Skip to main content

Articles

Page 1 of 5

  1. Cancelable template protection techniques are indispensable to provide essential security and privacy privileges in biometric systems. This paper introduces an efficient cancelable palmprint recognition techni...

    Authors: Hanaa S. Ali, Eman I. Elhefnawy and Mohammed Abo-Zahhad
    Citation: EURASIP Journal on Information Security 2024 2024:31
  2. In the envisioned 6G landscape, data sharing is expected to become increasingly prevalent, giving rise to digital marketplaces that foster cooperation among organizations for collecting, sharing, and processin...

    Authors: Maria Zubair, Maryam Sabzevari, Vikramajeet Khatri, Sasu Tarkoma and Kimmo Hätönen
    Citation: EURASIP Journal on Information Security 2024 2024:30
  3. The Internet of Things (IoT) is now an essential component of our day-to-day lives. In any case, the association of various devices presents numerous security challenges in IoT. In some cases, ubiquitous data ...

    Authors: Arpitha T., Dharamendra Chouhan and Shreyas J.
    Citation: EURASIP Journal on Information Security 2024 2024:29
  4. In spatial crowdsourcing services, the trajectories of the workers are sent to a central server to provide more personalized services. However, for the honest-but-curious servers, it also poses a challenge in ...

    Authors: Yingcong Hong, Junyi Li, Yaping Lin, Qiao Hu and Xiehua Li
    Citation: EURASIP Journal on Information Security 2024 2024:28
  5. Internet of Things (IoT) deployments are anticipated to reach 29.42 billion by the end of 2030 at an average growth rate of 16% over the next 6 years. These deployments represent an overall growth of 201.4% in...

    Authors: Mohamed A. Taha, Mohamed M. K. Fadul, Joshua H. Tyler, Donald R. Reising and T. Daniel Loveless
    Citation: EURASIP Journal on Information Security 2024 2024:27
  6. Operational steganalysis contends with a major problem referred to as the cover-source mismatch (CSM), which is essentially a difference in distribution caused by different parameters and settings over trainin...

    Authors: Antoine Mallet, Martin Beneš and Rémi Cogranne
    Citation: EURASIP Journal on Information Security 2024 2024:26
  7. A novel quantum-safe key encapsulation algorithm, called Multivariate Polynomial Public Key (MPPK), was recently proposed by Kuang, Perepechaenko, and Barbeau. Security of the MPPK key encapsulation mechanism ...

    Authors: Randy Kuang, Maria Perepechaenko, Ryan Toth and Michel Barbeau
    Citation: EURASIP Journal on Information Security 2024 2024:23
  8. The field of digital identity innovation has grown significantly over the last 30 years, with over 6000 technology patents registered worldwide. However, many questions remain about who controls and owns our d...

    Authors: Matthew Comb and Andrew Martin
    Citation: EURASIP Journal on Information Security 2024 2024:21
  9. The orientation of emerging technologies on the Internet is moving toward decentralisation. Botnets have always been one of the biggest threats to Internet security, and botmasters have adopted the robust conc...

    Authors: Arkan Hammoodi Hasan Kabla, Achmad Husni Thamrin, Mohammed Anbar, Selvakumar Manickam and Shankar Karuppayah
    Citation: EURASIP Journal on Information Security 2024 2024:20
  10. Machine learning has become prevalent in transforming diverse aspects of our daily lives through intelligent digital solutions. Advanced disease diagnosis, autonomous vehicular systems, and automated threat de...

    Authors: Anum Paracha, Junaid Arshad, Mohamed Ben Farah and Khalid Ismail
    Citation: EURASIP Journal on Information Security 2024 2024:10
  11. The research addresses energy consumption, latency, and network reliability challenges in wireless sensor network communication, especially in military security applications. A multi-agent context-aware model ...

    Authors: Kiran Saleem, Lei Wang, Salil Bharany, Khmaies Ouahada, Ateeq Ur Rehman and Habib Hamam
    Citation: EURASIP Journal on Information Security 2024 2024:9
  12. Over the last 20 years, Wi-Fi technology has advanced to the point where most modern devices are small and rely on Wi-Fi to access the internet. Wi-Fi network security is severely questioned since there is no ...

    Authors: M. Nivaashini, E. Suganya, S. Sountharrajan, M. Prabu and Durga Prasad Bavirisetti
    Citation: EURASIP Journal on Information Security 2024 2024:8
  13. Recently, biometric recognition has become a significant field of research. The concept of cancelable biometrics (CB) has been introduced to address security concerns related to the handling of sensitive data....

    Authors: Arslan Ali, Andrea Migliorati, Tiziano Bianchi and Enrico Magli
    Citation: EURASIP Journal on Information Security 2024 2024:7
  14. Because the JPEG recompression in social networks changes the DCT coefficients of uploaded images, applying image steganography in popular image-sharing social networks requires robustness. Currently, most rob...

    Authors: Jimin Zhang, Xianfeng Zhao and Xiaolei He
    Citation: EURASIP Journal on Information Security 2023 2023:11
  15. With the growth of the Internet, network security issues have become increasingly complex, and the importance of node interaction security is also gradually becoming prominent. At present, research on network ...

    Authors: Shaojun Chen
    Citation: EURASIP Journal on Information Security 2023 2023:10
  16. Currently, sensor energy assembly in wireless sensor networks is limited, and clustering methods are not effective to improve sensor energy consumption rate. Thus, a hierarchical energy-saving routing algorith...

    Authors: Dan Wang, Qing Wu and Ming Hu
    Citation: EURASIP Journal on Information Security 2023 2023:9
  17. For dispute resolution in daily life, tamper-proof data storage and retrieval of log data are important with the incorporation of trustworthy access control for the related users and devices, while giving acce...

    Authors: Md. Ezazul Islam, Md. Rafiqul Islam, Madhu Chetty, Suryani Lim and Mehmood Chadhar
    Citation: EURASIP Journal on Information Security 2023 2023:7
  18. Traffic classification is widely used in network security and network management. Early studies have mainly focused on mapping network traffic to different unencrypted applications, but little research has bee...

    Authors: Feifei Hu, Situo Zhang, Xubin Lin, Liu Wu, Niandong Liao and Yanqi Song
    Citation: EURASIP Journal on Information Security 2023 2023:6
  19. In the recent years, the copy detection patterns (CDP) attracted a lot of attention as a link between the physical and digital worlds, which is of great interest for the internet of things and brand protection...

    Authors: Olga Taran, Joakim Tutt, Taras Holotyak, Roman Chaban, Slavi Bonev and Slava Voloshynovskiy
    Citation: EURASIP Journal on Information Security 2023 2023:4

    The Correction to this article has been published in EURASIP Journal on Information Security 2023 2023:8

  20. In this work, we present the Gaussian Class-Conditional Simplex (GCCS) loss: a novel approach for training deep robust multiclass classifiers that improves over the state-of-the-art in terms of classification ...

    Authors: Arslan Ali, Andrea Migliorati, Tiziano Bianchi and Enrico Magli
    Citation: EURASIP Journal on Information Security 2023 2023:3
  21. This paper reports the findings from an empirical study investigating the effectiveness of using intelligent voice assistants, Amazon Alexa in our case, to deliver a phishing training to users. Because intelli...

    Authors: Filipo Sharevski and Peter Jachim
    Citation: EURASIP Journal on Information Security 2022 2022:7
  22. Reliable and non-intrusive user identification and authentication on mobile devices, such as smartphones, are topical tasks today. The majority of state-of-the-art solutions in this domain are based on “device...

    Authors: Dmytro Progonov, Valentyna Cherniakova, Pavlo Kolesnichenko and Andriy Oliynyk
    Citation: EURASIP Journal on Information Security 2022 2022:6
  23. Presentation attack detection (PAD) is used to mitigate the dangers of the weakest link problem in biometric recognition, in which failure modes of one application affect the security of all other applications. S...

    Authors: Erwin Haasnoot, Luuk J. Spreeuwers and Raymond N. J. Veldhuis
    Citation: EURASIP Journal on Information Security 2022 2022:5
  24. Among the most major potential attacks against fingerprint authentication systems are those that target the stored reference templates. These threats are extremely damaging as they can lead to the invasion of ...

    Authors: Ayoub Lahmidi, Chouaib Moujahdi, Khalid Minaoui and Mohammed Rziza
    Citation: EURASIP Journal on Information Security 2022 2022:3

Who reads the journal?

Learn more about the impact the EURASIP Journal on Information Security has worldwide

Annual Journal Metrics

  • Citation Impact 2023
    Journal Impact Factor: 2.5
    5-year Journal Impact Factor: 3.0
    Source Normalized Impact per Paper (SNIP): 1.597
    SCImago Journal Rank (SJR): 1.079

    Speed 2023
    Submission to first editorial decision (median days): 44
    Submission to acceptance (median days): 141

    Usage 2023
    Downloads: 289,389
    Altmetric mentions: 0

Funding your APC

​​​​​​​Open access funding and policy support by SpringerOpen​​

​​​​We offer a free open access support service to make it easier for you to discover and apply for article-processing charge (APC) funding. Learn more here