Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/ijics/ijics8.bht:"
@article{DBLP:journals/ijics/Ammayappan16, author = {Kavitha Ammayappan}, title = {Formally verified {TSM} centric privacy preserving {NFC} mobile payment framework and protocol}, journal = {Int. J. Inf. Comput. Secur.}, volume = {8}, number = {2}, pages = {181--204}, year = {2016}, url = {https://doi.org/10.1504/IJICS.2016.078126}, doi = {10.1504/IJICS.2016.078126}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Ammayappan16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/BabuIRSN16, author = {M. Swagath Babu and G. Idayachandran and A. Rajesh and T. Shankar and Rangaswamy Nakkeeran}, title = {Investigation on defected ground-plane structures to improve isolation and correlation in multi-band {MIMO} antenna}, journal = {Int. J. Inf. Comput. Secur.}, volume = {8}, number = {3}, pages = {258--271}, year = {2016}, url = {https://doi.org/10.1504/IJICS.2016.079186}, doi = {10.1504/IJICS.2016.079186}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/BabuIRSN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/BeloucifNN16, author = {Assia Beloucif and Oussama Noui and Lemnouar Noui}, title = {Design of a tweakable image encryption algorithm using chaos-based schema}, journal = {Int. J. Inf. Comput. Secur.}, volume = {8}, number = {3}, pages = {205--220}, year = {2016}, url = {https://doi.org/10.1504/IJICS.2016.079183}, doi = {10.1504/IJICS.2016.079183}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/BeloucifNN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/CS16, author = {Pramod T. C and N. R. Sunitha}, title = {Key pre-distribution schemes to support various architectural deployment models in {WSN}}, journal = {Int. J. Inf. Comput. Secur.}, volume = {8}, number = {2}, pages = {139--157}, year = {2016}, url = {https://doi.org/10.1504/IJICS.2016.078124}, doi = {10.1504/IJICS.2016.078124}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/CS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/DhavaleDPP16, author = {Sunita Vikrant Dhavale and Rajendra S. Deodhar and Debasish Pradhan and L. M. Patnaik}, title = {A robust zero watermarking algorithm for stereo audio signals}, journal = {Int. J. Inf. Comput. Secur.}, volume = {8}, number = {4}, pages = {330--346}, year = {2016}, url = {https://doi.org/10.1504/IJICS.2016.10001268}, doi = {10.1504/IJICS.2016.10001268}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/DhavaleDPP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/GayathriS16, author = {J. Gayathri and S. Subashini}, title = {A survey on security and efficiency issues in chaotic image encryption}, journal = {Int. J. Inf. Comput. Secur.}, volume = {8}, number = {4}, pages = {347--381}, year = {2016}, url = {https://doi.org/10.1504/IJICS.2016.10001271}, doi = {10.1504/IJICS.2016.10001271}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/GayathriS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/GhalebZR16, author = {Fuad A. Ghaleb and Anazida Zainal and Murad A. Rassam}, title = {Mobility information estimation algorithm using Kalman-filter for vehicular ad hoc networks}, journal = {Int. J. Inf. Comput. Secur.}, volume = {8}, number = {3}, pages = {221--240}, year = {2016}, url = {https://doi.org/10.1504/IJICS.2016.079184}, doi = {10.1504/IJICS.2016.079184}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/GhalebZR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/GhebghoubOB16, author = {Yasmina Ghebghoub and Saliha Oukid and Omar Boussaid}, title = {An {MDA} approach to secure access to data on cloud using implicit security}, journal = {Int. J. Inf. Comput. Secur.}, volume = {8}, number = {2}, pages = {107--120}, year = {2016}, url = {https://doi.org/10.1504/IJICS.2016.078120}, doi = {10.1504/IJICS.2016.078120}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/GhebghoubOB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/GnanambigaiR16, author = {J. Gnanambigai and N. Rengarajan}, title = {A novel approach to enhance the network lifetime for hybrid routing protocol}, journal = {Int. J. Inf. Comput. Secur.}, volume = {8}, number = {2}, pages = {95--106}, year = {2016}, url = {https://doi.org/10.1504/IJICS.2016.078117}, doi = {10.1504/IJICS.2016.078117}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/GnanambigaiR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Kisore16, author = {N. Raghu Kisore}, title = {A qualitative framework for evaluating buffer overflow protection mechanisms}, journal = {Int. J. Inf. Comput. Secur.}, volume = {8}, number = {3}, pages = {272--307}, year = {2016}, url = {https://doi.org/10.1504/IJICS.2016.079187}, doi = {10.1504/IJICS.2016.079187}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Kisore16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/OuadaOBT16, author = {Farah{-}Sarah Ouada and Mawloud Omar and Abdelmadjid Bouabdallah and Abdelkamel Tari}, title = {Lightweight identity-based authentication protocol for wireless sensor networks}, journal = {Int. J. Inf. Comput. Secur.}, volume = {8}, number = {2}, pages = {121--138}, year = {2016}, url = {https://doi.org/10.1504/IJICS.2016.078123}, doi = {10.1504/IJICS.2016.078123}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/OuadaOBT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/PhadikarJPM16, author = {Amit Phadikar and Poulami Jana and Baisakhi Sur Phadikar and Goutam Kumar Maity}, title = {Reversible watermarking using channel coding and lifting for cultural heritage and medical image}, journal = {Int. J. Inf. Comput. Secur.}, volume = {8}, number = {1}, pages = {34--54}, year = {2016}, url = {https://doi.org/10.1504/IJICS.2016.075308}, doi = {10.1504/IJICS.2016.075308}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/PhadikarJPM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/PraherS16, author = {Christian Praher and Michael Sonntag}, title = {Applicability of keystroke dynamics as a biometric security feature for mobile touchscreen devices with virtualised keyboards}, journal = {Int. J. Inf. Comput. Secur.}, volume = {8}, number = {1}, pages = {72--91}, year = {2016}, url = {https://doi.org/10.1504/IJICS.2016.075311}, doi = {10.1504/IJICS.2016.075311}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/PraherS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/RajaboinaRKV16, author = {RajaSekhar Rajaboina and P. Chenna Reddy and Raja Ashok Kumar and Nangil Venkatramana}, title = {Performance comparison of TCP, {UDP} and {TFRC} in static wireless environment}, journal = {Int. J. Inf. Comput. Secur.}, volume = {8}, number = {2}, pages = {158--180}, year = {2016}, url = {https://doi.org/10.1504/IJICS.2016.078125}, doi = {10.1504/IJICS.2016.078125}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/RajaboinaRKV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/SahayiniM16, author = {T. Sahayini and M. S. K. Manikandan}, title = {Enhancing the security of modern {ICT} systems with multimodal biometric cryptosystem and continuous user authentication}, journal = {Int. J. Inf. Comput. Secur.}, volume = {8}, number = {1}, pages = {55--71}, year = {2016}, url = {https://doi.org/10.1504/IJICS.2016.075310}, doi = {10.1504/IJICS.2016.075310}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/SahayiniM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/SahooT16, author = {Anoop Jyoti Sahoo and Rajesh Kumar Tiwari}, title = {A novel approach for hiding secret data in program files}, journal = {Int. J. Inf. Comput. Secur.}, volume = {8}, number = {1}, pages = {1--10}, year = {2016}, url = {https://doi.org/10.1504/IJICS.2016.075305}, doi = {10.1504/IJICS.2016.075305}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/SahooT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Sood16, author = {Sandeep K. Sood}, title = {Advanced dynamic identity-based authentication protocol using smart card}, journal = {Int. J. Inf. Comput. Secur.}, volume = {8}, number = {1}, pages = {11--33}, year = {2016}, url = {https://doi.org/10.1504/IJICS.2016.075307}, doi = {10.1504/IJICS.2016.075307}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Sood16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/TripathiS16, author = {Anshu Tripathi and Umesh Kumar Singh}, title = {Application of quantitative security measurement model for prioritisation of vulnerability mitigation: a real case study}, journal = {Int. J. Inf. Comput. Secur.}, volume = {8}, number = {4}, pages = {309--329}, year = {2016}, url = {https://doi.org/10.1504/IJICS.2016.10001267}, doi = {10.1504/IJICS.2016.10001267}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/TripathiS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/VeeramreddyV16, author = {Jyothsna Veeramreddy and Rama Prasad V. Vaddella}, title = {Anomaly-based network intrusion detection through assessing feature association impact scale}, journal = {Int. J. Inf. Comput. Secur.}, volume = {8}, number = {3}, pages = {241--257}, year = {2016}, url = {https://doi.org/10.1504/IJICS.2016.079185}, doi = {10.1504/IJICS.2016.079185}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/VeeramreddyV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/ZhangJL16, author = {Shengzhi Zhang and Xiaoqi Jia and Peng Liu}, title = {Towards service continuity for transactional applications via diverse device drivers}, journal = {Int. J. Inf. Comput. Secur.}, volume = {8}, number = {4}, pages = {382--400}, year = {2016}, url = {https://doi.org/10.1504/IJICS.2016.10001273}, doi = {10.1504/IJICS.2016.10001273}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/ZhangJL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.