Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/istr/istr19.bht:"
@article{DBLP:journals/istr/BaiardiCTS14, author = {Fabrizio Baiardi and Fabio Cor{\`{o}} and Federico Tonelli and Daniele Sgandurra}, title = {Automating the assessment of {ICT} risk}, journal = {J. Inf. Secur. Appl.}, volume = {19}, number = {3}, pages = {182--193}, year = {2014}, url = {https://doi.org/10.1016/j.jisa.2014.04.002}, doi = {10.1016/J.JISA.2014.04.002}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/BaiardiCTS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/BeckertGSBW14, author = {Bernhard Beckert and Rajeev Gor{\'{e}} and Carsten Sch{\"{u}}rmann and Thorsten Bormer and Jian Wang}, title = {Verifying voting schemes}, journal = {J. Inf. Secur. Appl.}, volume = {19}, number = {2}, pages = {115--129}, year = {2014}, url = {https://doi.org/10.1016/j.jisa.2014.04.005}, doi = {10.1016/J.JISA.2014.04.005}, timestamp = {Tue, 30 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/BeckertGSBW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/BudurushiJV14, author = {Jurlind Budurushi and Roman J{\"{o}}ris and Melanie Volkamer}, title = {Implementing and evaluating a software-independent voting system for polling station elections}, journal = {J. Inf. Secur. Appl.}, volume = {19}, number = {2}, pages = {105--114}, year = {2014}, url = {https://doi.org/10.1016/j.jisa.2014.03.001}, doi = {10.1016/J.JISA.2014.03.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/BudurushiJV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/CamenischDELNPP14, author = {Jan Camenisch and Maria Dubovitskaya and Robert R. Enderlein and Anja Lehmann and Gregory Neven and Christian Paquin and Franz{-}Stefan Preiss}, title = {Concepts and languages for privacy-preserving attribute-based authentication}, journal = {J. Inf. Secur. Appl.}, volume = {19}, number = {1}, pages = {25--44}, year = {2014}, url = {https://doi.org/10.1016/j.jisa.2014.03.004}, doi = {10.1016/J.JISA.2014.03.004}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/CamenischDELNPP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/CohenA14, author = {Jason C. Cohen and Subrata Acharya}, title = {Towards a trusted {HDFS} storage platform: Mitigating threats to Hadoop infrastructures using hardware-accelerated encryption with TPM-rooted key protection}, journal = {J. Inf. Secur. Appl.}, volume = {19}, number = {3}, pages = {224--244}, year = {2014}, url = {https://doi.org/10.1016/j.jisa.2014.03.003}, doi = {10.1016/J.JISA.2014.03.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/CohenA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/FangWGB14, author = {Xiaole Fang and Qianxue Wang and Christophe Guyeux and Jacques M. Bahi}, title = {{FPGA} acceleration of a pseudorandom number generator based on chaotic iterations}, journal = {J. Inf. Secur. Appl.}, volume = {19}, number = {1}, pages = {78--87}, year = {2014}, url = {https://doi.org/10.1016/j.jisa.2014.02.003}, doi = {10.1016/J.JISA.2014.02.003}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/FangWGB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Faraoun14, author = {Kamel Mohamed Faraoun}, title = {A novel fast and provably secure (t, n)-threshold secret sharing construction for digital images}, journal = {J. Inf. Secur. Appl.}, volume = {19}, number = {6}, pages = {331--340}, year = {2014}, url = {https://doi.org/10.1016/j.jisa.2014.10.013}, doi = {10.1016/J.JISA.2014.10.013}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Faraoun14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/GhosalM14, author = {Sudipta Kumar Ghosal and Jyotsna Kumar Mandal}, title = {Binomial transform based fragile watermarking for image authentication}, journal = {J. Inf. Secur. Appl.}, volume = {19}, number = {4-5}, pages = {272--281}, year = {2014}, url = {https://doi.org/10.1016/j.jisa.2014.07.004}, doi = {10.1016/J.JISA.2014.07.004}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/GhosalM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HosseiniKJ14, author = {Seyed Morteza Hosseini and Hossein Karimi and Majid Vafaei Jahan}, title = {Generating pseudo-random numbers by combining two systems with complex behaviors}, journal = {J. Inf. Secur. Appl.}, volume = {19}, number = {2}, pages = {149--162}, year = {2014}, url = {https://doi.org/10.1016/j.jisa.2014.01.001}, doi = {10.1016/J.JISA.2014.01.001}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/HosseiniKJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Joaquim14, author = {Rui Joaquim}, title = {How to prove the validity of a complex ballot encryption to the voter and the public}, journal = {J. Inf. Secur. Appl.}, volume = {19}, number = {2}, pages = {130--142}, year = {2014}, url = {https://doi.org/10.1016/j.jisa.2014.04.004}, doi = {10.1016/J.JISA.2014.04.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Joaquim14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Johns14, author = {Martin Johns}, title = {Script-templates for the Content Security Policy}, journal = {J. Inf. Secur. Appl.}, volume = {19}, number = {3}, pages = {209--223}, year = {2014}, url = {https://doi.org/10.1016/j.jisa.2014.03.007}, doi = {10.1016/J.JISA.2014.03.007}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Johns14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Kambourakis14, author = {Georgios Kambourakis}, title = {Anonymity and closely related terms in the cyberspace: An analysis by example}, journal = {J. Inf. Secur. Appl.}, volume = {19}, number = {1}, pages = {2--17}, year = {2014}, url = {https://doi.org/10.1016/j.jisa.2014.04.001}, doi = {10.1016/J.JISA.2014.04.001}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/Kambourakis14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KaruppiahS14, author = {Marimuthu Karuppiah and R. Saravanan}, title = {A secure remote user mutual authentication scheme using smart cards}, journal = {J. Inf. Secur. Appl.}, volume = {19}, number = {4-5}, pages = {282--294}, year = {2014}, url = {https://doi.org/10.1016/j.jisa.2014.09.006}, doi = {10.1016/J.JISA.2014.09.006}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/KaruppiahS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KheirKHK14, author = {Mohamed S. Kheir and Heinz Kreft and Iris H{\"{o}}lken and Reinhard H. Kn{\"{o}}chel}, title = {On the physical robustness of {RF} on-chip nanostructured security}, journal = {J. Inf. Secur. Appl.}, volume = {19}, number = {4-5}, pages = {301--307}, year = {2014}, url = {https://doi.org/10.1016/j.jisa.2014.09.007}, doi = {10.1016/J.JISA.2014.09.007}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/KheirKHK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KheirKK14, author = {Mohamed S. Kheir and Heinz Kreft and Reinhard H. Kn{\"{o}}chel}, title = {A novel {RF} fingerprinting approach for hardware integrated security}, journal = {J. Inf. Secur. Appl.}, volume = {19}, number = {2}, pages = {143--148}, year = {2014}, url = {https://doi.org/10.1016/j.jisa.2014.02.001}, doi = {10.1016/J.JISA.2014.02.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/KheirKK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KuoWC14, author = {Wen{-}Chung Kuo and Hong{-}Ji Wei and Jiin{-}Chiou Cheng}, title = {An efficient and secure anonymous mobility network authentication scheme}, journal = {J. Inf. Secur. Appl.}, volume = {19}, number = {1}, pages = {18--24}, year = {2014}, url = {https://doi.org/10.1016/j.jisa.2013.12.002}, doi = {10.1016/J.JISA.2013.12.002}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/KuoWC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LaytonW14, author = {Robert Layton and Paul A. Watters}, title = {A methodology for estimating the tangible cost of data breaches}, journal = {J. Inf. Secur. Appl.}, volume = {19}, number = {6}, pages = {321--330}, year = {2014}, url = {https://doi.org/10.1016/j.jisa.2014.10.012}, doi = {10.1016/J.JISA.2014.10.012}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/LaytonW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LiRW14, author = {Shujun Li and Konrad Rieck and Alan Woodward}, title = {Special issue on threat detection, analysis and defense}, journal = {J. Inf. Secur. Appl.}, volume = {19}, number = {3}, pages = {163--164}, year = {2014}, url = {https://doi.org/10.1016/j.jisa.2014.08.001}, doi = {10.1016/J.JISA.2014.08.001}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/LiRW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/PaulV14, author = {St{\'{e}}phane Paul and Rapha{\"{e}}l Vignon{-}Davillier}, title = {Unifying traditional risk assessment approaches with attack trees}, journal = {J. Inf. Secur. Appl.}, volume = {19}, number = {3}, pages = {165--181}, year = {2014}, url = {https://doi.org/10.1016/j.jisa.2014.03.006}, doi = {10.1016/J.JISA.2014.03.006}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/PaulV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/PirouniasMP14, author = {Sotirios Pirounias and Dimitrios Mermigas and Constantinos Patsakis}, title = {The relation between information security events and firm market value, empirical evidence on recent disclosures: An extension of the {GLZ} study}, journal = {J. Inf. Secur. Appl.}, volume = {19}, number = {4-5}, pages = {257--271}, year = {2014}, url = {https://doi.org/10.1016/j.jisa.2014.07.001}, doi = {10.1016/J.JISA.2014.07.001}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/PirouniasMP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/RahbariniaPLL14, author = {Babak Rahbarinia and Roberto Perdisci and Andrea Lanzi and Kang Li}, title = {PeerRush: Mining for unwanted {P2P} traffic}, journal = {J. Inf. Secur. Appl.}, volume = {19}, number = {3}, pages = {194--208}, year = {2014}, url = {https://doi.org/10.1016/j.jisa.2014.03.002}, doi = {10.1016/J.JISA.2014.03.002}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/RahbariniaPLL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/RoyA14, author = {Partha Sarathi Roy and Avishek Adhikari}, title = {One-sided leakage-resilient privacy only two-message oblivious transfer}, journal = {J. Inf. Secur. Appl.}, volume = {19}, number = {4-5}, pages = {295--300}, year = {2014}, url = {https://doi.org/10.1016/j.jisa.2014.10.002}, doi = {10.1016/J.JISA.2014.10.002}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/RoyA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SalehiB14, author = {Saman Salehi and M. A. Balafar}, title = {Visual multi secret sharing by cylindrical random grid}, journal = {J. Inf. Secur. Appl.}, volume = {19}, number = {3}, pages = {245--255}, year = {2014}, url = {https://doi.org/10.1016/j.jisa.2014.05.003}, doi = {10.1016/J.JISA.2014.05.003}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/SalehiB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SatvatFHT14, author = {Kiavash Satvat and Matthew Forshaw and Feng Hao and Ehsan Toreini}, title = {On the privacy of private browsing - {A} forensic approach}, journal = {J. Inf. Secur. Appl.}, volume = {19}, number = {1}, pages = {88--100}, year = {2014}, url = {https://doi.org/10.1016/j.jisa.2014.02.002}, doi = {10.1016/J.JISA.2014.02.002}, timestamp = {Mon, 12 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/SatvatFHT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SchneiderTCH14, author = {Steve A. Schneider and Vanessa Teague and Chris Culnane and James Heather}, title = {Special Section on Vote-ID 2013}, journal = {J. Inf. Secur. Appl.}, volume = {19}, number = {2}, pages = {103--104}, year = {2014}, url = {https://doi.org/10.1016/j.jisa.2014.06.002}, doi = {10.1016/J.JISA.2014.06.002}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/SchneiderTCH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SunWZ14, author = {Chen Sun and Yang Wang and Jun Zheng}, title = {Dissecting pattern unlock: The effect of pattern strength meter on pattern selection}, journal = {J. Inf. Secur. Appl.}, volume = {19}, number = {4-5}, pages = {308--320}, year = {2014}, url = {https://doi.org/10.1016/j.jisa.2014.10.009}, doi = {10.1016/J.JISA.2014.10.009}, timestamp = {Mon, 01 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/SunWZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SuorantaMTRA14, author = {Sanna Suoranta and Kamran Manzoor and Asko Tontti and Joonas Ruuskanen and Tuomas Aura}, title = {Logout in single sign-on systems: Problems and solutions}, journal = {J. Inf. Secur. Appl.}, volume = {19}, number = {1}, pages = {61--77}, year = {2014}, url = {https://doi.org/10.1016/j.jisa.2014.03.005}, doi = {10.1016/J.JISA.2014.03.005}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/SuorantaMTRA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/WallerPM14, author = {Adrian Waller and Gregorio Mart{\'{\i}}nez P{\'{e}}rez and F{\'{e}}lix G{\'{o}}mez M{\'{a}}rmol}, title = {Editorial: Special issue on Identity Protection and Management}, journal = {J. Inf. Secur. Appl.}, volume = {19}, number = {1}, pages = {1}, year = {2014}, url = {https://doi.org/10.1016/j.jisa.2014.06.001}, doi = {10.1016/J.JISA.2014.06.001}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/WallerPM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/YounisKM14, author = {Younis A. Younis and Kashif Kifayat and Madjid Merabti}, title = {An access control model for cloud computing}, journal = {J. Inf. Secur. Appl.}, volume = {19}, number = {1}, pages = {45--60}, year = {2014}, url = {https://doi.org/10.1016/j.jisa.2014.04.003}, doi = {10.1016/J.JISA.2014.04.003}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/YounisKM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.