Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/ijesdf/ijesdf6.bht:"
@article{DBLP:journals/ijesdf/Alashwali14, author = {Eman Alashwali}, title = {Incorporating hacking projects in computer and information security education: an empirical study}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {6}, number = {3}, pages = {185--203}, year = {2014}, url = {https://doi.org/10.1504/IJESDF.2014.064406}, doi = {10.1504/IJESDF.2014.064406}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/Alashwali14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/AlbondaY14, author = {Haider Daami R. Albonda and Sufian Yousef}, title = {Multi-carrier coded division multiple access multiplexing against multi-path fading}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {6}, number = {2}, pages = {140--146}, year = {2014}, url = {https://doi.org/10.1504/IJESDF.2014.063111}, doi = {10.1504/IJESDF.2014.063111}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/AlbondaY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/BrewsterASWAMJ14, author = {Ben Brewster and Babak Akhgar and Andrew Staniforth and David Waddington and Simon Andrews and Sarah Johnson Mitchell and Kayleigh Johnson}, title = {Towards a model for the integration of knowledge management in law enforcement agencies}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {6}, number = {1}, pages = {1--17}, year = {2014}, url = {https://doi.org/10.1504/IJESDF.2014.060169}, doi = {10.1504/IJESDF.2014.060169}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/BrewsterASWAMJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/DengLY14, author = {Lunzhi Deng and Siwei Li and Yafeng Yu}, title = {Identity-based threshold ring signcryption from pairing}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {6}, number = {2}, pages = {90--103}, year = {2014}, url = {https://doi.org/10.1504/IJESDF.2014.063093}, doi = {10.1504/IJESDF.2014.063093}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/DengLY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/DengZL14, author = {Lunzhi Deng and Jiwen Zeng and Siwei Li}, title = {A new identity-based ring signcryption scheme}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {6}, number = {4}, pages = {333--342}, year = {2014}, url = {https://doi.org/10.1504/IJESDF.2014.065736}, doi = {10.1504/IJESDF.2014.065736}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/DengZL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/Hosseinpournajarkolaei14, author = {Ali Hosseinpour Najarkolaei and Hamid Jahankhani and Amin Hosseinian Far}, title = {Vulnerability considerations for power line communication's supervisory control and data acquisition}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {6}, number = {2}, pages = {104--114}, year = {2014}, url = {https://doi.org/10.1504/IJESDF.2014.063108}, doi = {10.1504/IJESDF.2014.063108}, timestamp = {Thu, 07 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/Hosseinpournajarkolaei14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/JegatheesanM14, author = {A. Jegatheesan and D. Manimegalai}, title = {Symmetric key management for mobile ad hoc networks using novel secure and authenticated key distribution protocol-revised}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {6}, number = {4}, pages = {268--284}, year = {2014}, url = {https://doi.org/10.1504/IJESDF.2014.065738}, doi = {10.1504/IJESDF.2014.065738}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/JegatheesanM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/KumarM14, author = {Sushil Kumar and Sunil Kumar Muttoo}, title = {Robust and secure image steganographic algorithm based on matrix embedding}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {6}, number = {3}, pages = {219--240}, year = {2014}, url = {https://doi.org/10.1504/IJESDF.2014.064411}, doi = {10.1504/IJESDF.2014.064411}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/KumarM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/NwobodoJE14, author = {Ikechukwu Nwobodo and Hossein Jahankhani and Aloysius Edoh}, title = {Security challenges in the distributed cloud computing}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {6}, number = {1}, pages = {38--51}, year = {2014}, url = {https://doi.org/10.1504/IJESDF.2014.060168}, doi = {10.1504/IJESDF.2014.060168}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/NwobodoJE14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/PournouriC14, author = {Sina Pournouri and Matthew J. Craven}, title = {E-business, recent threats and security countermeasures}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {6}, number = {3}, pages = {169--184}, year = {2014}, url = {https://doi.org/10.1504/IJESDF.2014.064402}, doi = {10.1504/IJESDF.2014.064402}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/PournouriC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/PsaroudakisKSM14, author = {Ioannis Psaroudakis and Vasilios Katos and Panagiotis Saragiotis and Lilian Mitrou}, title = {A method for forensic artefact collection, analysis and incident response in environments running session initiation protocol and session description protocol}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {6}, number = {4}, pages = {241--267}, year = {2014}, url = {https://doi.org/10.1504/IJESDF.2014.065737}, doi = {10.1504/IJESDF.2014.065737}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/PsaroudakisKSM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/QiaoT14, author = {Pengshuai Qiao and Hang Tu}, title = {A security enhanced password authentication and update scheme based on elliptic curve cryptography}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {6}, number = {2}, pages = {130--139}, year = {2014}, url = {https://doi.org/10.1504/IJESDF.2014.063109}, doi = {10.1504/IJESDF.2014.063109}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/QiaoT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/RuizMSMD14, author = {M. Dolores Ruiz and Mar{\'{\i}}a J. Mart{\'{\i}}n{-}Bautista and Daniel S{\'{a}}nchez and Mar{\'{\i}}a Amparo Vila Miranda and Miguel Delgado}, title = {Anomaly detection using fuzzy association rules}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {6}, number = {1}, pages = {25--37}, year = {2014}, url = {https://doi.org/10.1504/IJESDF.2014.060171}, doi = {10.1504/IJESDF.2014.060171}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/RuizMSMD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/SaMS14, author = {V{\'{\i}}tor J. S{\'{a}} and S{\'{e}}rgio Tenreiro de Magalh{\~{a}}es and Henrique M. Dinis Santos}, title = {Enrolment time as a requirement for biometric fingerprint recognition}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {6}, number = {1}, pages = {18--24}, year = {2014}, url = {https://doi.org/10.1504/IJESDF.2014.060172}, doi = {10.1504/IJESDF.2014.060172}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/SaMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/SadrO14, author = {Ali Sadr and Raziyeh Sadat Okhovat}, title = {Thresholding attack on the BSS-based cryptosystem which has binary key}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {6}, number = {2}, pages = {81--89}, year = {2014}, url = {https://doi.org/10.1504/IJESDF.2014.063087}, doi = {10.1504/IJESDF.2014.063087}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/SadrO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/SalimTT14, author = {Abu Salim and Sachin Tripathi and Rajesh Kumar Tiwari}, title = {A secure and timestamp-based communication scheme for cloud environment}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {6}, number = {4}, pages = {319--332}, year = {2014}, url = {https://doi.org/10.1504/IJESDF.2014.065741}, doi = {10.1504/IJESDF.2014.065741}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/SalimTT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/SeuwouPU14, author = {Patrice Seuwou and Dilip Patel and George Ubakanma}, title = {Vehicular ad hoc network applications and security: a study into the economic and the legal implications}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {6}, number = {2}, pages = {115--129}, year = {2014}, url = {https://doi.org/10.1504/IJESDF.2014.063107}, doi = {10.1504/IJESDF.2014.063107}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/SeuwouPU14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/SinghDM14, author = {Amit Kumar Singh and Mayank Dave and Anand Mohan}, title = {Hybrid technique for robust and imperceptible dual watermarking using error correcting codes for application in telemedicine}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {6}, number = {4}, pages = {285--305}, year = {2014}, url = {https://doi.org/10.1504/IJESDF.2014.065739}, doi = {10.1504/IJESDF.2014.065739}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/SinghDM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/Sriratanaviriyakul14, author = {Narumon Cherry Sriratanaviriyakul and Mathews Zanda Nkhoma and Anna Lyza Felipe and Thanh Kim Cao and Quyen Ha Tran}, title = {Vietnamese privacy concerns and security in using online social networks}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {6}, number = {4}, pages = {306--318}, year = {2014}, url = {https://doi.org/10.1504/IJESDF.2014.065740}, doi = {10.1504/IJESDF.2014.065740}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/Sriratanaviriyakul14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/Tait14, author = {Bobby L. Tait}, title = {Secure cloud-based biometric authentication utilising smart devices for electronic transactions}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {6}, number = {1}, pages = {52--61}, year = {2014}, url = {https://doi.org/10.1504/IJESDF.2014.060170}, doi = {10.1504/IJESDF.2014.060170}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/Tait14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/Tait14a, author = {Bobby L. Tait}, title = {The biometric landscape - towards a sustainable biometric terminology framework}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {6}, number = {2}, pages = {147--156}, year = {2014}, url = {https://doi.org/10.1504/IJESDF.2014.063110}, doi = {10.1504/IJESDF.2014.063110}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/Tait14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/TianHY14, author = {Miaomiao Tian and Liusheng Huang and Wei Yang}, title = {Practical certificateless short signature scheme}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {6}, number = {3}, pages = {204--218}, year = {2014}, url = {https://doi.org/10.1504/IJESDF.2014.064409}, doi = {10.1504/IJESDF.2014.064409}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/TianHY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/WardmanBW14, author = {Brad Wardman and Jason Britt and Gary Warner}, title = {New tackle to catch a phisher}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {6}, number = {1}, pages = {62--80}, year = {2014}, url = {https://doi.org/10.1504/IJESDF.2014.060178}, doi = {10.1504/IJESDF.2014.060178}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/WardmanBW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/ZhaoZ14, author = {Yun Zhao and Chunming Zhang}, title = {Cryptanalysis and improvement of an authentication scheme for telecare medical information systems}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {6}, number = {3}, pages = {157--168}, year = {2014}, url = {https://doi.org/10.1504/IJESDF.2014.064401}, doi = {10.1504/IJESDF.2014.064401}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/ZhaoZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.