hierarchical energy-saving routing algorithm using fuzzy logic in wireless sensor networks

    This article has been retracted. Please see the Retraction Notice for more detail: https://doi.org/10.1186/s13635-023-00144-1.

    Dan Wang, Qing Wu, Ming Hu in EURASIP Journal on Information Security
    Article Open access 13 May 2024
  9. Retraction Note: Improved RFID mutual authentication protocol against exhaustive attack in the context of big data

    This article has been retracted. Please see the Retraction Notice for more detail: https://doi.org/10.1186/s13635-024-00151-w.

    Article Open access 10 May 2024
  10. Retraction Note: Efficient identity security authentication method based on improved R-LWE algorithm in IoT environment

    This article has been retracted. Please see the Retraction Notice for more detail: https://doi.org/10.1186/s13635-024-00153-8.

    Article Open access 10 May 2024
  11. Retraction Note: Research on privacy and secure storage protection of personalized medical data based on hybrid encryption

    This article has been retracted. Please see the Retraction Notice for more detail: https://doi.org/10.1186/s13635-023-00150-3.

    Article Open access 10 May 2024
  12. Retraction Note: Node fault diagnosis algorithm for wireless sensor networks based on BN and WSN

    This article has been retracted. Please see the Retraction Notice for more detail: https://doi.org/10.1186/s13635-023-00149-w.

    Article Open access 10 May 2024
  13. Retraction Note: IoT devices and data availability optimization by ANN and KNN

    This article has been retracted. Please see the Retraction Notice for more detail: https://doi.org/10.1186/s13635-023-00145-0.

    Zhiqiang Chen, Zhihua Song, ... Yong Wei in EURASIP Journal on Information Security
    Article Open access 08 May 2024
  14. Retraction Note: Network security threat detection technology based on EPSO-BP algorithm

    This article has been retracted. Please see the Retraction Notice for more detail: https://doi.org/10.1186/s13635-024-00152-9

    Article Open access 07 May 2024
  15. Machine learning security and privacy: a review of threats and countermeasures

    Machine learning has become prevalent in transforming diverse aspects of our daily lives through intelligent digital solutions. Advanced disease...

    Anum Paracha, Junaid Arshad, ... Khalid Ismail in EURASIP Journal on Information Security
    Article Open access 23 April 2024
  16. Intelligent multi-agent model for energy-efficient communication in wireless sensor networks

    The research addresses energy consumption, latency, and network reliability challenges in wireless sensor network communication, especially in...

    Kiran Saleem, Lei Wang, ... Habib Hamam in EURASIP Journal on Information Security
    Article Open access 08 April 2024
  17. FEDDBN-IDS: federated deep belief network-based wireless network intrusion detection system

    Over the last 20 years, Wi-Fi technology has advanced to the point where most modern devices are small and rely on Wi-Fi to access the internet....

    M. Nivaashini, E. Suganya, ... Durga Prasad Bavirisetti in EURASIP Journal on Information Security
    Article Open access 04 April 2024
  18. Develo** Rib Bone Surrogates for High Dynamic Impact Assessment with Additive Manufacturing and Post-mortem Human Subjects (PMHS)-Based Evaluation

    The conception of ballistic personal protective equipment requires a comprehensive understanding of the human body’s response to dynamic loads. The...

    Marcin Jenerowicz, Thomas Haase, ... Stefan Hiermaier in Human Factors and Mechanical Engineering for Defense and Safety
    Article Open access 04 April 2024
  19. Effectiveness of a New-Generation CEW in Human Subjects with a Goal-Directed Task

    Conducted electrical weapons (CEWs) have been used by law enforcement agencies worldwide to control and restrain potentially violent persons. As new...

    S. N. Kunz, J. D. Ho, ... S. K. Knack in Human Factors and Mechanical Engineering for Defense and Safety
    Article Open access 25 March 2024
  20. Cancelable templates for secure face verification based on deep learning and random projections

    Recently, biometric recognition has become a significant field of research. The concept of cancelable biometrics (CB) has been introduced to address...

    Arslan Ali, Andrea Migliorati, ... Enrico Magli in EURASIP Journal on Information Security
    Article Open access 08 March 2024
Did you find what you were looking for? Share feedback.