![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Journal of Information Security and Applications, Volume 18
Volume 18, Number 1, July 2013
- Frédéric Cuppens, Nora Cuppens-Boulahia, Ernesto Damiani
, Radu State, Joaquín García-Alfaro
, Nadia Tawbi
:
Editorial. 1 - Nizar Kheir:
Behavioral classification and detection of malware through HTTP user agent anomalies. 2-13 - William M. Fitzgerald, Ultan Neville, Simon N. Foley
:
MASON: Mobile autonomic security for network access controls. 14-29 - Frédéric Cuppens, Nora Cuppens-Boulahia, Meriam Ben-Ghorbel-Talbi, Stephane Morucci, Nada Essaouini:
Smatch: Formal dynamic session management model for RBAC. 30-44 - Palaniappan Shamala
, Rabiah Ahmad, Mariana Yusoff:
A conceptual framework of info structure for information security risk assessment (ISRA). 45-52 - Sherif Saad, Issa Traoré:
Semantic aware attack scenarios reconstruction. 53-67 - Tahsin Arafat Reza, Michel Barbeau:
QaASs: QoS aware adaptive security scheme for video streaming in MANETs. 68-82 - Hadi Ahmadi, Reihaneh Safavi-Naini:
Message transmission and key establishment: General equality for weak and strong capacities. 83-95
Volume 18, Numbers 2-3, September 2013
- Lee-Ming Cheng
, K. W. Wong:
Editorial: Smart Card and RFID Security. 97 - Sheetal Kalra
, Sandeep K. Sood
:
Advanced remote user authentication protocol for multi-server architecture based on ECC. 98-107 - Olga Gadyatskaya, Fabio Massacci
, Quang Huy Nguyen, Boutheina Chetali:
Load time code validation for mobile phone Java Cards. 108-129 - Samiya Hamadouche, Jean-Louis Lanet:
Virus in a smart card: Myth or reality? 130-137 - Armin Krieg
, Johannes Grinschgl, Christian Steger, Reinhold Weiss, Holger Bock, Andreas Genser, Josef Haid:
Hardware accelerated smart-card software evaluation supported by information leakage and activity sensors. 138-147 - Nassima Kamel, Jean-Louis Lanet:
Risks induced by Web applications on smart cards. 148-156
Volume 18, Number 4, December 2013
- Sagar Gujjunoori
, B. B. Amberker:
DCT based reversible data embedding for MPEG-4 video using HVS characteristics. 157-166 - V. Santhi
, Pachiyappan Arulmozhivarman
:
Hadamard transform based adaptive visible/invisible watermarking scheme for digital images. 167-179 - Soumendu Chakraborty, Anand Singh Jalal, Charul Bhatnagar:
Secret image sharing using grayscale payload decomposition and irreversible image steganography. 180-192 - Muhamed Turkanovic, Gregor Polancic:
On the security of certain e-communication types: Risks, user awareness and recommendations. 193-205 - Thi Hanh Nguyen
, Yi Wang
, Renfa Li:
An improved ridge features extraction algorithm for distorted fingerprints matching. 206-214 - Cheng-Chi Lee
, Yan-Ming Lai, Chin-Sung Hsiao:
Cryptanalysis of a simple key assignment for access control based on polynomial. 215-218
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.