Search dblp for Publications

export results for "toc:db/journals/ijesdf/ijesdf6.bht:"

 download as .bib file

@article{DBLP:journals/ijesdf/Alashwali14,
  author       = {Eman Alashwali},
  title        = {Incorporating hacking projects in computer and information security
                  education: an empirical study},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {6},
  number       = {3},
  pages        = {185--203},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJESDF.2014.064406},
  doi          = {10.1504/IJESDF.2014.064406},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/Alashwali14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/AlbondaY14,
  author       = {Haider Daami R. Albonda and
                  Sufian Yousef},
  title        = {Multi-carrier coded division multiple access multiplexing against
                  multi-path fading},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {6},
  number       = {2},
  pages        = {140--146},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJESDF.2014.063111},
  doi          = {10.1504/IJESDF.2014.063111},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/AlbondaY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/BrewsterASWAMJ14,
  author       = {Ben Brewster and
                  Babak Akhgar and
                  Andrew Staniforth and
                  David Waddington and
                  Simon Andrews and
                  Sarah Johnson Mitchell and
                  Kayleigh Johnson},
  title        = {Towards a model for the integration of knowledge management in law
                  enforcement agencies},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {6},
  number       = {1},
  pages        = {1--17},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJESDF.2014.060169},
  doi          = {10.1504/IJESDF.2014.060169},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/BrewsterASWAMJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/DengLY14,
  author       = {Lunzhi Deng and
                  Siwei Li and
                  Yafeng Yu},
  title        = {Identity-based threshold ring signcryption from pairing},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {6},
  number       = {2},
  pages        = {90--103},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJESDF.2014.063093},
  doi          = {10.1504/IJESDF.2014.063093},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/DengLY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/DengZL14,
  author       = {Lunzhi Deng and
                  Jiwen Zeng and
                  Siwei Li},
  title        = {A new identity-based ring signcryption scheme},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {6},
  number       = {4},
  pages        = {333--342},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJESDF.2014.065736},
  doi          = {10.1504/IJESDF.2014.065736},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/DengZL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/Hosseinpournajarkolaei14,
  author       = {Ali Hosseinpour Najarkolaei and
                  Hamid Jahankhani and
                  Amin Hosseinian Far},
  title        = {Vulnerability considerations for power line communication's supervisory
                  control and data acquisition},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {6},
  number       = {2},
  pages        = {104--114},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJESDF.2014.063108},
  doi          = {10.1504/IJESDF.2014.063108},
  timestamp    = {Thu, 07 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/Hosseinpournajarkolaei14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/JegatheesanM14,
  author       = {A. Jegatheesan and
                  D. Manimegalai},
  title        = {Symmetric key management for mobile ad hoc networks using novel secure
                  and authenticated key distribution protocol-revised},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {6},
  number       = {4},
  pages        = {268--284},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJESDF.2014.065738},
  doi          = {10.1504/IJESDF.2014.065738},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/JegatheesanM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/KumarM14,
  author       = {Sushil Kumar and
                  Sunil Kumar Muttoo},
  title        = {Robust and secure image steganographic algorithm based on matrix embedding},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {6},
  number       = {3},
  pages        = {219--240},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJESDF.2014.064411},
  doi          = {10.1504/IJESDF.2014.064411},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/KumarM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/NwobodoJE14,
  author       = {Ikechukwu Nwobodo and
                  Hossein Jahankhani and
                  Aloysius Edoh},
  title        = {Security challenges in the distributed cloud computing},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {6},
  number       = {1},
  pages        = {38--51},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJESDF.2014.060168},
  doi          = {10.1504/IJESDF.2014.060168},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/NwobodoJE14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/PournouriC14,
  author       = {Sina Pournouri and
                  Matthew J. Craven},
  title        = {E-business, recent threats and security countermeasures},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {6},
  number       = {3},
  pages        = {169--184},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJESDF.2014.064402},
  doi          = {10.1504/IJESDF.2014.064402},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/PournouriC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/PsaroudakisKSM14,
  author       = {Ioannis Psaroudakis and
                  Vasilios Katos and
                  Panagiotis Saragiotis and
                  Lilian Mitrou},
  title        = {A method for forensic artefact collection, analysis and incident response
                  in environments running session initiation protocol and session description
                  protocol},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {6},
  number       = {4},
  pages        = {241--267},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJESDF.2014.065737},
  doi          = {10.1504/IJESDF.2014.065737},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/PsaroudakisKSM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/QiaoT14,
  author       = {Pengshuai Qiao and
                  Hang Tu},
  title        = {A security enhanced password authentication and update scheme based
                  on elliptic curve cryptography},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {6},
  number       = {2},
  pages        = {130--139},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJESDF.2014.063109},
  doi          = {10.1504/IJESDF.2014.063109},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/QiaoT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/RuizMSMD14,
  author       = {M. Dolores Ruiz and
                  Mar{\'{\i}}a J. Mart{\'{\i}}n{-}Bautista and
                  Daniel S{\'{a}}nchez and
                  Mar{\'{\i}}a Amparo Vila Miranda and
                  Miguel Delgado},
  title        = {Anomaly detection using fuzzy association rules},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {6},
  number       = {1},
  pages        = {25--37},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJESDF.2014.060171},
  doi          = {10.1504/IJESDF.2014.060171},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/RuizMSMD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/SaMS14,
  author       = {V{\'{\i}}tor J. S{\'{a}} and
                  S{\'{e}}rgio Tenreiro de Magalh{\~{a}}es and
                  Henrique M. Dinis Santos},
  title        = {Enrolment time as a requirement for biometric fingerprint recognition},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {6},
  number       = {1},
  pages        = {18--24},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJESDF.2014.060172},
  doi          = {10.1504/IJESDF.2014.060172},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/SaMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/SadrO14,
  author       = {Ali Sadr and
                  Raziyeh Sadat Okhovat},
  title        = {Thresholding attack on the BSS-based cryptosystem which has binary
                  key},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {6},
  number       = {2},
  pages        = {81--89},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJESDF.2014.063087},
  doi          = {10.1504/IJESDF.2014.063087},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/SadrO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/SalimTT14,
  author       = {Abu Salim and
                  Sachin Tripathi and
                  Rajesh Kumar Tiwari},
  title        = {A secure and timestamp-based communication scheme for cloud environment},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {6},
  number       = {4},
  pages        = {319--332},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJESDF.2014.065741},
  doi          = {10.1504/IJESDF.2014.065741},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/SalimTT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/SeuwouPU14,
  author       = {Patrice Seuwou and
                  Dilip Patel and
                  George Ubakanma},
  title        = {Vehicular ad hoc network applications and security: a study into the
                  economic and the legal implications},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {6},
  number       = {2},
  pages        = {115--129},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJESDF.2014.063107},
  doi          = {10.1504/IJESDF.2014.063107},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/SeuwouPU14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/SinghDM14,
  author       = {Amit Kumar Singh and
                  Mayank Dave and
                  Anand Mohan},
  title        = {Hybrid technique for robust and imperceptible dual watermarking using
                  error correcting codes for application in telemedicine},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {6},
  number       = {4},
  pages        = {285--305},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJESDF.2014.065739},
  doi          = {10.1504/IJESDF.2014.065739},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/SinghDM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/Sriratanaviriyakul14,
  author       = {Narumon Cherry Sriratanaviriyakul and
                  Mathews Zanda Nkhoma and
                  Anna Lyza Felipe and
                  Thanh Kim Cao and
                  Quyen Ha Tran},
  title        = {Vietnamese privacy concerns and security in using online social networks},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {6},
  number       = {4},
  pages        = {306--318},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJESDF.2014.065740},
  doi          = {10.1504/IJESDF.2014.065740},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/Sriratanaviriyakul14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/Tait14,
  author       = {Bobby L. Tait},
  title        = {Secure cloud-based biometric authentication utilising smart devices
                  for electronic transactions},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {6},
  number       = {1},
  pages        = {52--61},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJESDF.2014.060170},
  doi          = {10.1504/IJESDF.2014.060170},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/Tait14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/Tait14a,
  author       = {Bobby L. Tait},
  title        = {The biometric landscape - towards a sustainable biometric terminology
                  framework},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {6},
  number       = {2},
  pages        = {147--156},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJESDF.2014.063110},
  doi          = {10.1504/IJESDF.2014.063110},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/Tait14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/TianHY14,
  author       = {Miaomiao Tian and
                  Liusheng Huang and
                  Wei Yang},
  title        = {Practical certificateless short signature scheme},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {6},
  number       = {3},
  pages        = {204--218},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJESDF.2014.064409},
  doi          = {10.1504/IJESDF.2014.064409},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/TianHY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/WardmanBW14,
  author       = {Brad Wardman and
                  Jason Britt and
                  Gary Warner},
  title        = {New tackle to catch a phisher},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {6},
  number       = {1},
  pages        = {62--80},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJESDF.2014.060178},
  doi          = {10.1504/IJESDF.2014.060178},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/WardmanBW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/ZhaoZ14,
  author       = {Yun Zhao and
                  Chunming Zhang},
  title        = {Cryptanalysis and improvement of an authentication scheme for telecare
                  medical information systems},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {6},
  number       = {3},
  pages        = {157--168},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJESDF.2014.064401},
  doi          = {10.1504/IJESDF.2014.064401},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/ZhaoZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics