Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/istr/istr29.bht:"
@article{DBLP:journals/istr/DeyRA16, author = {Prakash Dey and Raghvendra Singh Rohit and Avishek Adhikari}, title = {Full key recovery of {ACORN} with a single fault}, journal = {J. Inf. Secur. Appl.}, volume = {29}, pages = {57--64}, year = {2016}, url = {https://doi.org/10.1016/j.jisa.2016.03.003}, doi = {10.1016/J.JISA.2016.03.003}, timestamp = {Thu, 25 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/DeyRA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/EkodeckN16, author = {Stephane Gael Raymond Ekodeck and Ren{\'{e}} Ndoundam}, title = {{PDF} steganography based on Chinese Remainder Theorem}, journal = {J. Inf. Secur. Appl.}, volume = {29}, pages = {1--15}, year = {2016}, url = {https://doi.org/10.1016/j.jisa.2015.11.008}, doi = {10.1016/J.JISA.2015.11.008}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/EkodeckN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/FollnerB16, author = {Andreas Follner and Eric Bodden}, title = {ROPocop - Dynamic mitigation of code-reuse attacks}, journal = {J. Inf. Secur. Appl.}, volume = {29}, pages = {16--26}, year = {2016}, url = {https://doi.org/10.1016/j.jisa.2016.01.002}, doi = {10.1016/J.JISA.2016.01.002}, timestamp = {Tue, 01 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/FollnerB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Kaynar16, author = {Kerem Kaynar}, title = {A taxonomy for attack graph generation and usage in network security}, journal = {J. Inf. Secur. Appl.}, volume = {29}, pages = {27--56}, year = {2016}, url = {https://doi.org/10.1016/j.jisa.2016.02.001}, doi = {10.1016/J.JISA.2016.02.001}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/Kaynar16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KhandujaCV16, author = {Vidhi Khanduja and Shampa Chakraverty and Om Prakash Verma}, title = {Enabling information recovery with ownership using robust multiple watermarks}, journal = {J. Inf. Secur. Appl.}, volume = {29}, pages = {80--92}, year = {2016}, url = {https://doi.org/10.1016/j.jisa.2016.03.005}, doi = {10.1016/J.JISA.2016.03.005}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/KhandujaCV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/StuartKJP16, author = {Celine Mary Stuart and Spandana K. and Dhanaraj K. J. and Deepthi P. Pattathil}, title = {Design and implementation of hardware-efficient modified Rao-Nam scheme with high security for wireless sensor networks}, journal = {J. Inf. Secur. Appl.}, volume = {29}, pages = {65--79}, year = {2016}, url = {https://doi.org/10.1016/j.jisa.2016.03.004}, doi = {10.1016/J.JISA.2016.03.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/StuartKJP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.