Image Life Trails Based On Contrast Reduction Models For Face Counter-Spoofing
Proof of Activity and Stake
A Multi-Gateway Authentication and Key-Agreement Scheme on Wireless Sensor Networks for IoT
Improved scheme and evaluation method for progressive Visual Cryptography
Robust Video Steganography for Social Media Sharing Based on Principal Component Analysis
Application of Failure Detection Methods to Detect Information Attacks on the Control System
Detection of illicit cryptomining using network metadata
Network Traffic Classification Model Based on Attention Mechanism and Spatiotemporal Features
Proposing A Reliable Method of Securing and Verifying the Credentials of Graduates through Blockchain
Use of SHDM in Commutative Watermarking-Encryption
Learn more about EURASIP Journal on Information Security