
International Journal of Information and Computer Security
2025 Vol.28 No.2
| Pages | Title and author(s) |
| 145-180 | Leveraging AI for enhanced deepfake detection! Developing framework for designing safe ecosystem to safeguard digital authenticityPooja Gupta; Vijay Kumar Jain; Shrish Singh; Srabanti Maji; Shipra Agarwal DOI: 10.1504/IJICS.2025.148859 |
| 181-204 | GESKI: a gas efficient structure for processing spatial keyword queries with hybrid storage architectureMuhammad Kashif Azhar; Bin Yao; Muhammad Imran; Waqas Ali DOI: 10.1504/IJICS.2025.148858 |
| 205-226 | Self-sovereign identity scheme for decentralised vehicular named data networkingXian Guo; Jianhua Ding DOI: 10.1504/IJICS.2025.148850 |
| 227-248 | EBBSMWN: design of an energy-aware blockchain-based bioinspired security model of wireless networksBhupesh B. Lonkar; Swapnili Karmore DOI: 10.1504/IJICS.2025.148857 |
| 249-264 | Optimal-round semi-honest-quantum PAKE protocol with chaotic mapsChaonan Wang; Lu Zhang; Hongfeng Zhu DOI: 10.1504/IJICS.2025.148849 |