Search dblp for Publications

export results for "stream:journals/ejisec:"

 download as .bib file

@article{DBLP:journals/ejisec/AliMBM24,
  author       = {Arslan Ali and
                  Andrea Migliorati and
                  Tiziano Bianchi and
                  Enrico Magli},
  title        = {Cancelable templates for secure face verification based on deep learning
                  and random projections},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2024},
  number       = {1},
  pages        = {7},
  year         = {2024},
  url          = {https://doi.org/10.1186/s13635-023-00147-y},
  doi          = {10.1186/S13635-023-00147-Y},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/AliMBM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/Chen24,
  title        = {Retraction Note: The design of network security protection trust management
                  system based on an improved hidden Markov model},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2024},
  number       = {1},
  pages        = {18},
  year         = {2024},
  url          = {https://doi.org/10.1186/s13635-024-00167-2},
  doi          = {10.1186/S13635-024-00167-2},
  timestamp    = {Thu, 13 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/Chen24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/ChenSZW24a,
  title        = {Retraction Note: IoT devices and data availability optimization by
                  {ANN} and {KNN}},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2024},
  number       = {1},
  pages        = {12},
  year         = {2024},
  url          = {https://doi.org/10.1186/s13635-024-00160-9},
  doi          = {10.1186/S13635-024-00160-9},
  timestamp    = {Thu, 13 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/ChenSZW24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/KablaTAMK24,
  author       = {Arkan Hammoodi Hasan Kabla and
                  Achmad Husni Thamrin and
                  Mohammed Anbar and
                  Selvakumar Manickam and
                  Shankar Karuppayah},
  title        = {Peer-to-peer botnets: exploring behavioural characteristics and machine/deep
                  learning-based detection},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2024},
  number       = {1},
  pages        = {20},
  year         = {2024},
  url          = {https://doi.org/10.1186/s13635-024-00169-0},
  doi          = {10.1186/S13635-024-00169-0},
  timestamp    = {Mon, 10 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/KablaTAMK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/Lan24a,
  title        = {Retraction Note: Network security threat detection technology based
                  on {EPSO-BP} algorithm},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2024},
  number       = {1},
  pages        = {11},
  year         = {2024},
  url          = {https://doi.org/10.1186/s13635-024-00161-8},
  doi          = {10.1186/S13635-024-00161-8},
  timestamp    = {Thu, 13 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/Lan24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/Li24a,
  title        = {Retraction Note: Node fault diagnosis algorithm for wireless sensor
                  networks based on {BN} and {WSN}},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2024},
  number       = {1},
  pages        = {14},
  year         = {2024},
  url          = {https://doi.org/10.1186/s13635-024-00166-3},
  doi          = {10.1186/S13635-024-00166-3},
  timestamp    = {Thu, 13 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/Li24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/Li24b,
  title        = {Retraction Note: Improved {RFID} mutual authentication protocol against
                  exhaustive attack in the context of big data},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2024},
  number       = {1},
  pages        = {16},
  year         = {2024},
  url          = {https://doi.org/10.1186/s13635-024-00163-6},
  doi          = {10.1186/S13635-024-00163-6},
  timestamp    = {Thu, 13 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/Li24b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/Lv24a,
  title        = {Retraction Note: Research on privacy and secure storage protection
                  of personalized medical data based on hybrid encryption},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2024},
  number       = {1},
  pages        = {15},
  year         = {2024},
  url          = {https://doi.org/10.1186/s13635-024-00165-4},
  doi          = {10.1186/S13635-024-00165-4},
  timestamp    = {Thu, 13 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/Lv24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/NivaashiniESPB24,
  author       = {Mathappan Nivaashini and
                  Suganya Elavarasan and
                  Sountharrajan Sehar and
                  M. Prabu and
                  Durga Prasad Bavirisetti},
  title        = {{FEDDBN-IDS:} federated deep belief network-based wireless network
                  intrusion detection system},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2024},
  number       = {1},
  pages        = {8},
  year         = {2024},
  url          = {https://doi.org/10.1186/s13635-024-00156-5},
  doi          = {10.1186/S13635-024-00156-5},
  timestamp    = {Sun, 26 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/NivaashiniESPB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/ParachaAFI24,
  author       = {Anum Paracha and
                  Junaid Arshad and
                  Mohamed Ben Farah and
                  Khalid Ismail},
  title        = {Machine learning security and privacy: a review of threats and countermeasures},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2024},
  number       = {1},
  pages        = {10},
  year         = {2024},
  url          = {https://doi.org/10.1186/s13635-024-00158-3},
  doi          = {10.1186/S13635-024-00158-3},
  timestamp    = {Wed, 08 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/ParachaAFI24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/SaleemWBORH24,
  author       = {Kiran Saleem and
                  Lei Wang and
                  Salil Bharany and
                  Khmaies Ouahada and
                  Ateeq Ur Rehman and
                  Habib Hamam},
  title        = {Intelligent multi-agent model for energy-efficient communication in
                  wireless sensor networks},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2024},
  number       = {1},
  pages        = {9},
  year         = {2024},
  url          = {https://doi.org/10.1186/s13635-024-00155-6},
  doi          = {10.1186/S13635-024-00155-6},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/SaleemWBORH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/WangWH24,
  title        = {Retraction Note: Hierarchical energy-saving routing algorithm using
                  fuzzy logic in wireless sensor networks},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2024},
  number       = {1},
  pages        = {17},
  year         = {2024},
  url          = {https://doi.org/10.1186/s13635-024-00168-1},
  doi          = {10.1186/S13635-024-00168-1},
  timestamp    = {Thu, 13 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/WangWH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/Wu24a,
  title        = {Retraction Note: {RFID} tag recognition model for Internet of Things
                  for training room management},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2024},
  number       = {1},
  pages        = {19},
  year         = {2024},
  url          = {https://doi.org/10.1186/s13635-024-00164-5},
  doi          = {10.1186/S13635-024-00164-5},
  timestamp    = {Thu, 13 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/Wu24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/Yang24a,
  title        = {Retraction Note: Efficient identity security authentication method
                  based on improved {R-LWE} algorithm in IoT environment},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2024},
  number       = {1},
  pages        = {13},
  year         = {2024},
  url          = {https://doi.org/10.1186/s13635-024-00162-7},
  doi          = {10.1186/S13635-024-00162-7},
  timestamp    = {Thu, 13 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/Yang24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/ChenSZW24,
  title        = {IoT devices and data availability optimization by {ANN} and {KNN}},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2024},
  number       = {1},
  pages        = {2},
  year         = {2024},
  note         = {Withdrawn.},
  url          = {https://doi.org/10.1186/s13635-023-00145-0},
  doi          = {10.1186/S13635-023-00145-0},
  timestamp    = {Sat, 11 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/ChenSZW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/Lan24,
  title        = {Network security threat detection technology based on {EPSO-BP} algorithm},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2024},
  number       = {1},
  pages        = {6},
  year         = {2024},
  note         = {Withdrawn.},
  url          = {https://doi.org/10.1186/s13635-024-00152-9},
  doi          = {10.1186/S13635-024-00152-9},
  timestamp    = {Sat, 11 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/Lan24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/Li24,
  title        = {Improved {RFID} mutual authentication protocol against exhaustive
                  attack in the context of big data},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2024},
  number       = {1},
  pages        = {3},
  year         = {2024},
  note         = {Withdrawn.},
  url          = {https://doi.org/10.1186/s13635-024-00151-w},
  doi          = {10.1186/S13635-024-00151-W},
  timestamp    = {Mon, 13 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/Li24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/Lv24,
  title        = {Research on privacy and secure storage protection of personalized
                  medical data based on hybrid encryption},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2024},
  number       = {1},
  pages        = {1},
  year         = {2024},
  note         = {Withdrawn.},
  url          = {https://doi.org/10.1186/s13635-023-00150-3},
  doi          = {10.1186/S13635-023-00150-3},
  timestamp    = {Mon, 13 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/Lv24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/Wu24,
  title        = {{RFID} tag recognition model for Internet of Things for training room
                  management},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2024},
  number       = {1},
  pages        = {5},
  year         = {2024},
  note         = {Withdrawn.},
  url          = {https://doi.org/10.1186/s13635-024-00154-7},
  doi          = {10.1186/S13635-024-00154-7},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/Wu24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/Yang24,
  title        = {Efficient identity security authentication method based on improved
                  {R-LWE} algorithm in IoT environment},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2024},
  number       = {1},
  pages        = {4},
  year         = {2024},
  note         = {Withdrawn.},
  url          = {https://doi.org/10.1186/s13635-024-00153-8},
  doi          = {10.1186/S13635-024-00153-8},
  timestamp    = {Mon, 13 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/Yang24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/AliMBM23,
  author       = {Arslan Ali and
                  Andrea Migliorati and
                  Tiziano Bianchi and
                  Enrico Magli},
  title        = {Gaussian class-conditional simplex loss for accurate, adversarially
                  robust deep classifier training},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2023},
  number       = {1},
  pages        = {3},
  year         = {2023},
  url          = {https://doi.org/10.1186/s13635-023-00137-0},
  doi          = {10.1186/S13635-023-00137-0},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/AliMBM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/HuZLWLS23,
  author       = {Feifei Hu and
                  Situo Zhang and
                  Xubin Lin and
                  Liu Wu and
                  Niandong Liao and
                  Yanqi Song},
  title        = {Network traffic classification model based on attention mechanism
                  and spatiotemporal features},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2023},
  number       = {1},
  pages        = {6},
  year         = {2023},
  url          = {https://doi.org/10.1186/s13635-023-00141-4},
  doi          = {10.1186/S13635-023-00141-4},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/HuZLWLS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/IslamICLC23,
  author       = {Md. Ezazul Islam and
                  Md. Rafiqul Islam and
                  Madhu Chetty and
                  Suryani Lim and
                  Mehmood Chadhar},
  title        = {User authentication and access control to blockchain-based forensic
                  log data},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2023},
  number       = {1},
  pages        = {7},
  year         = {2023},
  url          = {https://doi.org/10.1186/s13635-023-00142-3},
  doi          = {10.1186/S13635-023-00142-3},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/IslamICLC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/KatikaK23,
  author       = {Balaji Rao Katika and
                  Kannan Karthik},
  title        = {Image life trails based on contrast reduction models for face counter-spoofing},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2023},
  number       = {1},
  pages        = {1},
  year         = {2023},
  url          = {https://doi.org/10.1186/s13635-022-00135-8},
  doi          = {10.1186/S13635-022-00135-8},
  timestamp    = {Fri, 10 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejisec/KatikaK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/TaranTHCBV23,
  author       = {Olga Taran and
                  Joakim Tutt and
                  Taras Holotyak and
                  Roman Chaban and
                  Slavi Bonev and
                  Slava Voloshynovskiy},
  title        = {Mobile authentication of copy detection patterns},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2023},
  number       = {1},
  pages        = {4},
  year         = {2023},
  url          = {https://doi.org/10.1186/s13635-023-00140-5},
  doi          = {10.1186/S13635-023-00140-5},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejisec/TaranTHCBV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/TaranTHCBV23a,
  author       = {Olga Taran and
                  Joakim Tutt and
                  Taras Holotyak and
                  Roman Chaban and
                  Slavi Bonev and
                  Slava Voloshynovskiy},
  title        = {Correction: Mobile authentication of copy detection patterns},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2023},
  number       = {1},
  pages        = {8},
  year         = {2023},
  url          = {https://doi.org/10.1186/s13635-023-00143-2},
  doi          = {10.1186/S13635-023-00143-2},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejisec/TaranTHCBV23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/WangLZ23,
  author       = {Xiaoning Wang and
                  Jia Liu and
                  Chunjiong Zhang},
  title        = {Network intrusion detection based on multi-domain data and ensemble-bidirectional
                  {LSTM}},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2023},
  number       = {1},
  pages        = {5},
  year         = {2023},
  url          = {https://doi.org/10.1186/s13635-023-00139-y},
  doi          = {10.1186/S13635-023-00139-Y},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/WangLZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/Yang23,
  author       = {Jen{-}Ho Yang},
  title        = {A multi-gateway authentication and key-agreement scheme on wireless
                  sensor networks for IoT},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2023},
  number       = {1},
  pages        = {2},
  year         = {2023},
  url          = {https://doi.org/10.1186/s13635-023-00138-z},
  doi          = {10.1186/S13635-023-00138-Z},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/Yang23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/ZhangZH23,
  author       = {Jimin Zhang and
                  Xianfeng Zhao and
                  Xiaolei He},
  title        = {Robust {JPEG} steganography based on the robustness classifier},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2023},
  number       = {1},
  pages        = {11},
  year         = {2023},
  url          = {https://doi.org/10.1186/s13635-023-00148-x},
  doi          = {10.1186/S13635-023-00148-X},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejisec/ZhangZH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/Chen23,
  title        = {The design of network security protection trust management system
                  based on an improved hidden Markov model},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2023},
  number       = {1},
  pages        = {1--13},
  year         = {2023},
  note         = {Withdrawn.},
  url          = {https://doi.org/10.1186/s13635-023-00146-z},
  doi          = {10.1186/S13635-023-00146-Z},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/Chen23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/Li23,
  title        = {Node fault diagnosis algorithm for wireless sensor networks based
                  on {BN} and {WSN}},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2023},
  number       = {1},
  pages        = {12},
  year         = {2023},
  note         = {Withdrawn.},
  url          = {https://doi.org/10.1186/s13635-023-00149-w},
  doi          = {10.1186/S13635-023-00149-W},
  timestamp    = {Mon, 13 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/Li23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/WangWH23,
  title        = {Hierarchical energy-saving routing algorithm using fuzzy logic in
                  wireless sensor networks},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2023},
  number       = {1},
  pages        = {9},
  year         = {2023},
  note         = {Withdrawn.},
  url          = {https://doi.org/10.1186/s13635-023-00144-1},
  doi          = {10.1186/S13635-023-00144-1},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/WangWH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/DinhO22,
  author       = {Nghia Dinh and
                  Lidia Ogiela},
  title        = {Human-artificial intelligence approaches for secure analysis in {CAPTCHA}
                  codes},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2022},
  number       = {1},
  pages        = {8},
  year         = {2022},
  url          = {https://doi.org/10.1186/s13635-022-00134-9},
  doi          = {10.1186/S13635-022-00134-9},
  timestamp    = {Thu, 05 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejisec/DinhO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/FanZZ22,
  author       = {Pingan Fan and
                  Hong Zhang and
                  Xianfeng Zhao},
  title        = {Robust video steganography for social media sharing based on principal
                  component analysis},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2022},
  number       = {1},
  pages        = {4},
  year         = {2022},
  url          = {https://doi.org/10.1186/s13635-022-00130-z},
  doi          = {10.1186/S13635-022-00130-Z},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejisec/FanZZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/HaasnootSV22,
  author       = {Erwin Haasnoot and
                  Luuk J. Spreeuwers and
                  Raymond N. J. Veldhuis},
  title        = {Presentation attack detection and biometric recognition in a challenge-response
                  formalism},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2022},
  number       = {1},
  pages        = {5},
  year         = {2022},
  url          = {https://doi.org/10.1186/s13635-022-00131-y},
  doi          = {10.1186/S13635-022-00131-Y},
  timestamp    = {Mon, 26 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/HaasnootSV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/LahmidiMMR22,
  author       = {Ayoub Lahmidi and
                  Chouaib Moujahdi and
                  Khalid Minaoui and
                  Mohammed Rziza},
  title        = {On the methodology of fingerprint template protection schemes conception
                  : meditations on the reliability},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2022},
  number       = {1},
  pages        = {3},
  year         = {2022},
  url          = {https://doi.org/10.1186/s13635-022-00129-6},
  doi          = {10.1186/S13635-022-00129-6},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/LahmidiMMR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/LinNX22,
  author       = {Jing Lin and
                  Laurent L. Njilla and
                  Kaiqi Xiong},
  title        = {Secure machine learning against adversarial samples at test time},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2022},
  number       = {1},
  pages        = {1},
  year         = {2022},
  url          = {https://doi.org/10.1186/s13635-021-00125-2},
  doi          = {10.1186/S13635-021-00125-2},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejisec/LinNX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/PicettiMBLT22,
  author       = {Francesco Picetti and
                  Sara Mandelli and
                  Paolo Bestagini and
                  Vincenzo Lipari and
                  Stefano Tubaro},
  title        = {{DIPPAS:} a deep image prior {PRNU} anonymization scheme},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2022},
  number       = {1},
  pages        = {2},
  year         = {2022},
  url          = {https://doi.org/10.1186/s13635-022-00128-7},
  doi          = {10.1186/S13635-022-00128-7},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/PicettiMBLT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/ProgonovCKO22,
  author       = {Dmytro Progonov and
                  Valentyna Cherniakova and
                  Pavel V. Kolesnichenko and
                  Andriy Oliynyk},
  title        = {Behavior-based user authentication on mobile devices in various usage
                  contexts},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2022},
  number       = {1},
  pages        = {6},
  year         = {2022},
  url          = {https://doi.org/10.1186/s13635-022-00132-x},
  doi          = {10.1186/S13635-022-00132-X},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejisec/ProgonovCKO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/SharevskiJ22,
  author       = {Filipo Sharevski and
                  Peter Jachim},
  title        = {"Alexa, What's a Phishing Email?": Training users to spot phishing
                  emails using a voice assistant},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2022},
  number       = {1},
  pages        = {7},
  year         = {2022},
  url          = {https://doi.org/10.1186/s13635-022-00133-w},
  doi          = {10.1186/S13635-022-00133-W},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejisec/SharevskiJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/ThaiTW22,
  author       = {Binh Le Thanh Thai and
                  Hidema Tanaka and
                  Kohtaro Watanabe},
  title        = {Improved scheme and evaluation method for progressive visual cryptography},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2022},
  number       = {1},
  pages        = {9},
  year         = {2022},
  url          = {https://doi.org/10.1186/s13635-022-00136-7},
  doi          = {10.1186/S13635-022-00136-7},
  timestamp    = {Wed, 07 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejisec/ThaiTW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/BattiatoGGP21,
  author       = {Sebastiano Battiato and
                  Oliver Giudice and
                  Francesco Guarnera and
                  Giovanni Puglisi},
  title        = {Estimating Previous Quantization Factors on Multiple {JPEG} Compressed
                  Images},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2021},
  number       = {1},
  pages        = {8},
  year         = {2021},
  url          = {https://doi.org/10.1186/s13635-021-00120-7},
  doi          = {10.1186/S13635-021-00120-7},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejisec/BattiatoGGP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/BorrelliBAST21,
  author       = {Clara Borrelli and
                  Paolo Bestagini and
                  Fabio Antonacci and
                  Augusto Sarti and
                  Stefano Tubaro},
  title        = {Synthetic speech detection through short-term and long-term prediction
                  traces},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2021},
  number       = {1},
  pages        = {1--14},
  year         = {2021},
  url          = {https://doi.org/10.1186/s13635-021-00116-3},
  doi          = {10.1186/S13635-021-00116-3},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/BorrelliBAST21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/CalzavaraLMO21,
  author       = {Stefano Calzavara and
                  Claudio Lucchese and
                  Federico Marcuzzi and
                  Salvatore Orlando},
  title        = {Feature partitioning for robust tree ensembles and their certification
                  in adversarial scenarios},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2021},
  number       = {1},
  pages        = {12},
  year         = {2021},
  url          = {https://doi.org/10.1186/s13635-021-00127-0},
  doi          = {10.1186/S13635-021-00127-0},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejisec/CalzavaraLMO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/Fernandez-Menduina21,
  author       = {Samuel Fern{\'{a}}ndez{-}Mendui{\~{n}}a and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {On the information leakage quantification of camera fingerprint estimates},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2021},
  number       = {1},
  pages        = {6},
  year         = {2021},
  url          = {https://doi.org/10.1186/s13635-021-00121-6},
  doi          = {10.1186/S13635-021-00121-6},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/Fernandez-Menduina21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/HaletaLS21,
  author       = {Pavlo Haleta and
                  Dmytro Likhomanov and
                  Oleksandra Sokol},
  title        = {Multitask adversarial attack with dispersion amplification},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2021},
  number       = {1},
  pages        = {10},
  year         = {2021},
  url          = {https://doi.org/10.1186/s13635-021-00124-3},
  doi          = {10.1186/S13635-021-00124-3},
  timestamp    = {Mon, 25 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/HaletaLS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/KraetzerMDH21,
  author       = {Christian Kraetzer and
                  Andrey Makrushin and
                  Jana Dittmann and
                  Mario Hildebrandt},
  title        = {Potential advantages and limitations of using information fusion in
                  media forensics - a discussion on the example of detecting face morphing
                  attacks},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2021},
  number       = {1},
  pages        = {9},
  year         = {2021},
  url          = {https://doi.org/10.1186/s13635-021-00123-4},
  doi          = {10.1186/S13635-021-00123-4},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/KraetzerMDH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/PasquiniAB21,
  author       = {Cecilia Pasquini and
                  Irene Amerini and
                  Giulia Boato},
  title        = {Media forensics on social media platforms: a survey},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2021},
  number       = {1},
  pages        = {4},
  year         = {2021},
  url          = {https://doi.org/10.1186/s13635-021-00117-2},
  doi          = {10.1186/S13635-021-00117-2},
  timestamp    = {Sun, 16 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/PasquiniAB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/ReddyRSRLA21,
  author       = {T. Rama Reddy and
                  P. V. G. D. Prasad Reddy and
                  Rayudu Srinivas and
                  Ch. V. Raghavendran and
                  R. V. S. Lalitha and
                  B. Annapurna},
  title        = {Proposing a reliable method of securing and verifying the credentials
                  of graduates through blockchain},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2021},
  number       = {1},
  pages        = {7},
  year         = {2021},
  url          = {https://doi.org/10.1186/s13635-021-00122-5},
  doi          = {10.1186/S13635-021-00122-5},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/ReddyRSRLA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/RussoSL21,
  author       = {Michele Russo and
                  Nedim Srndic and
                  Pavel Laskov},
  title        = {Detection of illicit cryptomining using network metadata},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2021},
  number       = {1},
  pages        = {11},
  year         = {2021},
  url          = {https://doi.org/10.1186/s13635-021-00126-1},
  doi          = {10.1186/S13635-021-00126-1},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejisec/RussoSL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/Schmitz21,
  author       = {Roland Schmitz},
  title        = {Use of {SHDM} in commutative watermarking encryption},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2021},
  number       = {1},
  pages        = {1},
  year         = {2021},
  url          = {https://doi.org/10.1186/s13635-020-00115-w},
  doi          = {10.1186/S13635-020-00115-W},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/Schmitz21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/TondiCHL21,
  author       = {Benedetta Tondi and
                  Andrea Costanzo and
                  Dequ Huang and
                  Bin Li},
  title        = {Boosting CNN-based primary quantization matrix estimation of double
                  {JPEG} images via a classification-like architecture},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2021},
  number       = {1},
  pages        = {5},
  year         = {2021},
  url          = {https://doi.org/10.1186/s13635-021-00119-0},
  doi          = {10.1186/S13635-021-00119-0},
  timestamp    = {Mon, 31 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejisec/TondiCHL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/YeSZ21,
  author       = {Chengqiong Ye and
                  Wenyu Shi and
                  Rui Zhang},
  title        = {Research on gray correlation analysis and situation prediction of
                  network information security},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2021},
  number       = {1},
  pages        = {3},
  year         = {2021},
  url          = {https://doi.org/10.1186/s13635-021-00118-1},
  doi          = {10.1186/S13635-021-00118-1},
  timestamp    = {Fri, 30 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/YeSZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/AbikoyeAHAK20,
  author       = {Oluwakemi Christiana Abikoye and
                  Abdullahi Abubakar and
                  Ahmad Dokoro Haruna and
                  Noah Oluwatobi Akande and
                  Anthonia Aderonke Kayode},
  title        = {A novel technique to prevent {SQL} injection and cross-site scripting
                  attacks using Knuth-Morris-Pratt string match algorithm},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2020},
  pages        = {14},
  year         = {2020},
  url          = {https://doi.org/10.1186/s13635-020-00113-y},
  doi          = {10.1186/S13635-020-00113-Y},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/AbikoyeAHAK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/CozzolinoMGPV20,
  author       = {Davide Cozzolino and
                  Francesco Marra and
                  Diego Gragnaniello and
                  Giovanni Poggi and
                  Luisa Verdoliva},
  title        = {Combining {PRNU} and noiseprint for robust and efficient device source
                  identification},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2020},
  pages        = {1},
  year         = {2020},
  url          = {https://doi.org/10.1186/s13635-020-0101-7},
  doi          = {10.1186/S13635-020-0101-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/CozzolinoMGPV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/DingRLOKH20,
  author       = {Xinyi Ding and
                  Zohreh Raziei and
                  Eric C. Larson and
                  Eli V. Olinick and
                  Paul Krueger and
                  Michael Hahsler},
  title        = {Swapped face detection using deep learning and subjective assessment},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2020},
  pages        = {6},
  year         = {2020},
  url          = {https://doi.org/10.1186/s13635-020-00109-8},
  doi          = {10.1186/S13635-020-00109-8},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/DingRLOKH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/DongKYF20,
  author       = {Keming Dong and
                  Hyoung Joong Kim and
                  Xiaohan Yu and
                  Xiaoqing Feng},
  title        = {Reversible data hiding for binary images based on adaptive overlapping
                  pattern},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2020},
  pages        = {11},
  year         = {2020},
  url          = {https://doi.org/10.1186/s13635-020-00107-w},
  doi          = {10.1186/S13635-020-00107-W},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/DongKYF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/EllavarasonGD20,
  author       = {Elakkiya Ellavarason and
                  Richard M. Guest and
                  Farzin Deravi},
  title        = {Evaluation of stability of swipe gesture authentication across usage
                  scenarios of mobile device},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2020},
  pages        = {4},
  year         = {2020},
  url          = {https://doi.org/10.1186/s13635-020-00103-0},
  doi          = {10.1186/S13635-020-00103-0},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/EllavarasonGD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/KandasamySAR20,
  author       = {Kamalanathan Kandasamy and
                  Sethuraman Srinivas and
                  Krishnashree Achuthan and
                  P. Venkat Rangan},
  title        = {IoT cyber risk: a holistic analysis of cyber risk assessment frameworks,
                  risk vectors, and risk ranking process},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2020},
  pages        = {8},
  year         = {2020},
  url          = {https://doi.org/10.1186/s13635-020-00111-0},
  doi          = {10.1186/S13635-020-00111-0},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/KandasamySAR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/MuthGABK20,
  author       = {Philipp Muth and
                  Matthias Geihs and
                  Tolga Arul and
                  Johannes Buchmann and
                  Stefan Katzenbeisser},
  title        = {{ELSA:} efficient long-term secure storage of large datasets (full
                  version) \({}^{\mbox{{\({_\ast}\)}}}\)},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2020},
  pages        = {9},
  year         = {2020},
  url          = {https://doi.org/10.1186/s13635-020-00108-9},
  doi          = {10.1186/S13635-020-00108-9},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejisec/MuthGABK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/NooriST20,
  author       = {Davood Noori and
                  Hassan Shakeri and
                  Masood Niazi Torshiz},
  title        = {Scalable, efficient, and secure {RFID} with elliptic curve cryptosystem
                  for Internet of Things in healthcare environment},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2020},
  pages        = {13},
  year         = {2020},
  url          = {https://doi.org/10.1186/s13635-020-00114-x},
  doi          = {10.1186/S13635-020-00114-X},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/NooriST20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/PasquiniB20,
  author       = {Cecilia Pasquini and
                  Rainer B{\"{o}}hme},
  title        = {Trembling triggers: exploring the sensitivity of backdoors in DNN-based
                  face recognition},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2020},
  pages        = {12},
  year         = {2020},
  url          = {https://doi.org/10.1186/s13635-020-00104-z},
  doi          = {10.1186/S13635-020-00104-Z},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejisec/PasquiniB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/SotgiuDMBFFR20,
  author       = {Angelo Sotgiu and
                  Ambra Demontis and
                  Marco Melis and
                  Battista Biggio and
                  Giorgio Fumera and
                  Xiaoyi Feng and
                  Fabio Roli},
  title        = {Deep neural rejection against adversarial examples},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2020},
  pages        = {5},
  year         = {2020},
  url          = {https://doi.org/10.1186/s13635-020-00105-y},
  doi          = {10.1186/S13635-020-00105-Y},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/SotgiuDMBFFR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/TaranRHV20,
  author       = {Olga Taran and
                  Shideh Rezaeifar and
                  Taras Holotyak and
                  Slava Voloshynovskiy},
  title        = {Machine learning through cryptographic glasses: combating adversarial
                  attacks by key-based diversified aggregation},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2020},
  pages        = {10},
  year         = {2020},
  url          = {https://doi.org/10.1186/s13635-020-00106-x},
  doi          = {10.1186/S13635-020-00106-X},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejisec/TaranRHV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/TianWL20,
  author       = {Junfeng Tian and
                  Zilong Wang and
                  Zhen Li},
  title        = {Low-cost data partitioning and encrypted backup scheme for defending
                  against co-resident attacks},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2020},
  pages        = {7},
  year         = {2020},
  url          = {https://doi.org/10.1186/s13635-020-00110-1},
  doi          = {10.1186/S13635-020-00110-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/TianWL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/WhiskerdKJLEVDH20,
  author       = {Nicholas Whiskerd and
                  Nicklas K{\"{o}}rtge and
                  Kris J{\"{u}}rgens and
                  Kevin Lamsh{\"{o}}ft and
                  Salatiel Ezennaya{-}Gomez and
                  Claus Vielhauer and
                  Jana Dittmann and
                  Mario Hildebrandt},
  title        = {Keystroke biometrics in the encrypted domain: a first study on search
                  suggestion functions of web search engines},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2020},
  pages        = {2},
  year         = {2020},
  url          = {https://doi.org/10.1186/s13635-020-0100-8},
  doi          = {10.1186/S13635-020-0100-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/WhiskerdKJLEVDH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/WrightS20,
  author       = {Carrie Wright and
                  Darryl Stewart},
  title        = {Understanding visual lip-based biometric authentication for mobile
                  devices},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2020},
  pages        = {3},
  year         = {2020},
  url          = {https://doi.org/10.1186/s13635-020-0102-6},
  doi          = {10.1186/S13635-020-0102-6},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/WrightS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/ZhangAFA20,
  author       = {Hanwei Zhang and
                  Yannis Avrithis and
                  Teddy Furon and
                  Laurent Amsaleg},
  title        = {Smooth adversarial examples},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2020},
  pages        = {15},
  year         = {2020},
  url          = {https://doi.org/10.1186/s13635-020-00112-z},
  doi          = {10.1186/S13635-020-00112-Z},
  timestamp    = {Thu, 26 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejisec/ZhangAFA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/BuchmannGHKS19,
  author       = {Johannes Buchmann and
                  Matthias Geihs and
                  Kay Hamacher and
                  Stefan Katzenbeisser and
                  Sebastian Stammler},
  title        = {Long-term integrity protection of genomic data},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2019},
  pages        = {15},
  year         = {2019},
  url          = {https://doi.org/10.1186/s13635-019-0099-x},
  doi          = {10.1186/S13635-019-0099-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/BuchmannGHKS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/DeshpandeMT19,
  author       = {Pallavi Deshpande and
                  Prachi Mukherji and
                  Anil S. Tavildar},
  title        = {Accuracy enhancement of biometric recognition using iterative weights
                  optimization algorithm},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2019},
  pages        = {6},
  year         = {2019},
  url          = {https://doi.org/10.1186/s13635-019-0089-z},
  doi          = {10.1186/S13635-019-0089-Z},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/DeshpandeMT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/FangXXZ19,
  author       = {Xing Fang and
                  Maochao Xu and
                  Shouhuai Xu and
                  Peng Zhao},
  title        = {A deep learning framework for predicting cyber attacks rates},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2019},
  pages        = {5},
  year         = {2019},
  url          = {https://doi.org/10.1186/s13635-019-0090-6},
  doi          = {10.1186/S13635-019-0090-6},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/FangXXZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/GehrmannRJ19,
  author       = {Christian Gehrmann and
                  Marcus Rodan and
                  Niklas J{\"{o}}nsson},
  title        = {Metadata filtering for user-friendly centralized biometric authentication},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2019},
  pages        = {7},
  year         = {2019},
  url          = {https://doi.org/10.1186/s13635-019-0093-3},
  doi          = {10.1186/S13635-019-0093-3},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/GehrmannRJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/HuSMWZ19,
  author       = {Yahong Hu and
                  Xia Sheng and
                  Jiafa Mao and
                  Kaihui Wang and
                  Danhong Zhong},
  title        = {Spark-based real-time proactive image tracking protection model},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2019},
  pages        = {3},
  year         = {2019},
  url          = {https://doi.org/10.1186/s13635-019-0086-2},
  doi          = {10.1186/S13635-019-0086-2},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/HuSMWZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/KnirschUE19,
  author       = {Fabian Knirsch and
                  Andreas Unterweger and
                  Dominik Engel},
  title        = {Implementing a blockchain from scratch: why, how, and what we learned},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2019},
  pages        = {2},
  year         = {2019},
  url          = {https://doi.org/10.1186/s13635-019-0085-3},
  doi          = {10.1186/S13635-019-0085-3},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/KnirschUE19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/KucukGM19,
  author       = {Kubilay Ahmet K{\"{u}}{\c{c}}{\"{u}}k and
                  David Grawrock and
                  Andrew Martin},
  title        = {Managing confidentiality leaks through private algorithms on Software
                  Guard eXtensions {(SGX)} enclaves},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2019},
  pages        = {14},
  year         = {2019},
  url          = {https://doi.org/10.1186/s13635-019-0091-5},
  doi          = {10.1186/S13635-019-0091-5},
  timestamp    = {Tue, 26 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejisec/KucukGM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/MouawiECK19,
  author       = {Riwa Mouawi and
                  Imad H. Elhajj and
                  Ali Chehab and
                  Ayman I. Kayssi},
  title        = {Crowdsourcing for click fraud detection},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2019},
  pages        = {11},
  year         = {2019},
  url          = {https://doi.org/10.1186/s13635-019-0095-1},
  doi          = {10.1186/S13635-019-0095-1},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejisec/MouawiECK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/NembhardCE19,
  author       = {Fitzroy Nembhard and
                  Marco M. Carvalho and
                  Thomas C. Eskridge},
  title        = {Towards the application of recommender systems to secure coding},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2019},
  pages        = {9},
  year         = {2019},
  url          = {https://doi.org/10.1186/s13635-019-0092-4},
  doi          = {10.1186/S13635-019-0092-4},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/NembhardCE19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/RizzoBM19,
  author       = {Stefano Giovanni Rizzo and
                  Flavio Bertini and
                  Danilo Montesi},
  title        = {Fine-grain watermarking for intellectual property protection},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2019},
  pages        = {10},
  year         = {2019},
  url          = {https://doi.org/10.1186/s13635-019-0094-2},
  doi          = {10.1186/S13635-019-0094-2},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejisec/RizzoBM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/SharmaGGG19,
  author       = {Jivitesh Sharma and
                  Charul Giri and
                  Ole{-}Christoffer Granmo and
                  Morten Goodwin},
  title        = {Multi-layer intrusion detection system with ExtraTrees feature selection,
                  extreme learning machine ensemble, and softmax aggregation},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2019},
  pages        = {16},
  year         = {2019},
  url          = {https://doi.org/10.1186/s13635-019-0098-y},
  doi          = {10.1186/S13635-019-0098-Y},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/SharmaGGG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/StankoCS19,
  author       = {Taras Stanko and
                  Bin Chen and
                  Boris Skoric},
  title        = {Fingerprint template protection using minutia-pair spectral representations},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2019},
  pages        = {12},
  year         = {2019},
  url          = {https://doi.org/10.1186/s13635-019-0096-0},
  doi          = {10.1186/S13635-019-0096-0},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/StankoCS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/YangZWM19,
  author       = {Wenjun Yang and
                  Jiaying Zhang and
                  Chundong Wang and
                  Xiu{-}liang Mo},
  title        = {Situation prediction of large-scale Internet of Things network security},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2019},
  pages        = {13},
  year         = {2019},
  url          = {https://doi.org/10.1186/s13635-019-0097-z},
  doi          = {10.1186/S13635-019-0097-Z},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/YangZWM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/YerimaAS19,
  author       = {Suleiman Y. Yerima and
                  Mohammed K. Alzaylaee and
                  Sakir Sezer},
  title        = {Machine learning-based dynamic analysis of Android apps with improved
                  code coverage},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2019},
  pages        = {4},
  year         = {2019},
  url          = {https://doi.org/10.1186/s13635-019-0087-1},
  doi          = {10.1186/S13635-019-0087-1},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/YerimaAS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/ZhangMCZ19,
  author       = {Chengli Zhang and
                  Wenping Ma and
                  Hefeng Chen and
                  Feifei Zhao},
  title        = {A new method of generating hard random lattices with short bases},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2019},
  pages        = {8},
  year         = {2019},
  url          = {https://doi.org/10.1186/s13635-019-0088-0},
  doi          = {10.1186/S13635-019-0088-0},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/ZhangMCZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/ZhaoSPKK19,
  author       = {Juan Zhao and
                  Sachin Shetty and
                  Jan Wei Pan and
                  Charles A. Kamhoua and
                  Kevin A. Kwiat},
  title        = {Transfer learning for detecting unknown network attacks},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2019},
  pages        = {1},
  year         = {2019},
  url          = {https://doi.org/10.1186/s13635-019-0084-4},
  doi          = {10.1186/S13635-019-0084-4},
  timestamp    = {Tue, 08 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/ZhaoSPKK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/CabajKKM18,
  author       = {Krzysztof Cabaj and
                  Zbigniew Kotulski and
                  Bogdan Ksiezopolski and
                  Wojciech Mazurczyk},
  title        = {Cybersecurity: trends, issues, and challenges},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2018},
  pages        = {10},
  year         = {2018},
  url          = {https://doi.org/10.1186/s13635-018-0080-0},
  doi          = {10.1186/S13635-018-0080-0},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/CabajKKM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/CaiV18,
  author       = {Hang Cai and
                  Krishna K. Venkatasubramanian},
  title        = {Detecting data manipulation attacks on physiological sensor measurements
                  in wearable medical systems},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2018},
  pages        = {13},
  year         = {2018},
  url          = {https://doi.org/10.1186/s13635-018-0082-y},
  doi          = {10.1186/S13635-018-0082-Y},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/CaiV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/ChopraBJ18,
  author       = {Khyati Chopra and
                  Ranjan Bose and
                  Anupam Joshi},
  title        = {Secrecy outage of threshold-based cooperative relay network with and
                  without direct links},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2018},
  pages        = {7},
  year         = {2018},
  url          = {https://doi.org/10.1186/s13635-018-0077-8},
  doi          = {10.1186/S13635-018-0077-8},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejisec/ChopraBJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/GeraB18,
  author       = {Jaideep Gera and
                  Bhanu Prakash Battula},
  title        = {Detection of spoofed and non-spoofed DDoS attacks and discriminating
                  them from flash crowds},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2018},
  pages        = {9},
  year         = {2018},
  url          = {https://doi.org/10.1186/s13635-018-0079-6},
  doi          = {10.1186/S13635-018-0079-6},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/GeraB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/HameedA18,
  author       = {Sufian Hameed and
                  Usman Murad Ali},
  title        = {{HADEC:} Hadoop-based live DDoS detection framework},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2018},
  pages        = {11},
  year         = {2018},
  url          = {https://doi.org/10.1186/s13635-018-0081-z},
  doi          = {10.1186/S13635-018-0081-Z},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/HameedA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/KotulskiNSTABOW18,
  author       = {Zbigniew Kotulski and
                  Tomasz Wojciech Nowak and
                  Mariusz Sepczuk and
                  Marcin Alan Tunia and
                  Rafal Artych and
                  Krzysztof Bocianiak and
                  Tomasz Osko and
                  Jean{-}Philippe Wary},
  title        = {Towards constructive approach to end-to-end slice isolation in 5G
                  networks},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2018},
  pages        = {2},
  year         = {2018},
  url          = {https://doi.org/10.1186/s13635-018-0072-0},
  doi          = {10.1186/S13635-018-0072-0},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/KotulskiNSTABOW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/NavarroLDP18,
  author       = {Julio Navarro and
                  V{\'{e}}ronique Legrand and
                  Aline Deruyver and
                  Pierre Parrend},
  title        = {{OMMA:} open architecture for Operator-guided Monitoring of Multi-step
                  Attacks},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2018},
  pages        = {6},
  year         = {2018},
  url          = {https://doi.org/10.1186/s13635-018-0075-x},
  doi          = {10.1186/S13635-018-0075-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/NavarroLDP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/PadillaM018,
  author       = {Jonathan Mart{\'{\i}}nez Padilla and
                  Uwe Meyer{-}Baese and
                  Simon Foo},
  title        = {Security evaluation of Tree Parity Re-keying Machine implementations
                  utilizing side-channel emissions},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2018},
  pages        = {3},
  year         = {2018},
  url          = {https://doi.org/10.1186/s13635-018-0073-z},
  doi          = {10.1186/S13635-018-0073-Z},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/PadillaM018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/ParrendNGDC18,
  author       = {Pierre Parrend and
                  Julio Navarro and
                  Fabio Guigou and
                  Aline Deruyver and
                  Pierre Collet},
  title        = {Foundations and applications of artificial Intelligence for zero-day
                  and multi-step attack detection},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2018},
  pages        = {4},
  year         = {2018},
  url          = {https://doi.org/10.1186/s13635-018-0074-y},
  doi          = {10.1186/S13635-018-0074-Y},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/ParrendNGDC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/Sharevski18,
  author       = {Filipo Sharevski},
  title        = {Towards 5G cellular network forensics},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2018},
  pages        = {8},
  year         = {2018},
  url          = {https://doi.org/10.1186/s13635-018-0078-7},
  doi          = {10.1186/S13635-018-0078-7},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/Sharevski18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/SitekK18,
  author       = {Albert Sitek and
                  Zbigniew Kotulski},
  title        = {POS-originated transaction traces as a source of contextual information
                  for risk management systems in {EFT} transactions},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2018},
  pages        = {5},
  year         = {2018},
  url          = {https://doi.org/10.1186/s13635-018-0076-9},
  doi          = {10.1186/S13635-018-0076-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/SitekK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/WangL18,
  author       = {Liangming Wang and
                  Fagui Liu},
  title        = {A trusted measurement model based on dynamic policy and privacy protection
                  in IaaS security domain},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2018},
  pages        = {1},
  year         = {2018},
  url          = {https://doi.org/10.1186/s13635-018-0071-1},
  doi          = {10.1186/S13635-018-0071-1},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/WangL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/XuLLSS18,
  author       = {Guangwei Xu and
                  Miaolin Lai and
                  Jing Li and
                  Li Sun and
                  Xiujin Shi},
  title        = {A generic integrity verification algorithm of version files for cloud
                  deduplication data storage},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2018},
  pages        = {12},
  year         = {2018},
  url          = {https://doi.org/10.1186/s13635-018-0083-x},
  doi          = {10.1186/S13635-018-0083-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/XuLLSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/AldwairiAJ17,
  author       = {Monther Aldwairi and
                  Ansam M. Abu{-}Dalo and
                  Moath H. A. Jarrah},
  title        = {Pattern matching of signature-based {IDS} using Myers algorithm under
                  MapReduce framework},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2017},
  pages        = {9},
  year         = {2017},
  url          = {https://doi.org/10.1186/s13635-017-0062-7},
  doi          = {10.1186/S13635-017-0062-7},
  timestamp    = {Wed, 26 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/AldwairiAJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/BaiYW17,
  author       = {Xiaolong Bai and
                  Jie Yin and
                  Yu{-}Ping Wang},
  title        = {Sensor Guardian: prevent privacy inference on Android sensors},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2017},
  pages        = {10},
  year         = {2017},
  url          = {https://doi.org/10.1186/s13635-017-0061-8},
  doi          = {10.1186/S13635-017-0061-8},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/BaiYW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/BrownAD17,
  author       = {James Brown and
                  Mohd Anwar and
                  Gerry V. Dozier},
  title        = {An artificial immunity approach to malware detection in a mobile platform},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2017},
  pages        = {7},
  year         = {2017},
  url          = {https://doi.org/10.1186/s13635-017-0059-2},
  doi          = {10.1186/S13635-017-0059-2},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/BrownAD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/DeShuD17,
  author       = {DeShu Lin and
                  Ding Feng},
  title        = {Research on transmission of technology of downward information security
                  for wellbore trajectory control},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2017},
  pages        = {17},
  year         = {2017},
  url          = {https://doi.org/10.1186/s13635-017-0069-0},
  doi          = {10.1186/S13635-017-0069-0},
  timestamp    = {Mon, 27 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejisec/DeShuD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/DoldG17,
  author       = {Florian Dold and
                  Christian Grothoff},
  title        = {Byzantine set-union consensus using efficient set reconciliation},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2017},
  pages        = {14},
  year         = {2017},
  url          = {https://doi.org/10.1186/s13635-017-0066-3},
  doi          = {10.1186/S13635-017-0066-3},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/DoldG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/DrewHM17,
  author       = {Jake Drew and
                  Michael Hahsler and
                  Tyler Moore},
  title        = {Polymorphic malware detection using sequence classification methods
                  and ensembles},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2017},
  pages        = {2},
  year         = {2017},
  url          = {https://doi.org/10.1186/s13635-017-0055-6},
  doi          = {10.1186/S13635-017-0055-6},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/DrewHM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/GallosKF17,
  author       = {Lazaros K. Gallos and
                  Maciej Korczynski and
                  Nina H. Fefferman},
  title        = {Anomaly detection through information sharing under different topologies},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2017},
  pages        = {5},
  year         = {2017},
  url          = {https://doi.org/10.1186/s13635-017-0056-5},
  doi          = {10.1186/S13635-017-0056-5},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/GallosKF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/GuoFC17,
  author       = {Zhen Guo and
                  Yu Fu and
                  Chunjie Cao},
  title        = {Secure first-price sealed-bid auction scheme},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2017},
  pages        = {16},
  year         = {2017},
  url          = {https://doi.org/10.1186/s13635-017-0068-1},
  doi          = {10.1186/S13635-017-0068-1},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/GuoFC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/IliouKTVK17,
  author       = {Christos Iliou and
                  George Kalpakis and
                  Theodora Tsikrika and
                  Stefanos Vrochidis and
                  Ioannis Kompatsiaris},
  title        = {Hybrid focused crawling on the Surface and the Dark Web},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2017},
  pages        = {11},
  year         = {2017},
  url          = {https://doi.org/10.1186/s13635-017-0064-5},
  doi          = {10.1186/S13635-017-0064-5},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/IliouKTVK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/JiangK17,
  author       = {Feng Jiang and
                  Brian King},
  title        = {A novel quality assessment for visual secret sharing schemes},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2017},
  pages        = {1},
  year         = {2017},
  url          = {https://doi.org/10.1186/s13635-016-0053-0},
  doi          = {10.1186/S13635-016-0053-0},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/JiangK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/KnirschEE17,
  author       = {Fabian Knirsch and
                  G{\"{u}}nther Eibl and
                  Dominik Engel},
  title        = {Multi-resolution privacy-enhancing technologies for smart metering},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2017},
  pages        = {6},
  year         = {2017},
  url          = {https://doi.org/10.1186/s13635-017-0058-3},
  doi          = {10.1186/S13635-017-0058-3},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/KnirschEE17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/MotzekGDGM17,
  author       = {Alexander Motzek and
                  Gustavo Gonzalez Granadillo and
                  Herv{\'{e}} Debar and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a and
                  Ralf M{\"{o}}ller},
  title        = {Selection of Pareto-efficient response plans based on financial and
                  operational assessments},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2017},
  pages        = {12},
  year         = {2017},
  url          = {https://doi.org/10.1186/s13635-017-0063-6},
  doi          = {10.1186/S13635-017-0063-6},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejisec/MotzekGDGM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/OglazaLZBB17,
  author       = {Arnaud Oglaza and
                  Romain Laborde and
                  Pascale Zarat{\'{e}} and
                  Abdelmalek Benzekri and
                  Fran{\c{c}}ois Barr{\`{e}}re},
  title        = {A new approach for managing Android permissions: learning users' preferences},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2017},
  pages        = {13},
  year         = {2017},
  url          = {https://doi.org/10.1186/s13635-017-0065-4},
  doi          = {10.1186/S13635-017-0065-4},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejisec/OglazaLZBB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/Rubio-HernanCG17,
  author       = {Jose Rubio{-}Hernan and
                  Luca De Cicco and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a},
  title        = {On the use of watermark-based schemes to detect cyber-physical attacks},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2017},
  pages        = {8},
  year         = {2017},
  url          = {https://doi.org/10.1186/s13635-017-0060-9},
  doi          = {10.1186/S13635-017-0060-9},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/Rubio-HernanCG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/ShullaniFISP17,
  author       = {Dasara Shullani and
                  Marco Fontani and
                  Massimo Iuliani and
                  Omar Al Shaya and
                  Alessandro Piva},
  title        = {{VISION:} a video and image dataset for source identification},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2017},
  pages        = {15},
  year         = {2017},
  url          = {https://doi.org/10.1186/s13635-017-0067-2},
  doi          = {10.1186/S13635-017-0067-2},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/ShullaniFISP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/SokolMH17,
  author       = {Pavol Sokol and
                  Jakub M{\'{\i}}sek and
                  Martin Hus{\'{a}}k},
  title        = {Honeypots and honeynets: issues of privacy},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2017},
  pages        = {4},
  year         = {2017},
  url          = {https://doi.org/10.1186/s13635-017-0057-4},
  doi          = {10.1186/S13635-017-0057-4},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/SokolMH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/VeugenDEPVW17,
  author       = {Thijs Veugen and
                  Jeroen Doumen and
                  Zekeriya Erkin and
                  Gaetano Pellegrino and
                  Sicco Verwer and
                  Jos H. Weber},
  title        = {Improved privacy of dynamic group services},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2017},
  pages        = {3},
  year         = {2017},
  url          = {https://doi.org/10.1186/s13635-017-0054-7},
  doi          = {10.1186/S13635-017-0054-7},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/VeugenDEPVW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/YangYW17,
  author       = {Guang Yang and
                  Shuofeng Yu and
                  Shouwen Wen},
  title        = {Research on fault diagnosis system of hall for workshop of meta-synthetic
                  engineering based on information fusion},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2017},
  pages        = {18},
  year         = {2017},
  url          = {https://doi.org/10.1186/s13635-017-0070-7},
  doi          = {10.1186/S13635-017-0070-7},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/YangYW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/BahwairethTBJT16,
  author       = {Khadijah Bahwaireth and
                  Lo'ai Tawalbeh and
                  Elhadj Benkhelifa and
                  Yaser Jararweh and
                  Mohammad Tawalbeh},
  title        = {Experimental comparison of simulation tools for efficient cloud and
                  mobile cloud computing applications},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2016},
  pages        = {15},
  year         = {2016},
  url          = {https://doi.org/10.1186/s13635-016-0039-y},
  doi          = {10.1186/S13635-016-0039-Y},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/BahwairethTBJT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/Bottinger16,
  author       = {Konstantin B{\"{o}}ttinger},
  title        = {Fuzzing binaries with L{\'{e}}vy flight swarms},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2016},
  pages        = {28},
  year         = {2016},
  url          = {https://doi.org/10.1186/s13635-016-0052-1},
  doi          = {10.1186/S13635-016-0052-1},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/Bottinger16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/ChenLLZZ16,
  author       = {Jingning Chen and
                  Fenlin Liu and
                  Xiangyang Luo and
                  Fan Zhao and
                  Guang Zhu},
  title        = {A landmark calibration-based {IP} geolocation approach},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2016},
  pages        = {4},
  year         = {2016},
  url          = {https://doi.org/10.1186/s13635-015-0029-5},
  doi          = {10.1186/S13635-015-0029-5},
  timestamp    = {Fri, 13 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/ChenLLZZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/ChengZYL16,
  author       = {Hang Cheng and
                  Xinpeng Zhang and
                  Jiang Yu and
                  Fengyong Li},
  title        = {Markov process-based retrieval for encrypted {JPEG} images},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2016},
  pages        = {1},
  year         = {2016},
  url          = {https://doi.org/10.1186/s13635-015-0028-6},
  doi          = {10.1186/S13635-015-0028-6},
  timestamp    = {Tue, 01 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejisec/ChengZYL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/ChoCSCK16,
  author       = {Geumhwan Cho and
                  Junsung Cho and
                  Youngbae Song and
                  Donghyun Choi and
                  Hyoungshick Kim},
  title        = {Combating online fraud attacks in mobile-based advertising},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2016},
  pages        = {2},
  year         = {2016},
  url          = {https://doi.org/10.1186/s13635-015-0027-7},
  doi          = {10.1186/S13635-015-0027-7},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/ChoCSCK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/DK16,
  author       = {Pramodh Krishna D. and
                  Venu Gopal Rao K.},
  title        = {Generalized weighted tree similarity algorithms for taxonomy trees},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2016},
  pages        = {12},
  year         = {2016},
  url          = {https://doi.org/10.1186/s13635-016-0035-2},
  doi          = {10.1186/S13635-016-0035-2},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/DK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/El-BoozAE16,
  author       = {Sheren A. El{-}Booz and
                  Gamal Attiya and
                  Nawal A. El{-}Fishawy},
  title        = {A secure cloud storage system combining time-based one-time password
                  and automatic blocker protocol},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2016},
  pages        = {13},
  year         = {2016},
  url          = {https://doi.org/10.1186/s13635-016-0037-0},
  doi          = {10.1186/S13635-016-0037-0},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejisec/El-BoozAE16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/FanYFWC16,
  author       = {Kefeng Fan and
                  Xiangzhen Yao and
                  Xiaohe Fan and
                  Yong Wang and
                  Mingjie Chen},
  title        = {A new usage control protocol for data protection of cloud environment},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2016},
  pages        = {7},
  year         = {2016},
  url          = {https://doi.org/10.1186/s13635-016-0031-6},
  doi          = {10.1186/S13635-016-0031-6},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/FanYFWC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/GhaziMRSH16,
  author       = {Yumna Ghazi and
                  Rahat Masood and
                  Abid Rauf and
                  Muhammad Awais Shibli and
                  Osman Hassan},
  title        = {DB-SECaaS: a cloud-based protection system for document-oriented NoSQL
                  databases},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2016},
  pages        = {16},
  year         = {2016},
  url          = {https://doi.org/10.1186/s13635-016-0040-5},
  doi          = {10.1186/S13635-016-0040-5},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejisec/GhaziMRSH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/GuptaYC16,
  author       = {Brij B. Gupta and
                  Shingo Yamaguchi and
                  Pethuru Raj Chelliah},
  title        = {Guest editorial special issues on security trends in mobile cloud
                  computing, web, and social networking},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2016},
  pages        = {27},
  year         = {2016},
  url          = {https://doi.org/10.1186/s13635-016-0051-2},
  doi          = {10.1186/S13635-016-0051-2},
  timestamp    = {Fri, 26 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejisec/GuptaYC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/HuberTWRS16,
  author       = {Manuel Huber and
                  Benjamin Taubmann and
                  Sascha Wessel and
                  Hans P. Reiser and
                  Georg Sigl},
  title        = {A flexible framework for mobile device forensics based on cold boot
                  attacks},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2016},
  pages        = {17},
  year         = {2016},
  url          = {https://doi.org/10.1186/s13635-016-0041-4},
  doi          = {10.1186/S13635-016-0041-4},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/HuberTWRS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/HummerKNFP16,
  author       = {Matthias Hummer and
                  Michael Kunz and
                  Michael Netter and
                  Ludwig Fuchs and
                  G{\"{u}}nther Pernul},
  title        = {Adaptive identity and access management - contextual data based policies},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2016},
  pages        = {19},
  year         = {2016},
  url          = {https://doi.org/10.1186/s13635-016-0043-2},
  doi          = {10.1186/S13635-016-0043-2},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/HummerKNFP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/HusakCJC16,
  author       = {Martin Hus{\'{a}}k and
                  Milan Cerm{\'{a}}k and
                  Tom{\'{a}}s Jirs{\'{\i}}k and
                  Pavel Celeda},
  title        = {{HTTPS} traffic analysis and client identification using passive {SSL/TLS}
                  fingerprinting},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2016},
  pages        = {6},
  year         = {2016},
  url          = {https://doi.org/10.1186/s13635-016-0030-7},
  doi          = {10.1186/S13635-016-0030-7},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/HusakCJC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/JainG16,
  author       = {Ankit Kumar Jain and
                  Brij B. Gupta},
  title        = {A novel approach to protect against phishing attacks at client side
                  using auto-updated white-list},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2016},
  pages        = {9},
  year         = {2016},
  url          = {https://doi.org/10.1186/s13635-016-0034-3},
  doi          = {10.1186/S13635-016-0034-3},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/JainG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/KotzerkeHDHSVH16,
  author       = {Johannes Kotzerke and
                  Hao Hao and
                  Stephen A. Davis and
                  Robert Hayes and
                  Luuk J. Spreeuwers and
                  Raymond N. J. Veldhuis and
                  Kathy J. Horadam},
  title        = {Identification performance of evidential value estimation for ridge-based
                  biometrics},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2016},
  pages        = {24},
  year         = {2016},
  url          = {https://doi.org/10.1186/s13635-016-0050-3},
  doi          = {10.1186/S13635-016-0050-3},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/KotzerkeHDHSVH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/Laarhoven16,
  author       = {Thijs Laarhoven},
  title        = {Asymptotics of fingerprinting and group testing: capacity-achieving
                  log-likelihood decoders},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2016},
  pages        = {3},
  year         = {2016},
  url          = {https://doi.org/10.1186/s13635-015-0026-8},
  doi          = {10.1186/S13635-015-0026-8},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/Laarhoven16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/MachadoBSS16,
  author       = {Raphael C. S. Machado and
                  Davidson R. Boccardo and
                  Vin{\'{\i}}cius Gusm{\~{a}}o Pereira de S{\'{a}} and
                  Jayme Luiz Szwarcfiter},
  title        = {Software control and intellectual property protection in cyber-physical
                  systems},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2016},
  pages        = {8},
  year         = {2016},
  url          = {https://doi.org/10.1186/s13635-016-0032-5},
  doi          = {10.1186/S13635-016-0032-5},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/MachadoBSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/NateghizadEL16,
  author       = {Majid Nateghizad and
                  Zekeriya Erkin and
                  Reginald L. Lagendijk},
  title        = {An efficient privacy-preserving comparison protocol in smart metering
                  systems},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2016},
  pages        = {11},
  year         = {2016},
  url          = {https://doi.org/10.1186/s13635-016-0033-4},
  doi          = {10.1186/S13635-016-0033-4},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/NateghizadEL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/QiPS16,
  author       = {Qilin Qi and
                  Dongming Peng and
                  Hamid Sharif},
  title        = {{DST} approach to enhance audio quality on lost audio packet steganography},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2016},
  pages        = {20},
  year         = {2016},
  url          = {https://doi.org/10.1186/s13635-016-0046-z},
  doi          = {10.1186/S13635-016-0046-Z},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/QiPS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/RathgebTWB16,
  author       = {Christian Rathgeb and
                  Benjamin Tams and
                  Johannes Wagner and
                  Christoph Busch},
  title        = {Unlinkable improved multi-biometric iris fuzzy vault},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2016},
  pages        = {26},
  year         = {2016},
  url          = {https://doi.org/10.1186/s13635-016-0049-9},
  doi          = {10.1186/S13635-016-0049-9},
  timestamp    = {Tue, 05 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejisec/RathgebTWB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/SrndicL16,
  author       = {Nedim Srndic and
                  Pavel Laskov},
  title        = {Hidost: a static machine-learning-based detector of malicious files},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2016},
  pages        = {22},
  year         = {2016},
  url          = {https://doi.org/10.1186/s13635-016-0045-0},
  doi          = {10.1186/S13635-016-0045-0},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/SrndicL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/ToriiKYITM16,
  author       = {Naoya Torii and
                  Hirotaka Kokubo and
                  Dai Yamamoto and
                  Kouichi Itoh and
                  Masahiko Takenaka and
                  Tsutomu Matsumoto},
  title        = {{ASIC} implementation of random number generators using {SR} latches
                  and its evaluation},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2016},
  pages        = {10},
  year         = {2016},
  url          = {https://doi.org/10.1186/s13635-016-0036-1},
  doi          = {10.1186/S13635-016-0036-1},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/ToriiKYITM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/UllrichCFW16,
  author       = {Johanna Ullrich and
                  Jordan Cropper and
                  Peter Fr{\"{u}}hwirt and
                  Edgar R. Weippl},
  title        = {The role and security of firewalls in cyber-physical cloud computing},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2016},
  pages        = {18},
  year         = {2016},
  url          = {https://doi.org/10.1186/s13635-016-0042-3},
  doi          = {10.1186/S13635-016-0042-3},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/UllrichCFW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/UnterwegerKEE16,
  author       = {Andreas Unterweger and
                  Fabian Knirsch and
                  G{\"{u}}nther Eibl and
                  Dominik Engel},
  title        = {Privacy-preserving load profile matching for tariff decisions in smart
                  grids},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2016},
  pages        = {21},
  year         = {2016},
  url          = {https://doi.org/10.1186/s13635-016-0044-1},
  doi          = {10.1186/S13635-016-0044-1},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/UnterwegerKEE16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/WangZ16,
  author       = {Qing Wang and
                  Rong Zhang},
  title        = {Double {JPEG} compression forensics based on a convolutional neural
                  network},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2016},
  pages        = {23},
  year         = {2016},
  url          = {https://doi.org/10.1186/s13635-016-0047-y},
  doi          = {10.1186/S13635-016-0047-Y},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/WangZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/WildHFU16,
  author       = {Peter Wild and
                  Heinz Hofbauer and
                  James M. Ferryman and
                  Andreas Uhl},
  title        = {Quality-based iris segmentation-level fusion},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2016},
  pages        = {25},
  year         = {2016},
  url          = {https://doi.org/10.1186/s13635-016-0048-x},
  doi          = {10.1186/S13635-016-0048-X},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/WildHFU16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/XuH16,
  author       = {Hansong Xu and
                  Kun Hua},
  title        = {Secured {ECG} signal transmission for human emotional stress classification
                  in wireless body area networks},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2016},
  pages        = {5},
  year         = {2016},
  url          = {https://doi.org/10.1186/s13635-015-0024-x},
  doi          = {10.1186/S13635-015-0024-X},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/XuH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/ZhangMW16,
  author       = {Shuhui Zhang and
                  Xiangxu Meng and
                  Lianhai Wang},
  title        = {An adaptive approach for Linux memory analysis based on kernel code
                  reconstruction},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2016},
  pages        = {14},
  year         = {2016},
  url          = {https://doi.org/10.1186/s13635-016-0038-z},
  doi          = {10.1186/S13635-016-0038-Z},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/ZhangMW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/0001GM15,
  author       = {Jos{\'{e}} Marinho and
                  Jorge Granjal and
                  Edmundo Monteiro},
  title        = {A survey on security attacks and countermeasures with primary user
                  detection in cognitive radio networks},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2015},
  pages        = {4},
  year         = {2015},
  url          = {https://doi.org/10.1186/s13635-015-0021-0},
  doi          = {10.1186/S13635-015-0021-0},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/0001GM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/BarmanSC15,
  author       = {Subhas Barman and
                  Debasis Samanta and
                  Samiran Chattopadhyay},
  title        = {Fingerprint-based crypto-biometric system for network security},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2015},
  pages        = {3},
  year         = {2015},
  url          = {https://doi.org/10.1186/s13635-015-0020-1},
  doi          = {10.1186/S13635-015-0020-1},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/BarmanSC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/BianchiPS15,
  author       = {Tiziano Bianchi and
                  Alessandro Piva and
                  Dasara Shullani},
  title        = {Anticollusion solutions for asymmetric fingerprinting protocols based
                  on client side embedding},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2015},
  pages        = {6},
  year         = {2015},
  url          = {https://doi.org/10.1186/s13635-015-0023-y},
  doi          = {10.1186/S13635-015-0023-Y},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/BianchiPS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/FuchsHMF15,
  author       = {Karl{-}Peter Fuchs and
                  Dominik Herrmann and
                  Andrea Micheloni and
                  Hannes Federrath},
  title        = {Laribus: privacy-preserving detection of fake {SSL} certificates with
                  a social {P2P} notary network},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2015},
  pages        = {1},
  year         = {2015},
  url          = {https://doi.org/10.1186/s13635-014-0018-0},
  doi          = {10.1186/S13635-014-0018-0},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/FuchsHMF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/QiaoRCZ15,
  author       = {Tong Qiao and
                  Florent Retraint and
                  R{\'{e}}mi Cogranne and
                  Cathel Zitzmann},
  title        = {Steganalysis of JSteg algorithm using hypothesis testing theory},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2015},
  pages        = {2},
  year         = {2015},
  url          = {https://doi.org/10.1186/s13635-015-0019-7},
  doi          = {10.1186/S13635-015-0019-7},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/QiaoRCZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/RaghavendraB15,
  author       = {Ramachandra Raghavendra and
                  Christoph Busch},
  title        = {Texture based features for robust palmprint recognition: a comparative
                  study},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2015},
  pages        = {5},
  year         = {2015},
  url          = {https://doi.org/10.1186/s13635-015-0022-z},
  doi          = {10.1186/S13635-015-0022-Z},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/RaghavendraB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/RassSB15,
  author       = {Stefan Rass and
                  Peter Schartner and
                  Monika Brodbeck},
  title        = {Private function evaluation by local two-party computation},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2015},
  pages        = {7},
  year         = {2015},
  url          = {https://doi.org/10.1186/s13635-015-0025-9},
  doi          = {10.1186/S13635-015-0025-9},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/RassSB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/BianchiRFRP14,
  author       = {Tiziano Bianchi and
                  Alessia De Rosa and
                  Marco Fontani and
                  Giovanni Rocciolo and
                  Alessandro Piva},
  title        = {Detection and localization of double compression in {MP3} audio tracks},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2014},
  pages        = {10},
  year         = {2014},
  url          = {https://doi.org/10.1186/1687-417X-2014-10},
  doi          = {10.1186/1687-417X-2014-10},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/BianchiRFRP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/ChabchoubCD14,
  author       = {Yousra Chabchoub and
                  Raja Chiky and
                  Betul Dogan},
  title        = {How can sliding HyperLogLog and {EWMA} detect port scan attacks in
                  {IP} traffic?},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2014},
  pages        = {5},
  year         = {2014},
  url          = {https://doi.org/10.1186/1687-417X-2014-5},
  doi          = {10.1186/1687-417X-2014-5},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/ChabchoubCD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/CiptasariRS14,
  author       = {Rimba Whidiana Ciptasari and
                  Kyung Hyune Rhee and
                  Kouichi Sakurai},
  title        = {An enhanced audio ownership protection scheme based on visual cryptography},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2014},
  pages        = {2},
  year         = {2014},
  url          = {https://doi.org/10.1186/1687-417X-2014-2},
  doi          = {10.1186/1687-417X-2014-2},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/CiptasariRS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/DrewM14,
  author       = {Jake Drew and
                  Tyler Moore},
  title        = {Optimized combined-clustering methods for finding replicated criminal
                  websites},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2014},
  pages        = {14},
  year         = {2014},
  url          = {https://doi.org/10.1186/s13635-014-0014-4},
  doi          = {10.1186/S13635-014-0014-4},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/DrewM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/EssaouiniCCK14,
  author       = {Nada Essaouini and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Anas Abou El Kalam},
  title        = {Conflict detection in obligation with deadline policies},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2014},
  pages        = {13},
  year         = {2014},
  url          = {https://doi.org/10.1186/s13635-014-0013-5},
  doi          = {10.1186/S13635-014-0013-5},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/EssaouiniCCK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/HoHSB14,
  author       = {Anh Thu Phan Ho and
                  Bao An Mai Hoang and
                  Wadih Sawaya and
                  Patrick Bas},
  title        = {Document authentication using graphical codes: reliable performance
                  analysis and channel optimization},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2014},
  pages        = {9},
  year         = {2014},
  url          = {https://doi.org/10.1186/1687-417X-2014-9},
  doi          = {10.1186/1687-417X-2014-9},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/HoHSB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/HolubFD14,
  author       = {Vojtech Holub and
                  Jessica J. Fridrich and
                  Tom{\'{a}}s Denemark},
  title        = {Universal distortion function for steganography in an arbitrary domain},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2014},
  pages        = {1},
  year         = {2014},
  url          = {https://doi.org/10.1186/1687-417X-2014-1},
  doi          = {10.1186/1687-417X-2014-1},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/HolubFD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/HuWSSJS14,
  author       = {Xin Hu and
                  Ting Wang and
                  Marc Ph. Stoecklin and
                  Douglas Lee Schales and
                  Jiyong Jang and
                  Reiner Sailer},
  title        = {{MUSE:} asset risk scoring in enterprise network with mutually reinforced
                  reputation propagation},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2014},
  pages        = {17},
  year         = {2014},
  url          = {https://doi.org/10.1186/s13635-014-0017-1},
  doi          = {10.1186/S13635-014-0017-1},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/HuWSSJS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/IsacenkovaTCFB14,
  author       = {Jelena Isacenkova and
                  Olivier Thonnard and
                  Andrei Costin and
                  Aur{\'{e}}lien Francillon and
                  Davide Balzarotti},
  title        = {Inside the {SCAM} Jungle: {A} Closer Look at 419 Scam Email Operations},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2014},
  pages        = {4},
  year         = {2014},
  url          = {https://doi.org/10.1186/1687-417X-2014-4},
  doi          = {10.1186/1687-417X-2014-4},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejisec/IsacenkovaTCFB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/IslamMG14,
  author       = {Saiful Islam and
                  Mangat Rai Modi and
                  Phalguni Gupta},
  title        = {Edge-based image steganography},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2014},
  pages        = {8},
  year         = {2014},
  url          = {https://doi.org/10.1186/1687-417X-2014-8},
  doi          = {10.1186/1687-417X-2014-8},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/IslamMG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/JenischU14,
  author       = {Stefan Jenisch and
                  Andreas Uhl},
  title        = {A detailed evaluation of format-compliant encryption methods for {JPEG}
                  XR-compressed images},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2014},
  pages        = {6},
  year         = {2014},
  url          = {https://doi.org/10.1186/1687-417X-2014-6},
  doi          = {10.1186/1687-417X-2014-6},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/JenischU14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/JoverLR14,
  author       = {Roger Piqueras Jover and
                  Joshua Lackey and
                  Arvind Raghavan},
  title        = {Enhancing the security of {LTE} networks against jamming attacks},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2014},
  pages        = {7},
  year         = {2014},
  url          = {https://doi.org/10.1186/1687-417X-2014-7},
  doi          = {10.1186/1687-417X-2014-7},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/JoverLR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/KarapistoliE14,
  author       = {Eirini D. Karapistoli and
                  Anastasios A. Economides},
  title        = {{ADLU:} a novel anomaly detection and location-attribution algorithm
                  for {UWB} wireless sensor networks},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2014},
  pages        = {3},
  year         = {2014},
  url          = {https://doi.org/10.1186/1687-417X-2014-3},
  doi          = {10.1186/1687-417X-2014-3},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/KarapistoliE14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/NarangHV14,
  author       = {Pratik Narang and
                  Chittaranjan Hota and
                  V. N. Venkatakrishnan},
  title        = {PeerShark: flow-clustering and conversation-generation for malicious
                  peer-to-peer traffic identification},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2014},
  pages        = {15},
  year         = {2014},
  url          = {https://doi.org/10.1186/s13635-014-0015-3},
  doi          = {10.1186/S13635-014-0015-3},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/NarangHV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/RichthammerNRSP14,
  author       = {Christian Richthammer and
                  Michael Netter and
                  Moritz Riesner and
                  Johannes S{\"{a}}nger and
                  G{\"{u}}nther Pernul},
  title        = {Taxonomy of social network data types},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2014},
  pages        = {11},
  year         = {2014},
  url          = {https://doi.org/10.1186/s13635-014-0011-7},
  doi          = {10.1186/S13635-014-0011-7},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/RichthammerNRSP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/ShulmanW14,
  author       = {Haya Schulmann and
                  Michael Waidner},
  title        = {{DNSSEC} for cyber forensics},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2014},
  pages        = {16},
  year         = {2014},
  url          = {https://doi.org/10.1186/s13635-014-0016-2},
  doi          = {10.1186/S13635-014-0016-2},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/ShulmanW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/AbdulCG13,
  author       = {Wadood Abdul and
                  Philippe Carr{\'{e}} and
                  Philippe Gaborit},
  title        = {Error correcting codes for robust color wavelet watermarking},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2013},
  pages        = {1},
  year         = {2013},
  url          = {https://doi.org/10.1186/1687-417X-2013-1},
  doi          = {10.1186/1687-417X-2013-1},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/AbdulCG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/AmeriniBCC13,
  author       = {Irene Amerini and
                  Mauro Barni and
                  Roberto Caldelli and
                  Andrea Costanzo},
  title        = {Removal and injection of keypoints for SIFT-based copy-move counter-forensics},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2013},
  pages        = {8},
  year         = {2013},
  url          = {https://doi.org/10.1186/1687-417X-2013-8},
  doi          = {10.1186/1687-417X-2013-8},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/AmeriniBCC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/ErkinVTL13,
  author       = {Zekeriya Erkin and
                  Thijs Veugen and
                  Tomas Toft and
                  Reginald L. Lagendijk},
  title        = {Privacy-preserving distributed clustering},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2013},
  pages        = {4},
  year         = {2013},
  url          = {https://doi.org/10.1186/1687-417X-2013-4},
  doi          = {10.1186/1687-417X-2013-4},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/ErkinVTL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/ForoushaniZ13,
  author       = {Vahid Aghaei Foroushani and
                  Nur Zincir{-}Heywood},
  title        = {{IP} traceback through (authenticated) deterministic flow marking:
                  an empirical evaluation},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2013},
  pages        = {5},
  year         = {2013},
  url          = {https://doi.org/10.1186/1687-417X-2013-5},
  doi          = {10.1186/1687-417X-2013-5},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejisec/ForoushaniZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/GargKC13,
  author       = {Vaibhav Garg and
                  Thomas Koster and
                  Linda Jean Camp},
  title        = {Cross-country analysis of spambots},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2013},
  pages        = {3},
  year         = {2013},
  url          = {https://doi.org/10.1186/1687-417X-2013-3},
  doi          = {10.1186/1687-417X-2013-3},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/GargKC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/MillikenSM13,
  author       = {Jonny Milliken and
                  Valerio Selis and
                  Alan Marshall},
  title        = {Detection and analysis of the Chameleon WiFi access point virus},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2013},
  pages        = {2},
  year         = {2013},
  url          = {https://doi.org/10.1186/1687-417X-2013-2},
  doi          = {10.1186/1687-417X-2013-2},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/MillikenSM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/OhanaS13,
  author       = {Donny Jacob Ohana and
                  Narasimha K. Shashidhar},
  title        = {Do private and portable web browsers leave incriminating evidence?:
                  a forensic analysis of residual artifacts from private and portable
                  web browsing sessions},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2013},
  pages        = {6},
  year         = {2013},
  url          = {https://doi.org/10.1186/1687-417X-2013-6},
  doi          = {10.1186/1687-417X-2013-6},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejisec/OhanaS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/RaftopoulosD13,
  author       = {Elias Raftopoulos and
                  Xenofontas A. Dimitropoulos},
  title        = {A quality metric for {IDS} signatures: in the wild the size matters},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2013},
  pages        = {7},
  year         = {2013},
  url          = {https://doi.org/10.1186/1687-417X-2013-7},
  doi          = {10.1186/1687-417X-2013-7},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/RaftopoulosD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/EngelSU12,
  author       = {Dominik Engel and
                  Thomas St{\"{u}}tz and
                  Andreas Uhl},
  title        = {Assessing {JPEG2000} encryption with key-dependent wavelet packets},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2012},
  pages        = {2},
  year         = {2012},
  url          = {https://doi.org/10.1186/1687-417X-2012-2},
  doi          = {10.1186/1687-417X-2012-2},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/EngelSU12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/RamanathanW12,
  author       = {Venkatesh Ramanathan and
                  Harry Wechsler},
  title        = {phishGILLNET-phishing detection using probabilistic latent semantic
                  analysis},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2012},
  pages        = {1},
  year         = {2012},
  url          = {https://doi.org/10.1186/1687-417X-2012-1},
  doi          = {10.1186/1687-417X-2012-1},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/RamanathanW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/Bakhoum11,
  author       = {Ezzat G. Bakhoum},
  title        = {Intrusion detection model based on selective packet sampling},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2011},
  pages        = {2},
  year         = {2011},
  url          = {https://doi.org/10.1186/1687-417X-2011-2},
  doi          = {10.1186/1687-417X-2011-2},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/Bakhoum11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/ChenV11,
  author       = {Chun Chen and
                  Raymond N. J. Veldhuis},
  title        = {Binary Biometric Representation through Pairwise Adaptive Phase Quantization},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2011},
  year         = {2011},
  url          = {https://doi.org/10.1155/2011/543106},
  doi          = {10.1155/2011/543106},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/ChenV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/JemaaDJ11,
  author       = {Yousra Ben Jemaa and
                  Ahmed Derbel and
                  Ahmed Ben Jmaa},
  title        = {2DPCA fractal features and genetic algorithm for efficient face representation
                  and recognition},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2011},
  pages        = {1},
  year         = {2011},
  url          = {https://doi.org/10.1186/1687-417X-2011-1},
  doi          = {10.1186/1687-417X-2011-1},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/JemaaDJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/Kuribayashi11,
  author       = {Minoru Kuribayashi},
  title        = {Hierarchical Spread Spectrum Fingerprinting Scheme Based on the {CDMA}
                  Technique},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2011},
  year         = {2011},
  url          = {https://doi.org/10.1155/2011/502782},
  doi          = {10.1155/2011/502782},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/Kuribayashi11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/MalekzadehGS11,
  author       = {Mina Malekzadeh and
                  Abdul Azim Abdul Ghani and
                  Shamala Subramaniam},
  title        = {Protected control packets to prevent denial of services attacks in
                  {IEEE} 802.11 wireless networks},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2011},
  pages        = {4},
  year         = {2011},
  url          = {https://doi.org/10.1186/1687-417X-2011-4},
  doi          = {10.1186/1687-417X-2011-4},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/MalekzadehGS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/MaoZNYZ11,
  author       = {Jiafa Mao and
                  Ru Zhang and
                  Xinxin Niu and
                  Yixian Yang and
                  Linna Zhou},
  title        = {Research of Spatial Domain Image Digital Watermarking Payload},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2011},
  year         = {2011},
  url          = {https://doi.org/10.1155/2011/502748},
  doi          = {10.1155/2011/502748},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/MaoZNYZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/NtalianisTD11,
  author       = {Klimis S. Ntalianis and
                  Nicolas Tsapatsoulis and
                  Athanasios Drigas},
  title        = {Video-Object Oriented Biometrics Hiding for User Authentication under
                  Error-Prone Transmissions},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2011},
  year         = {2011},
  url          = {https://doi.org/10.1155/2011/174945},
  doi          = {10.1155/2011/174945},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/NtalianisTD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/RathgebU11,
  author       = {Christian Rathgeb and
                  Andreas Uhl},
  title        = {A survey on biometric cryptosystems and cancelable biometrics},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2011},
  pages        = {3},
  year         = {2011},
  url          = {https://doi.org/10.1186/1687-417X-2011-3},
  doi          = {10.1186/1687-417X-2011-3},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/RathgebU11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/BalakirskyV10,
  author       = {Vladimir B. Balakirsky and
                  A. J. Han Vinck},
  title        = {A Simple Scheme for Constructing Fault-Tolerant Passwords from Biometric
                  Data},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2010},
  year         = {2010},
  url          = {https://doi.org/10.1155/2010/819376},
  doi          = {10.1155/2010/819376},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/BalakirskyV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/CaldelliFB10,
  author       = {Roberto Caldelli and
                  Francesco Filippini and
                  Rudy Becarelli},
  title        = {Reversible Watermarking Techniques: An Overview and a Classification},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2010},
  year         = {2010},
  url          = {https://doi.org/10.1155/2010/134546},
  doi          = {10.1155/2010/134546},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/CaldelliFB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/GafurovBYB10,
  author       = {Davrondzhon Gafurov and
                  Patrick Bours and
                  Bian Yang and
                  Christoph Busch},
  title        = {{GUC100} Multisensor Fingerprint Database for In-House (Semipublic)
                  Performance Test},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2010},
  year         = {2010},
  url          = {https://doi.org/10.1155/2010/391761},
  doi          = {10.1155/2010/391761},
  timestamp    = {Wed, 06 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejisec/GafurovBYB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/Kuribayashi10,
  author       = {Minoru Kuribayashi},
  title        = {On the Implementation of Spread Spectrum Fingerprinting in Asymmetric
                  Cryptographic Protocol},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2010},
  year         = {2010},
  url          = {https://doi.org/10.1155/2010/694797},
  doi          = {10.1155/2010/694797},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/Kuribayashi10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/SinaieV10,
  author       = {Mahnaz Sinaie and
                  Vahid Tabataba Vakili},
  title        = {Secure Arithmetic Coding with Error Detection Capability},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2010},
  year         = {2010},
  url          = {https://doi.org/10.1155/2010/621521},
  doi          = {10.1155/2010/621521},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejisec/SinaieV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/Suthaharan10,
  author       = {Shan Suthaharan},
  title        = {Logistic Map-Based Fragile Watermarking for Pixel Level Tamper Detection
                  and Resistance},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2010},
  year         = {2010},
  url          = {https://doi.org/10.1155/2010/829516},
  doi          = {10.1155/2010/829516},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejisec/Suthaharan10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/AlrodhanM09,
  author       = {Waleed A. Alrodhan and
                  Chris J. Mitchell},
  title        = {Improving the Security of CardSpace},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2009},
  year         = {2009},
  url          = {https://doi.org/10.1155/2009/167216},
  doi          = {10.1155/2009/167216},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/AlrodhanM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/BianchiPB09,
  author       = {Tiziano Bianchi and
                  Alessandro Piva and
                  Mauro Barni},
  title        = {Encrypted Domain {DCT} Based on Homomorphic Cryptosystems},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2009},
  year         = {2009},
  url          = {https://doi.org/10.1155/2009/716357},
  doi          = {10.1155/2009/716357},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/BianchiPB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/CarrilloKM09,
  author       = {Paula Carrillo and
                  Hari Kalva and
                  Spyros S. Magliveras},
  title        = {Compression Independent Reversible Encryption for Privacy in Video
                  Surveillance},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2009},
  year         = {2009},
  url          = {https://doi.org/10.1155/2009/429581},
  doi          = {10.1155/2009/429581},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/CarrilloKM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/ChaoWLC09,
  author       = {Ruey{-}Ming Chao and
                  Hsien{-}Chung Wu and
                  Chih{-}Chiang Lee and
                  Yen{-}Ping Chu},
  title        = {A Novel Image Data Hiding Scheme with Diamond Encoding},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2009},
  year         = {2009},
  url          = {https://doi.org/10.1155/2009/658047},
  doi          = {10.1155/2009/658047},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/ChaoWLC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/CheungKS09,
  author       = {Sen{-}ching Samson Cheung and
                  Deepa Kundur and
                  Andrew W. Senior},
  title        = {Enhancing Privacy Protection in Multimedia Systems},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2009},
  year         = {2009},
  url          = {https://doi.org/10.1155/2009/710919},
  doi          = {10.1155/2009/710919},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/CheungKS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/FontaineG09,
  author       = {Caroline Fontaine and
                  Fabien Galand},
  title        = {How Reed-Solomon Codes Can Improve Steganographic Schemes},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2009},
  year         = {2009},
  url          = {https://doi.org/10.1155/2009/274845},
  doi          = {10.1155/2009/274845},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/FontaineG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/GoljanW09,
  author       = {Miroslav Goljan and
                  Andreas Westfeld},
  title        = {Secure Steganography in Multimedia Content},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2009},
  year         = {2009},
  url          = {https://doi.org/10.1155/2009/257131},
  doi          = {10.1155/2009/257131},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/GoljanW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/ItoK09,
  author       = {Izumi Ito and
                  Hitoshi Kiya},
  title        = {One-Time Key Based Phase Scrambling for Phase-Only Correlation between
                  Visually Protected Images},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2009},
  year         = {2009},
  url          = {https://doi.org/10.1155/2009/841045},
  doi          = {10.1155/2009/841045},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/ItoK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/LiIYNB09,
  author       = {Guangzhen Li and
                  Yoshimichi Ito and
                  Xiaoyi Yu and
                  Naoko Nitta and
                  Noboru Babaguchi},
  title        = {Recoverable Privacy Protection for Video Content Distribution},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2009},
  year         = {2009},
  url          = {https://doi.org/10.1155/2009/293031},
  doi          = {10.1155/2009/293031},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/LiIYNB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/LvW09,
  author       = {Xudong Lv and
                  Z. Jane Wang},
  title        = {An Extended Image Hashing Concept: Content-Based Fingerprinting Using
                  {FJLT}},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2009},
  year         = {2009},
  url          = {https://doi.org/10.1155/2009/859859},
  doi          = {10.1155/2009/859859},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/LvW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/MicheBLJS09,
  author       = {Yoan Miche and
                  Patrick Bas and
                  Amaury Lendasse and
                  Christian Jutten and
                  Olli Simula},
  title        = {Reliable Steganalysis Using a Minimum Set of Samples and Features},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2009},
  year         = {2009},
  url          = {https://doi.org/10.1155/2009/901381},
  doi          = {10.1155/2009/901381},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/MicheBLJS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/ParuchuriCH09,
  author       = {Jithendra K. Paruchuri and
                  Sen{-}Ching S. Cheung and
                  Michael W. Hail},
  title        = {Video Data Hiding for Managing Privacy Information in Surveillance
                  Systems},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2009},
  year         = {2009},
  url          = {https://doi.org/10.1155/2009/236139},
  doi          = {10.1155/2009/236139},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/ParuchuriCH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/RossiGC09,
  author       = {Lorenzo Rossi and
                  Fabio Garzia and
                  Roberto Cusani},
  title        = {Peak-Shaped-Based Steganographic Technique for {JPEG} Images},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2009},
  year         = {2009},
  url          = {https://doi.org/10.1155/2009/382310},
  doi          = {10.1155/2009/382310},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/RossiGC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/ScagliolaPG09,
  author       = {Michele Scagliola and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Pietro Guccione},
  title        = {High-Rate Data-Hiding Robust to Linear Filtering for Colored Hosts},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2009},
  year         = {2009},
  url          = {https://doi.org/10.1155/2009/914937},
  doi          = {10.1155/2009/914937},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/ScagliolaPG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/WuD09,
  author       = {Hao{-}Tian Wu and
                  Jean{-}Luc Dugelay},
  title        = {Steganography in 3D Geometries and Images by Adjacent Bin Mapping},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2009},
  year         = {2009},
  url          = {https://doi.org/10.1155/2009/317165},
  doi          = {10.1155/2009/317165},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/WuD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/YeLZC09,
  author       = {Shuiming Ye and
                  Ying Luo and
                  Jian Zhao and
                  Sen{-}Ching S. Cheung},
  title        = {Anonymous Biometric Access Control},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2009},
  year         = {2009},
  url          = {https://doi.org/10.1155/2009/865259},
  doi          = {10.1155/2009/865259},
  timestamp    = {Thu, 31 Mar 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/YeLZC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/CerouFG08,
  author       = {Fr{\'{e}}d{\'{e}}ric C{\'{e}}rou and
                  Teddy Furon and
                  Arnaud Guyader},
  title        = {Experimental Assessment of the Reliability for Watermarking and Fingerprinting
                  Schemes},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2008},
  year         = {2008},
  url          = {https://doi.org/10.1155/2008/414962},
  doi          = {10.1155/2008/414962},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/CerouFG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/DAngeloBM08,
  author       = {Angela D'Angelo and
                  Mauro Barni and
                  Neri Merhav},
  title        = {Stochastic Image Warping for Improved Watermark Desynchronization},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2008},
  year         = {2008},
  url          = {https://doi.org/10.1155/2008/345184},
  doi          = {10.1155/2008/345184},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/DAngeloBM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/EltahirSIL08,
  author       = {Wasil Elsadig Eltahir and
                  Momoh{-}Jimoh E. Salami and
                  Ahmad Faris Ismail and
                  Weng Kin Lai},
  title        = {Design and Evaluation of a Pressure-Based Typing Biometric Authentication
                  System},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2008},
  year         = {2008},
  url          = {https://doi.org/10.1155/2008/345047},
  doi          = {10.1155/2008/345047},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/EltahirSIL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/FuronB08,
  author       = {Teddy Furon and
                  Patrick Bas},
  title        = {Broken Arrows},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2008},
  year         = {2008},
  url          = {https://doi.org/10.1155/2008/597040},
  doi          = {10.1155/2008/597040},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/FuronB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/HurleyBS08,
  author       = {Neil J. Hurley and
                  F{\'{e}}lix Balado and
                  Guenole C. M. Silvestre},
  title        = {Markov Modelling of Fingerprinting Systems for Collision Analysis},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2008},
  year         = {2008},
  url          = {https://doi.org/10.1155/2008/195238},
  doi          = {10.1155/2008/195238},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/HurleyBS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/LaimerU08,
  author       = {Gerold Laimer and
                  Andreas Uhl},
  title        = {Key-Dependent JPEG2000-Based Robust Hashing for Secure Image Authentication},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2008},
  year         = {2008},
  url          = {https://doi.org/10.1155/2008/895174},
  doi          = {10.1155/2008/895174},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/LaimerU08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/MassoudiLVMQ08,
  author       = {Ayoub Massoudi and
                  Fr{\'{e}}d{\'{e}}ric Lef{\`{e}}bvre and
                  Christophe De Vleeschouwer and
                  Beno{\^{\i}}t Macq and
                  Jean{-}Jacques Quisquater},
  title        = {Overview on Selective Encryption of Image and Video: Challenges and
                  Perspectives},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2008},
  year         = {2008},
  url          = {https://doi.org/10.1155/2008/179290},
  doi          = {10.1155/2008/179290},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/MassoudiLVMQ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/Schaathun08,
  author       = {Hans Georg Schaathun},
  title        = {Novel Attacks on Spread-Spectrum Fingerprinting},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2008},
  year         = {2008},
  url          = {https://doi.org/10.1155/2008/803217},
  doi          = {10.1155/2008/803217},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/Schaathun08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/ZebbicheKB08,
  author       = {Khalil Zebbiche and
                  Fouad Khelifi and
                  Ahmed Bouridane},
  title        = {An Efficient Watermarking Technique for the Protection of Fingerprint
                  Images},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2008},
  year         = {2008},
  url          = {https://doi.org/10.1155/2008/918601},
  doi          = {10.1155/2008/918601},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/ZebbicheKB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/BorzinoAS07,
  author       = {Angelo M. C. R. Borzino and
                  J. A. Apolin{\'{a}}rio Jr. and
                  Dirceu G. da Silva},
  title        = {An Efficient Objective Intelligibility Measure for Frequency Domain
                  Scramblers},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2007},
  year         = {2007},
  url          = {https://doi.org/10.1155/2007/32028},
  doi          = {10.1155/2007/32028},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/BorzinoAS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/CheungN07,
  author       = {Sen{-}Ching S. Cheung and
                  Thinh P. Nguyen},
  title        = {Secure Multiparty Computation between Distrusted Networks Terminals},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2007},
  year         = {2007},
  url          = {https://doi.org/10.1155/2007/51368},
  doi          = {10.1155/2007/51368},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/CheungN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/ComesanaP07,
  author       = {Pedro Comesa{\~{n}}a and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Breaking the {BOWS} Watermarking System: Key Guessing and Sensitivity
                  Attacks},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2007},
  year         = {2007},
  url          = {https://doi.org/10.1155/2007/25308},
  doi          = {10.1155/2007/25308},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/ComesanaP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/CraverAY07,
  author       = {Scott Craver and
                  Idris M. Atakli and
                  Jun Yu},
  title        = {Reverse-Engineering a Watermark Detector Using an Oracle},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2007},
  year         = {2007},
  url          = {https://doi.org/10.1155/2007/43034},
  doi          = {10.1155/2007/43034},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/CraverAY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/EngelSU07,
  author       = {Dominik Engel and
                  Thomas St{\"{u}}tz and
                  Andreas Uhl},
  title        = {Format-Compliant {JPEG2000} Encryption in {JPSEC:} Security, Applicability,
                  and the Impact of Compression Parameters},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2007},
  year         = {2007},
  url          = {https://doi.org/10.1155/2007/94565},
  doi          = {10.1155/2007/94565},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/EngelSU07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/ErkinPKLSNB07,
  author       = {Zekeriya Erkin and
                  Alessandro Piva and
                  Stefan Katzenbeisser and
                  Reginald L. Lagendijk and
                  Jamshid Shokrollahi and
                  Gregory Neven and
                  Mauro Barni},
  title        = {Protection and Retrieval of Encrypted Multimedia Content: When Cryptography
                  Meets Signal Processing},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2007},
  year         = {2007},
  url          = {https://doi.org/10.1155/2007/78943},
  doi          = {10.1155/2007/78943},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/ErkinPKLSNB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/FontaineG07,
  author       = {Caroline Fontaine and
                  Fabien Galand},
  title        = {A Survey of Homomorphic Encryption for Nonspecialists},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2007},
  year         = {2007},
  url          = {https://doi.org/10.1155/2007/13801},
  doi          = {10.1155/2007/13801},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/FontaineG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/GschwandtnerUW07,
  author       = {Michael Gschwandtner and
                  Andreas Uhl and
                  Peter Wild},
  title        = {Transmission Error and Compression Robustness of 2D Chaotic Map Image
                  Encryption Schemes},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2007},
  year         = {2007},
  url          = {https://doi.org/10.1155/2007/48179},
  doi          = {10.1155/2007/48179},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/GschwandtnerUW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/HaleemSC07,
  author       = {Mohamed A. Haleem and
                  K. P. Subbalakshmi and
                  Rajarathnam Chandramouli},
  title        = {Joint Encryption and Compression of Correlated Sources with Side Information},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2007},
  year         = {2007},
  url          = {https://doi.org/10.1155/2007/98374},
  doi          = {10.1155/2007/98374},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/HaleemSC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/LiuS07,
  author       = {Yi{-}Wen Liu and
                  Julius O. Smith III},
  title        = {Audio Watermarking through Deterministic plus Stochastic Signal Decomposition},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2007},
  year         = {2007},
  url          = {https://doi.org/10.1155/2007/75961},
  doi          = {10.1155/2007/75961},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/LiuS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/MagliGO07,
  author       = {Enrico Magli and
                  Marco Grangetto and
                  Gabriella Olmo},
  title        = {Joint Source, Channel Coding, and Secrecy},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2007},
  year         = {2007},
  url          = {https://doi.org/10.1155/2007/79048},
  doi          = {10.1155/2007/79048},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejisec/MagliGO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/MagliS07,
  author       = {Enrico Magli and
                  Qibin Sun},
  title        = {The Interplay between Compression and Security for Image and Video
                  Communication and Adaptation over Networks},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2007},
  year         = {2007},
  url          = {https://doi.org/10.1155/2007/19824},
  doi          = {10.1155/2007/19824},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/MagliS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/OrlandiPB07,
  author       = {Claudio Orlandi and
                  Alessandro Piva and
                  Mauro Barni},
  title        = {Oblivious Neural Network Computing via Homomorphic Encryption},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2007},
  year         = {2007},
  url          = {https://doi.org/10.1155/2007/37343},
  doi          = {10.1155/2007/37343},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/OrlandiPB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/PivaB07,
  author       = {Alessandro Piva and
                  Mauro Barni},
  title        = {Design and Analysis of the First {BOWS} Contest},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2007},
  year         = {2007},
  url          = {https://doi.org/10.1155/2007/98684},
  doi          = {10.1155/2007/98684},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/PivaB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/PivaK07,
  author       = {Alessandro Piva and
                  Stefan Katzenbeisser},
  title        = {Signal Processing in the Encrypted Domain},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2007},
  year         = {2007},
  url          = {https://doi.org/10.1155/2007/82790},
  doi          = {10.1155/2007/82790},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/PivaK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/PrinsEL07,
  author       = {Jeroen P. Prins and
                  Zekeriya Erkin and
                  Reginald L. Lagendijk},
  title        = {Anonymous Fingerprinting with Robust {QIM} Watermarking Techniques},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2007},
  year         = {2007},
  url          = {https://doi.org/10.1155/2007/31340},
  doi          = {10.1155/2007/31340},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/PrinsEL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/SocekMCMKF07,
  author       = {Daniel Socek and
                  Spyros S. Magliveras and
                  Dubravko Culibrk and
                  Oge Marques and
                  Hari Kalva and
                  Borko Furht},
  title        = {Digital Video Encryption Algorithms Based on Correlation-Preserving
                  Permutations},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2007},
  year         = {2007},
  url          = {https://doi.org/10.1155/2007/52965},
  doi          = {10.1155/2007/52965},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/SocekMCMKF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/Troncoso-PastorizaP07,
  author       = {Juan Ram{\'{o}}n Troncoso{-}Pastoriza and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Efficient Zero-Knowledge Watermark Detection with Improved Robustness
                  to Sensitivity Attacks},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2007},
  year         = {2007},
  url          = {https://doi.org/10.1155/2007/45731},
  doi          = {10.1155/2007/45731},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/Troncoso-PastorizaP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/Westfeld07,
  author       = {Andreas Westfeld},
  title        = {A Workbench for the {BOWS} Contest},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2007},
  year         = {2007},
  url          = {https://doi.org/10.1155/2007/64521},
  doi          = {10.1155/2007/64521},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/Westfeld07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/XieK07,
  author       = {Dahua Xie and
                  C.{-}C. Jay Kuo},
  title        = {Multimedia Encryption with Joint Randomized Entropy Coding and Rotation
                  in Partitioned Bitstream},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2007},
  year         = {2007},
  url          = {https://doi.org/10.1155/2007/35262},
  doi          = {10.1155/2007/35262},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/XieK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/YangZLY07,
  author       = {Yang Yang and
                  Bin B. Zhu and
                  Shipeng Li and
                  Neng H. Yu},
  title        = {Efficient and Syntax-Compliant {JPEG} 2000 Encryption Preserving Original
                  Fine Granularity of Scalability},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2007},
  year         = {2007},
  url          = {https://doi.org/10.1155/2007/56365},
  doi          = {10.1155/2007/56365},
  timestamp    = {Fri, 20 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejisec/YangZLY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics