Search dblp for Publications

export results for "toc:db/journals/istr/istr40.bht:"

 download as .bib file

@article{DBLP:journals/istr/Abbasinezhad-Mood18,
  author       = {Dariush Abbasinezhad{-}Mood and
                  Morteza Nikooghadam},
  title        = {Design of an enhanced message authentication scheme for smart grid
                  and its performance analysis on an {ARM} Cortex-M3 microcontroller},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {40},
  pages        = {9--19},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jisa.2018.02.007},
  doi          = {10.1016/J.JISA.2018.02.007},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/Abbasinezhad-Mood18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AlmasalhaNTK18,
  author       = {Fadi Almasalha and
                  Farid Na{\"{\i}}t{-}Abdesselam and
                  Goce Trajcevski and
                  Ashfaq A. Khokhar},
  title        = {Secure transmission of multimedia contents over low-power mobile devices},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {40},
  pages        = {183--192},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jisa.2018.04.004},
  doi          = {10.1016/J.JISA.2018.04.004},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/AlmasalhaNTK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AndriotisSS18,
  author       = {Panagiotis Andriotis and
                  Gianluca Stringhini and
                  Martina Angela Sasse},
  title        = {Studying users' adaptation to Android's run-time fine-grained access
                  control system},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {40},
  pages        = {31--43},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jisa.2018.02.004},
  doi          = {10.1016/J.JISA.2018.02.004},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/AndriotisSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/BunderNST18,
  author       = {Martin W. Bunder and
                  Abderrahmane Nitaj and
                  Willy Susilo and
                  Joseph Tonien},
  title        = {Cryptanalysis of RSA-type cryptosystems based on Lucas sequences,
                  Gaussian integers and elliptic curves},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {40},
  pages        = {193--198},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jisa.2018.04.006},
  doi          = {10.1016/J.JISA.2018.04.006},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/BunderNST18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/DeypirH18,
  author       = {Mahmood Deypir and
                  Abbas Horri},
  title        = {Instance based security risk value estimation for Android applications},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {40},
  pages        = {20--30},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jisa.2018.02.002},
  doi          = {10.1016/J.JISA.2018.02.002},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/DeypirH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HamptonBZ18,
  author       = {Nikolai Hampton and
                  Zubair A. Baig and
                  Sherali Zeadally},
  title        = {Ransomware behavioural analysis on windows platforms},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {40},
  pages        = {44--51},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jisa.2018.02.008},
  doi          = {10.1016/J.JISA.2018.02.008},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/HamptonBZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/JanaG18,
  author       = {Dipak Kumar Jana and
                  Ramkrishna Ghosh},
  title        = {Novel interval type-2 fuzzy logic controller for improving risk assessment
                  model of cyber security},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {40},
  pages        = {173--182},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jisa.2018.04.002},
  doi          = {10.1016/J.JISA.2018.04.002},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/JanaG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KarampidisKP18,
  author       = {Konstantinos Karampidis and
                  Ergina Kavallieratou and
                  Giorgos Papadourakis},
  title        = {A review of image steganalysis techniques for digital forensics},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {40},
  pages        = {217--235},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jisa.2018.04.005},
  doi          = {10.1016/J.JISA.2018.04.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/KarampidisKP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KumarKDBS18,
  author       = {Manish Kumar and
                  Sunil Kumar and
                  Mrinal Kanti Das and
                  Rajat Budhiraja and
                  Sanjeev Singh},
  title        = {Securing images with a diffusion mechanism based on Fractional Brownian
                  Motion},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {40},
  pages        = {134--144},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jisa.2018.03.007},
  doi          = {10.1016/J.JISA.2018.03.007},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/KumarKDBS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LangWC18,
  author       = {Bo Lang and
                  Jinmiao Wang and
                  Zhenhai Cao},
  title        = {Multidimensional data tight aggregation and fine-grained access control
                  in smart grid},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {40},
  pages        = {156--165},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jisa.2018.03.008},
  doi          = {10.1016/J.JISA.2018.03.008},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/LangWC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LiuW18,
  author       = {Yi{-}Ning Liu and
                  Zhen Wu},
  title        = {An improved threshold multi-level image recovery scheme},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {40},
  pages        = {166--172},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jisa.2018.03.009},
  doi          = {10.1016/J.JISA.2018.03.009},
  timestamp    = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/LiuW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/McWhirterKSA18,
  author       = {Paul R. McWhirter and
                  Kashif Kifayat and
                  Qi Shi and
                  Bob Askwith},
  title        = {{SQL} Injection Attack classification through the feature extraction
                  of {SQL} query strings using a Gap-Weighted String Subsequence Kernel},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {40},
  pages        = {199--216},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jisa.2018.04.001},
  doi          = {10.1016/J.JISA.2018.04.001},
  timestamp    = {Mon, 09 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/McWhirterKSA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MondalB18,
  author       = {Soumik Mondal and
                  Patrick Bours},
  title        = {A continuous combination of security {\&} forensics for mobile
                  devices},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {40},
  pages        = {63--77},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jisa.2018.03.001},
  doi          = {10.1016/J.JISA.2018.03.001},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/MondalB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MoodB18,
  author       = {Benjamin Mood and
                  Kevin R. B. Butler},
  title        = {{PAL:} {A} pseudo assembly language for optimizing secure function
                  evaluation in mobile devices},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {40},
  pages        = {78--91},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jisa.2018.02.005},
  doi          = {10.1016/J.JISA.2018.02.005},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/MoodB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ParkinsonK18,
  author       = {Simon Parkinson and
                  Saad Khan},
  title        = {Identifying irregularities in security event logs through an object-based
                  Chi-squared test of independence},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {40},
  pages        = {52--62},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jisa.2018.03.003},
  doi          = {10.1016/J.JISA.2018.03.003},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ParkinsonK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/PatroA18,
  author       = {K. Abhimanyu Kumar Patro and
                  Bibhudendra Acharya},
  title        = {Secure multi-level permutation operation based multiple colour image
                  encryption},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {40},
  pages        = {111--133},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jisa.2018.03.006},
  doi          = {10.1016/J.JISA.2018.03.006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/PatroA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/PengNFY18,
  author       = {Yinyin Peng and
                  Xuejing Niu and
                  Lei Fu and
                  Zhao{-}Xia Yin},
  title        = {Image authentication scheme based on reversible fragile watermarking
                  with two images},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {40},
  pages        = {236--246},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jisa.2018.04.007},
  doi          = {10.1016/J.JISA.2018.04.007},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/PengNFY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/PlateauxLVCR18,
  author       = {Aude Plateaux and
                  Patrick Lacharme and
                  Sylvain Vernois and
                  Vincent Coquet and
                  Christophe Rosenberger},
  title        = {A comparative study of card-not-present e-commerce architectures with
                  card schemes: What about privacy?},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {40},
  pages        = {103--110},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jisa.2018.01.007},
  doi          = {10.1016/J.JISA.2018.01.007},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/PlateauxLVCR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SafaMWS18,
  author       = {Nader Sohrabi Safa and
                  Carsten Maple and
                  Tim Watson and
                  Rossouw von Solms},
  title        = {Motivation and opportunity based model to reduce information security
                  insider threats in organisations},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {40},
  pages        = {247--257},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jisa.2017.11.001},
  doi          = {10.1016/J.JISA.2017.11.001},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/SafaMWS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/StillB18,
  author       = {Jeremiah D. Still and
                  Jarad Bell},
  title        = {Incognito: Shoulder-surfing resistant selection method},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {40},
  pages        = {1--8},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jisa.2018.02.006},
  doi          = {10.1016/J.JISA.2018.02.006},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/StillB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SunXZ18,
  author       = {Lixue Sun and
                  Chunxiang Xu and
                  Yuan Zhang},
  title        = {A dynamic and non-interactive boolean searchable symmetric encryption
                  in multi-client setting},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {40},
  pages        = {145--155},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jisa.2018.03.002},
  doi          = {10.1016/J.JISA.2018.03.002},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/SunXZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ThankiB18,
  author       = {Rohit M. Thanki and
                  Surekha Borra},
  title        = {A color image steganography in hybrid {FRT-DWT} domain},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {40},
  pages        = {92--102},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jisa.2018.03.004},
  doi          = {10.1016/J.JISA.2018.03.004},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/ThankiB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/hammePJ18,
  author       = {Tim Van hamme and
                  Davy Preuveneers and
                  Wouter Joosen},
  title        = {Managing distributed trust relationships for multi-modal authentication},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {40},
  pages        = {258--270},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jisa.2018.01.003},
  doi          = {10.1016/J.JISA.2018.01.003},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/hammePJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics