Search dblp for Publications

export results for "toc:db/journals/istr/istr30.bht:"

 download as .bib file

@article{DBLP:journals/istr/BugliesiCMM16,
  author       = {Michele Bugliesi and
                  Stefano Calzavara and
                  Sebastian M{\"{o}}dersheim and
                  Paolo Modesti},
  title        = {Security protocol specification and verification with AnBx},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {30},
  pages        = {46--63},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.jisa.2016.05.004},
  doi          = {10.1016/J.JISA.2016.05.004},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/BugliesiCMM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChaturvediDMM16,
  author       = {Ankita Chaturvedi and
                  Ashok Kumar Das and
                  Dheerendra Mishra and
                  Sourav Mukhopadhyay},
  title        = {Design of a secure smart card-based multi-server authentication scheme},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {30},
  pages        = {64--80},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.jisa.2016.05.006},
  doi          = {10.1016/J.JISA.2016.05.006},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/ChaturvediDMM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/DadgostarA16,
  author       = {H. Dadgostar and
                  Fatemeh Afsari},
  title        = {Image steganography based on interval-valued intuitionistic fuzzy
                  edge detection and modified {LSB}},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {30},
  pages        = {94--104},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.jisa.2016.07.001},
  doi          = {10.1016/J.JISA.2016.07.001},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/DadgostarA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/GhannJZ16,
  author       = {Patricia Ghann and
                  Shiguang Ju and
                  Conghua Zhou},
  title        = {Testing access control policy through Change Rule and Swap Rule Algorithm
                  {(CRSR)}},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {30},
  pages        = {81--93},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.jisa.2016.06.001},
  doi          = {10.1016/J.JISA.2016.06.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/GhannJZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KumarN16,
  author       = {Jalesh Kumar and
                  Shivananda Nirmala},
  title        = {A novel and efficient method based on knight moves for securing the
                  information contents of images - {A} parallel approach},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {30},
  pages        = {105--117},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.jisa.2016.08.004},
  doi          = {10.1016/J.JISA.2016.08.004},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/KumarN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LuyKE16,
  author       = {Erkam L{\"{u}}y and
                  Zekeriya Y. Karatas and
                  H{\"{u}}seyin Ergin},
  title        = {Comment on "An Enhanced and Secured {RSA} Key Generation Scheme (ESRKGS)"},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {30},
  pages        = {1--2},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.jisa.2016.03.006},
  doi          = {10.1016/J.JISA.2016.03.006},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/LuyKE16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MaglarasJC16,
  author       = {Leandros A. Maglaras and
                  Jianmin Jiang and
                  Tiago J. Cruz},
  title        = {Combining ensemble methods and social network metrics for improving
                  accuracy of {OCSVM} on intrusion detection in {SCADA} systems},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {30},
  pages        = {15--26},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.jisa.2016.04.002},
  doi          = {10.1016/J.JISA.2016.04.002},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/MaglarasJC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ParkinsonC16,
  author       = {Simon Parkinson and
                  Andrew Crampton},
  title        = {Identification of irregularities and allocation suggestion of relative
                  file system permissions},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {30},
  pages        = {27--39},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.jisa.2016.04.004},
  doi          = {10.1016/J.JISA.2016.04.004},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/ParkinsonC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Sajedi16,
  author       = {Hedieh Sajedi},
  title        = {Steganalysis based on steganography pattern discovery},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {30},
  pages        = {3--14},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.jisa.2016.04.001},
  doi          = {10.1016/J.JISA.2016.04.001},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Sajedi16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WeiLH16,
  author       = {Jianghong Wei and
                  Wenfen Liu and
                  Xuexian Hu},
  title        = {Security pitfalls of "ePASS: An expressive attribute-based signature
                  scheme"},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {30},
  pages        = {40--45},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.jisa.2016.05.003},
  doi          = {10.1016/J.JISA.2016.05.003},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/WeiLH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}