Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 32 matches
- 2019
- Aarti Amod Agarkar, Himanshu Agrawal:
Lightweight R-LWE-based privacy preservation scheme for smart grid network. Int. J. Inf. Comput. Secur. 11(3): 233-254 (2019) - Rakesh Ahuja, Sarabjeet Singh Bedi:
Video watermarking scheme based on IDR frames using MPEG-2 structure. Int. J. Inf. Comput. Secur. 11(6): 585-603 (2019) - Ja'afer Al-Saraireh:
A novel approach for query over encrypted data in database. Int. J. Inf. Comput. Secur. 11(6): 621-636 (2019) - Aniruddha Bhattacharjya, Xiaofeng Zhong, Jing Wang, Xing Li:
On mapping of address and port using translation. Int. J. Inf. Comput. Secur. 11(3): 214-232 (2019) - Adam J. Brown, Todd R. Andel:
What's in your honeypot: a privacy compliance perspective. Int. J. Inf. Comput. Secur. 11(3): 289-309 (2019) - Henry Carter, Patrick Traynor:
Outsourcing computation for private function evaluation. Int. J. Inf. Comput. Secur. 11(6): 525-561 (2019) - B. S. Kiruthika Devi, T. Subbulakshmi:
Cloud-based DDoS attack detection and defence system using statistical approach. Int. J. Inf. Comput. Secur. 11(4/5): 447-475 (2019) - Ahmed A. Elngar:
An efficient user authentication model for IOT-based healthcare environment. Int. J. Inf. Comput. Secur. 11(4/5): 431-446 (2019) - Kamel Mohamed Faraoun:
A novel verifiable and unconditionally secure (m, t, n)-threshold multi-secret sharing scheme using overdetermined systems of linear equations over finite Galois fields. Int. J. Inf. Comput. Secur. 11(1): 61-82 (2019) - Ouissem Ben Fredj:
SPHERES: an efficient server-side web application protection system. Int. J. Inf. Comput. Secur. 11(1): 33-60 (2019) - Xiaoming Hu, Huajie Xu, Jian Wang, WenAn Tan, Yinchun Yang:
A generic construction of identity-based proxy signature scheme in the standard model. Int. J. Inf. Comput. Secur. 11(1): 83-100 (2019) - V. Keerthika, Nandagopal Malarvizhi:
Mitigate black hole attack using bee optimised weighted trust with AODV in MANET. Int. J. Inf. Comput. Secur. 11(3): 275-288 (2019) - Burhan Ul Islam Khan, Rashidah Funke Olanrewaju, Farhat Anwar, Roohie Naaz Mir, Athaur Rahman Najeeb:
A critical insight into the effectiveness of research methods evolved to secure IoT ecosystem. Int. J. Inf. Comput. Secur. 11(4/5): 332-354 (2019) - Hamza Khemissa, Djamel Tandjaoui, Samia Bouzefrane:
An efficient authentication and key agreement scheme for e-health applications in the context of internet of things. Int. J. Inf. Comput. Secur. 11(4/5): 355-390 (2019) - Jiaying Li, Baowen Zhang:
An ontology-based approach to improve access policy administration of attribute-based access control. Int. J. Inf. Comput. Secur. 11(4/5): 391-412 (2019) - S. S. Manikandasaran, Lawrence Arockiam, P. D. Sheba Kezia Malarchelvi:
MONcrypt: a technique to ensure the confidentiality of outsourced data in cloud storage. Int. J. Inf. Comput. Secur. 11(1): 1-16 (2019) - Sheng-dong Mu, Yixiang Tian, Yiwei Luo:
A study of the internet financial interest rate risk evaluation index system in cloud computing. Int. J. Inf. Comput. Secur. 11(2): 103-119 (2019) - T. N. Nisha, Dhanya Pramod:
Sequential pattern analysis for event-based intrusion detection. Int. J. Inf. Comput. Secur. 11(4/5): 476-492 (2019) - Mohammad M. Rasheed, Norita Md Norwawi, Osman Ghazali, Munadil K. Faaeq:
Detection algorithm for internet worms scanning that used user datagram protocol. Int. J. Inf. Comput. Secur. 11(1): 17-32 (2019) - M. Revanesh, V. Sridhar, John M. Acken:
CB-ALCA: a cluster-based adaptive lightweight cryptographic algorithm for secure routing in wireless sensor networks. Int. J. Inf. Comput. Secur. 11(6): 637-662 (2019) - Hedieh Sajedi:
An ensemble algorithm for discovery of malicious web pages. Int. J. Inf. Comput. Secur. 11(3): 203-213 (2019) - Kirti Sharma, Shobha Bhatt:
SQL injection attacks - a systematic review. Int. J. Inf. Comput. Secur. 11(4/5): 493-509 (2019) - Jaryn Shen, Qingkai Zeng:
CSPS: catchy short passwords making offline and online attacks impossible. Int. J. Inf. Comput. Secur. 11(3): 255-274 (2019) - Isunuri Bala Venkateswarlu, Jagadeesh Kakarla:
Password security by encryption using an extended ADFGVX cipher. Int. J. Inf. Comput. Secur. 11(4/5): 510-523 (2019) - Haixing Wang, Guiping Xiao, Zhen Wei, Tao Hai:
Network optimisation for improving security and safety level of dangerous goods transportation based on cloud computing. Int. J. Inf. Comput. Secur. 11(2): 160-177 (2019) - Xiaolei Wang, Yuexiang Yang:
PrivacyContext: identifying malicious mobile privacy leak using program context. Int. J. Inf. Comput. Secur. 11(6): 562-584 (2019) - He Xu, Weiwei Shen, Peng Li, Keith Mayes, Ruchuan Wang, Dashen Li, Shengxiang Yang:
Novel implementation of defence strategy of relay attack based on cloud in RFID systems. Int. J. Inf. Comput. Secur. 11(2): 120-144 (2019) - Mohammed Amine Yagoub, Okba Kazar, Mounir Beggas:
A multi-agent system approach based on cryptographic algorithm for securing communications and protecting stored data in the cloud-computing environment. Int. J. Inf. Comput. Secur. 11(4/5): 413-430 (2019) - Su Yang, Shen Junwei, Wang Wei:
Reconfigurable design and implementation of nonlinear Boolean function for cloud computing security platform. Int. J. Inf. Comput. Secur. 11(2): 145-159 (2019) - Mao Yingying, Yuan Hao:
Study on data fuzzy breakpoint detection in massive dynamic data flow. Int. J. Inf. Comput. Secur. 11(6): 604-620 (2019)
skipping 2 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-23 16:39 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint