Search dblp for Publications

export results for "toc:db/journals/istr/istr29.bht:"

 download as .bib file

@article{DBLP:journals/istr/DeyRA16,
  author       = {Prakash Dey and
                  Raghvendra Singh Rohit and
                  Avishek Adhikari},
  title        = {Full key recovery of {ACORN} with a single fault},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {29},
  pages        = {57--64},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.jisa.2016.03.003},
  doi          = {10.1016/J.JISA.2016.03.003},
  timestamp    = {Thu, 25 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/DeyRA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/EkodeckN16,
  author       = {Stephane Gael Raymond Ekodeck and
                  Ren{\'{e}} Ndoundam},
  title        = {{PDF} steganography based on Chinese Remainder Theorem},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {29},
  pages        = {1--15},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.jisa.2015.11.008},
  doi          = {10.1016/J.JISA.2015.11.008},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/EkodeckN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/FollnerB16,
  author       = {Andreas Follner and
                  Eric Bodden},
  title        = {ROPocop - Dynamic mitigation of code-reuse attacks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {29},
  pages        = {16--26},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.jisa.2016.01.002},
  doi          = {10.1016/J.JISA.2016.01.002},
  timestamp    = {Tue, 01 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/FollnerB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Kaynar16,
  author       = {Kerem Kaynar},
  title        = {A taxonomy for attack graph generation and usage in network security},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {29},
  pages        = {27--56},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.jisa.2016.02.001},
  doi          = {10.1016/J.JISA.2016.02.001},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/Kaynar16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KhandujaCV16,
  author       = {Vidhi Khanduja and
                  Shampa Chakraverty and
                  Om Prakash Verma},
  title        = {Enabling information recovery with ownership using robust multiple
                  watermarks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {29},
  pages        = {80--92},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.jisa.2016.03.005},
  doi          = {10.1016/J.JISA.2016.03.005},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/KhandujaCV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/StuartKJP16,
  author       = {Celine Mary Stuart and
                  Spandana K. and
                  Dhanaraj K. J. and
                  Deepthi P. Pattathil},
  title        = {Design and implementation of hardware-efficient modified Rao-Nam scheme
                  with high security for wireless sensor networks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {29},
  pages        = {65--79},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.jisa.2016.03.004},
  doi          = {10.1016/J.JISA.2016.03.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/StuartKJP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics