default search action
Search dblp for Publications
export results for "toc:db/journals/istr/istr30.bht:"
@article{DBLP:journals/istr/BugliesiCMM16, author = {Michele Bugliesi and Stefano Calzavara and Sebastian M{\"{o}}dersheim and Paolo Modesti}, title = {Security protocol specification and verification with AnBx}, journal = {J. Inf. Secur. Appl.}, volume = {30}, pages = {46--63}, year = {2016}, url = {https://doi.org/10.1016/j.jisa.2016.05.004}, doi = {10.1016/J.JISA.2016.05.004}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/BugliesiCMM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChaturvediDMM16, author = {Ankita Chaturvedi and Ashok Kumar Das and Dheerendra Mishra and Sourav Mukhopadhyay}, title = {Design of a secure smart card-based multi-server authentication scheme}, journal = {J. Inf. Secur. Appl.}, volume = {30}, pages = {64--80}, year = {2016}, url = {https://doi.org/10.1016/j.jisa.2016.05.006}, doi = {10.1016/J.JISA.2016.05.006}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/ChaturvediDMM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/DadgostarA16, author = {H. Dadgostar and Fatemeh Afsari}, title = {Image steganography based on interval-valued intuitionistic fuzzy edge detection and modified {LSB}}, journal = {J. Inf. Secur. Appl.}, volume = {30}, pages = {94--104}, year = {2016}, url = {https://doi.org/10.1016/j.jisa.2016.07.001}, doi = {10.1016/J.JISA.2016.07.001}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/DadgostarA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/GhannJZ16, author = {Patricia Ghann and Shiguang Ju and Conghua Zhou}, title = {Testing access control policy through Change Rule and Swap Rule Algorithm {(CRSR)}}, journal = {J. Inf. Secur. Appl.}, volume = {30}, pages = {81--93}, year = {2016}, url = {https://doi.org/10.1016/j.jisa.2016.06.001}, doi = {10.1016/J.JISA.2016.06.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/GhannJZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KumarN16, author = {Jalesh Kumar and Shivananda Nirmala}, title = {A novel and efficient method based on knight moves for securing the information contents of images - {A} parallel approach}, journal = {J. Inf. Secur. Appl.}, volume = {30}, pages = {105--117}, year = {2016}, url = {https://doi.org/10.1016/j.jisa.2016.08.004}, doi = {10.1016/J.JISA.2016.08.004}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/KumarN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LuyKE16, author = {Erkam L{\"{u}}y and Zekeriya Y. Karatas and H{\"{u}}seyin Ergin}, title = {Comment on "An Enhanced and Secured {RSA} Key Generation Scheme (ESRKGS)"}, journal = {J. Inf. Secur. Appl.}, volume = {30}, pages = {1--2}, year = {2016}, url = {https://doi.org/10.1016/j.jisa.2016.03.006}, doi = {10.1016/J.JISA.2016.03.006}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/LuyKE16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MaglarasJC16, author = {Leandros A. Maglaras and Jianmin Jiang and Tiago J. Cruz}, title = {Combining ensemble methods and social network metrics for improving accuracy of {OCSVM} on intrusion detection in {SCADA} systems}, journal = {J. Inf. Secur. Appl.}, volume = {30}, pages = {15--26}, year = {2016}, url = {https://doi.org/10.1016/j.jisa.2016.04.002}, doi = {10.1016/J.JISA.2016.04.002}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/MaglarasJC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ParkinsonC16, author = {Simon Parkinson and Andrew Crampton}, title = {Identification of irregularities and allocation suggestion of relative file system permissions}, journal = {J. Inf. Secur. Appl.}, volume = {30}, pages = {27--39}, year = {2016}, url = {https://doi.org/10.1016/j.jisa.2016.04.004}, doi = {10.1016/J.JISA.2016.04.004}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/ParkinsonC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Sajedi16, author = {Hedieh Sajedi}, title = {Steganalysis based on steganography pattern discovery}, journal = {J. Inf. Secur. Appl.}, volume = {30}, pages = {3--14}, year = {2016}, url = {https://doi.org/10.1016/j.jisa.2016.04.001}, doi = {10.1016/J.JISA.2016.04.001}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Sajedi16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/WeiLH16, author = {Jianghong Wei and Wenfen Liu and Xuexian Hu}, title = {Security pitfalls of "ePASS: An expressive attribute-based signature scheme"}, journal = {J. Inf. Secur. Appl.}, volume = {30}, pages = {40--45}, year = {2016}, url = {https://doi.org/10.1016/j.jisa.2016.05.003}, doi = {10.1016/J.JISA.2016.05.003}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/WeiLH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.