![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp for Publications
export results for "stream:journals/ejisec:"
@article{DBLP:journals/ejisec/AliMBM24, author = {Arslan Ali and Andrea Migliorati and Tiziano Bianchi and Enrico Magli}, title = {Cancelable templates for secure face verification based on deep learning and random projections}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2024}, number = {1}, pages = {7}, year = {2024}, url = {https://doi.org/10.1186/s13635-023-00147-y}, doi = {10.1186/S13635-023-00147-Y}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/AliMBM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/Chen24, title = {Retraction Note: The design of network security protection trust management system based on an improved hidden Markov model}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2024}, number = {1}, pages = {18}, year = {2024}, url = {https://doi.org/10.1186/s13635-024-00167-2}, doi = {10.1186/S13635-024-00167-2}, timestamp = {Thu, 13 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/Chen24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/ChenSZW24a, title = {Retraction Note: IoT devices and data availability optimization by {ANN} and {KNN}}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2024}, number = {1}, pages = {12}, year = {2024}, url = {https://doi.org/10.1186/s13635-024-00160-9}, doi = {10.1186/S13635-024-00160-9}, timestamp = {Thu, 13 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/ChenSZW24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/KablaTAMK24, author = {Arkan Hammoodi Hasan Kabla and Achmad Husni Thamrin and Mohammed Anbar and Selvakumar Manickam and Shankar Karuppayah}, title = {Peer-to-peer botnets: exploring behavioural characteristics and machine/deep learning-based detection}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2024}, number = {1}, pages = {20}, year = {2024}, url = {https://doi.org/10.1186/s13635-024-00169-0}, doi = {10.1186/S13635-024-00169-0}, timestamp = {Mon, 10 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/KablaTAMK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/Lan24a, title = {Retraction Note: Network security threat detection technology based on {EPSO-BP} algorithm}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2024}, number = {1}, pages = {11}, year = {2024}, url = {https://doi.org/10.1186/s13635-024-00161-8}, doi = {10.1186/S13635-024-00161-8}, timestamp = {Thu, 13 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/Lan24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/Li24a, title = {Retraction Note: Node fault diagnosis algorithm for wireless sensor networks based on {BN} and {WSN}}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2024}, number = {1}, pages = {14}, year = {2024}, url = {https://doi.org/10.1186/s13635-024-00166-3}, doi = {10.1186/S13635-024-00166-3}, timestamp = {Thu, 13 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/Li24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/Li24b, title = {Retraction Note: Improved {RFID} mutual authentication protocol against exhaustive attack in the context of big data}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2024}, number = {1}, pages = {16}, year = {2024}, url = {https://doi.org/10.1186/s13635-024-00163-6}, doi = {10.1186/S13635-024-00163-6}, timestamp = {Thu, 13 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/Li24b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/Lv24a, title = {Retraction Note: Research on privacy and secure storage protection of personalized medical data based on hybrid encryption}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2024}, number = {1}, pages = {15}, year = {2024}, url = {https://doi.org/10.1186/s13635-024-00165-4}, doi = {10.1186/S13635-024-00165-4}, timestamp = {Thu, 13 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/Lv24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/NivaashiniESPB24, author = {Mathappan Nivaashini and Suganya Elavarasan and Sountharrajan Sehar and M. Prabu and Durga Prasad Bavirisetti}, title = {{FEDDBN-IDS:} federated deep belief network-based wireless network intrusion detection system}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2024}, number = {1}, pages = {8}, year = {2024}, url = {https://doi.org/10.1186/s13635-024-00156-5}, doi = {10.1186/S13635-024-00156-5}, timestamp = {Sun, 26 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/NivaashiniESPB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/ParachaAFI24, author = {Anum Paracha and Junaid Arshad and Mohamed Ben Farah and Khalid Ismail}, title = {Machine learning security and privacy: a review of threats and countermeasures}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2024}, number = {1}, pages = {10}, year = {2024}, url = {https://doi.org/10.1186/s13635-024-00158-3}, doi = {10.1186/S13635-024-00158-3}, timestamp = {Wed, 08 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/ParachaAFI24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/SaleemWBORH24, author = {Kiran Saleem and Lei Wang and Salil Bharany and Khmaies Ouahada and Ateeq Ur Rehman and Habib Hamam}, title = {Intelligent multi-agent model for energy-efficient communication in wireless sensor networks}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2024}, number = {1}, pages = {9}, year = {2024}, url = {https://doi.org/10.1186/s13635-024-00155-6}, doi = {10.1186/S13635-024-00155-6}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/SaleemWBORH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/WangWH24, title = {Retraction Note: Hierarchical energy-saving routing algorithm using fuzzy logic in wireless sensor networks}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2024}, number = {1}, pages = {17}, year = {2024}, url = {https://doi.org/10.1186/s13635-024-00168-1}, doi = {10.1186/S13635-024-00168-1}, timestamp = {Thu, 13 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/WangWH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/Wu24a, title = {Retraction Note: {RFID} tag recognition model for Internet of Things for training room management}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2024}, number = {1}, pages = {19}, year = {2024}, url = {https://doi.org/10.1186/s13635-024-00164-5}, doi = {10.1186/S13635-024-00164-5}, timestamp = {Thu, 13 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/Wu24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/Yang24a, title = {Retraction Note: Efficient identity security authentication method based on improved {R-LWE} algorithm in IoT environment}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2024}, number = {1}, pages = {13}, year = {2024}, url = {https://doi.org/10.1186/s13635-024-00162-7}, doi = {10.1186/S13635-024-00162-7}, timestamp = {Thu, 13 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/Yang24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/ChenSZW24, title = {IoT devices and data availability optimization by {ANN} and {KNN}}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2024}, number = {1}, pages = {2}, year = {2024}, note = {Withdrawn.}, url = {https://doi.org/10.1186/s13635-023-00145-0}, doi = {10.1186/S13635-023-00145-0}, timestamp = {Sat, 11 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/ChenSZW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/Lan24, title = {Network security threat detection technology based on {EPSO-BP} algorithm}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2024}, number = {1}, pages = {6}, year = {2024}, note = {Withdrawn.}, url = {https://doi.org/10.1186/s13635-024-00152-9}, doi = {10.1186/S13635-024-00152-9}, timestamp = {Sat, 11 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/Lan24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/Li24, title = {Improved {RFID} mutual authentication protocol against exhaustive attack in the context of big data}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2024}, number = {1}, pages = {3}, year = {2024}, note = {Withdrawn.}, url = {https://doi.org/10.1186/s13635-024-00151-w}, doi = {10.1186/S13635-024-00151-W}, timestamp = {Mon, 13 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/Li24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/Lv24, title = {Research on privacy and secure storage protection of personalized medical data based on hybrid encryption}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2024}, number = {1}, pages = {1}, year = {2024}, note = {Withdrawn.}, url = {https://doi.org/10.1186/s13635-023-00150-3}, doi = {10.1186/S13635-023-00150-3}, timestamp = {Mon, 13 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/Lv24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/Wu24, title = {{RFID} tag recognition model for Internet of Things for training room management}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2024}, number = {1}, pages = {5}, year = {2024}, note = {Withdrawn.}, url = {https://doi.org/10.1186/s13635-024-00154-7}, doi = {10.1186/S13635-024-00154-7}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/Wu24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/Yang24, title = {Efficient identity security authentication method based on improved {R-LWE} algorithm in IoT environment}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2024}, number = {1}, pages = {4}, year = {2024}, note = {Withdrawn.}, url = {https://doi.org/10.1186/s13635-024-00153-8}, doi = {10.1186/S13635-024-00153-8}, timestamp = {Mon, 13 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/Yang24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/AliMBM23, author = {Arslan Ali and Andrea Migliorati and Tiziano Bianchi and Enrico Magli}, title = {Gaussian class-conditional simplex loss for accurate, adversarially robust deep classifier training}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2023}, number = {1}, pages = {3}, year = {2023}, url = {https://doi.org/10.1186/s13635-023-00137-0}, doi = {10.1186/S13635-023-00137-0}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/AliMBM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/HuZLWLS23, author = {Feifei Hu and Situo Zhang and Xubin Lin and Liu Wu and Niandong Liao and Yanqi Song}, title = {Network traffic classification model based on attention mechanism and spatiotemporal features}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2023}, number = {1}, pages = {6}, year = {2023}, url = {https://doi.org/10.1186/s13635-023-00141-4}, doi = {10.1186/S13635-023-00141-4}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/HuZLWLS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/IslamICLC23, author = {Md. Ezazul Islam and Md. Rafiqul Islam and Madhu Chetty and Suryani Lim and Mehmood Chadhar}, title = {User authentication and access control to blockchain-based forensic log data}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2023}, number = {1}, pages = {7}, year = {2023}, url = {https://doi.org/10.1186/s13635-023-00142-3}, doi = {10.1186/S13635-023-00142-3}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/IslamICLC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/KatikaK23, author = {Balaji Rao Katika and Kannan Karthik}, title = {Image life trails based on contrast reduction models for face counter-spoofing}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2023}, number = {1}, pages = {1}, year = {2023}, url = {https://doi.org/10.1186/s13635-022-00135-8}, doi = {10.1186/S13635-022-00135-8}, timestamp = {Fri, 10 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejisec/KatikaK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/TaranTHCBV23, author = {Olga Taran and Joakim Tutt and Taras Holotyak and Roman Chaban and Slavi Bonev and Slava Voloshynovskiy}, title = {Mobile authentication of copy detection patterns}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2023}, number = {1}, pages = {4}, year = {2023}, url = {https://doi.org/10.1186/s13635-023-00140-5}, doi = {10.1186/S13635-023-00140-5}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejisec/TaranTHCBV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/TaranTHCBV23a, author = {Olga Taran and Joakim Tutt and Taras Holotyak and Roman Chaban and Slavi Bonev and Slava Voloshynovskiy}, title = {Correction: Mobile authentication of copy detection patterns}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2023}, number = {1}, pages = {8}, year = {2023}, url = {https://doi.org/10.1186/s13635-023-00143-2}, doi = {10.1186/S13635-023-00143-2}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejisec/TaranTHCBV23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/WangLZ23, author = {Xiaoning Wang and Jia Liu and Chunjiong Zhang}, title = {Network intrusion detection based on multi-domain data and ensemble-bidirectional {LSTM}}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2023}, number = {1}, pages = {5}, year = {2023}, url = {https://doi.org/10.1186/s13635-023-00139-y}, doi = {10.1186/S13635-023-00139-Y}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/WangLZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/Yang23, author = {Jen{-}Ho Yang}, title = {A multi-gateway authentication and key-agreement scheme on wireless sensor networks for IoT}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2023}, number = {1}, pages = {2}, year = {2023}, url = {https://doi.org/10.1186/s13635-023-00138-z}, doi = {10.1186/S13635-023-00138-Z}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/Yang23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/ZhangZH23, author = {Jimin Zhang and Xianfeng Zhao and Xiaolei He}, title = {Robust {JPEG} steganography based on the robustness classifier}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2023}, number = {1}, pages = {11}, year = {2023}, url = {https://doi.org/10.1186/s13635-023-00148-x}, doi = {10.1186/S13635-023-00148-X}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejisec/ZhangZH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/Chen23, title = {The design of network security protection trust management system based on an improved hidden Markov model}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2023}, number = {1}, pages = {1--13}, year = {2023}, note = {Withdrawn.}, url = {https://doi.org/10.1186/s13635-023-00146-z}, doi = {10.1186/S13635-023-00146-Z}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/Chen23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/Li23, title = {Node fault diagnosis algorithm for wireless sensor networks based on {BN} and {WSN}}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2023}, number = {1}, pages = {12}, year = {2023}, note = {Withdrawn.}, url = {https://doi.org/10.1186/s13635-023-00149-w}, doi = {10.1186/S13635-023-00149-W}, timestamp = {Mon, 13 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/Li23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/WangWH23, title = {Hierarchical energy-saving routing algorithm using fuzzy logic in wireless sensor networks}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2023}, number = {1}, pages = {9}, year = {2023}, note = {Withdrawn.}, url = {https://doi.org/10.1186/s13635-023-00144-1}, doi = {10.1186/S13635-023-00144-1}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/WangWH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/DinhO22, author = {Nghia Dinh and Lidia Ogiela}, title = {Human-artificial intelligence approaches for secure analysis in {CAPTCHA} codes}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2022}, number = {1}, pages = {8}, year = {2022}, url = {https://doi.org/10.1186/s13635-022-00134-9}, doi = {10.1186/S13635-022-00134-9}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejisec/DinhO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/FanZZ22, author = {Pingan Fan and Hong Zhang and Xianfeng Zhao}, title = {Robust video steganography for social media sharing based on principal component analysis}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2022}, number = {1}, pages = {4}, year = {2022}, url = {https://doi.org/10.1186/s13635-022-00130-z}, doi = {10.1186/S13635-022-00130-Z}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejisec/FanZZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/HaasnootSV22, author = {Erwin Haasnoot and Luuk J. Spreeuwers and Raymond N. J. Veldhuis}, title = {Presentation attack detection and biometric recognition in a challenge-response formalism}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2022}, number = {1}, pages = {5}, year = {2022}, url = {https://doi.org/10.1186/s13635-022-00131-y}, doi = {10.1186/S13635-022-00131-Y}, timestamp = {Mon, 26 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/HaasnootSV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/LahmidiMMR22, author = {Ayoub Lahmidi and Chouaib Moujahdi and Khalid Minaoui and Mohammed Rziza}, title = {On the methodology of fingerprint template protection schemes conception : meditations on the reliability}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2022}, number = {1}, pages = {3}, year = {2022}, url = {https://doi.org/10.1186/s13635-022-00129-6}, doi = {10.1186/S13635-022-00129-6}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/LahmidiMMR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/LinNX22, author = {Jing Lin and Laurent L. Njilla and Kaiqi Xiong}, title = {Secure machine learning against adversarial samples at test time}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2022}, number = {1}, pages = {1}, year = {2022}, url = {https://doi.org/10.1186/s13635-021-00125-2}, doi = {10.1186/S13635-021-00125-2}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejisec/LinNX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/PicettiMBLT22, author = {Francesco Picetti and Sara Mandelli and Paolo Bestagini and Vincenzo Lipari and Stefano Tubaro}, title = {{DIPPAS:} a deep image prior {PRNU} anonymization scheme}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2022}, number = {1}, pages = {2}, year = {2022}, url = {https://doi.org/10.1186/s13635-022-00128-7}, doi = {10.1186/S13635-022-00128-7}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/PicettiMBLT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/ProgonovCKO22, author = {Dmytro Progonov and Valentyna Cherniakova and Pavel V. Kolesnichenko and Andriy Oliynyk}, title = {Behavior-based user authentication on mobile devices in various usage contexts}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2022}, number = {1}, pages = {6}, year = {2022}, url = {https://doi.org/10.1186/s13635-022-00132-x}, doi = {10.1186/S13635-022-00132-X}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejisec/ProgonovCKO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/SharevskiJ22, author = {Filipo Sharevski and Peter Jachim}, title = {"Alexa, What's a Phishing Email?": Training users to spot phishing emails using a voice assistant}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2022}, number = {1}, pages = {7}, year = {2022}, url = {https://doi.org/10.1186/s13635-022-00133-w}, doi = {10.1186/S13635-022-00133-W}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejisec/SharevskiJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/ThaiTW22, author = {Binh Le Thanh Thai and Hidema Tanaka and Kohtaro Watanabe}, title = {Improved scheme and evaluation method for progressive visual cryptography}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2022}, number = {1}, pages = {9}, year = {2022}, url = {https://doi.org/10.1186/s13635-022-00136-7}, doi = {10.1186/S13635-022-00136-7}, timestamp = {Wed, 07 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejisec/ThaiTW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/BattiatoGGP21, author = {Sebastiano Battiato and Oliver Giudice and Francesco Guarnera and Giovanni Puglisi}, title = {Estimating Previous Quantization Factors on Multiple {JPEG} Compressed Images}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2021}, number = {1}, pages = {8}, year = {2021}, url = {https://doi.org/10.1186/s13635-021-00120-7}, doi = {10.1186/S13635-021-00120-7}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejisec/BattiatoGGP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/BorrelliBAST21, author = {Clara Borrelli and Paolo Bestagini and Fabio Antonacci and Augusto Sarti and Stefano Tubaro}, title = {Synthetic speech detection through short-term and long-term prediction traces}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2021}, number = {1}, pages = {1--14}, year = {2021}, url = {https://doi.org/10.1186/s13635-021-00116-3}, doi = {10.1186/S13635-021-00116-3}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/BorrelliBAST21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/CalzavaraLMO21, author = {Stefano Calzavara and Claudio Lucchese and Federico Marcuzzi and Salvatore Orlando}, title = {Feature partitioning for robust tree ensembles and their certification in adversarial scenarios}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2021}, number = {1}, pages = {12}, year = {2021}, url = {https://doi.org/10.1186/s13635-021-00127-0}, doi = {10.1186/S13635-021-00127-0}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejisec/CalzavaraLMO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/Fernandez-Menduina21, author = {Samuel Fern{\'{a}}ndez{-}Mendui{\~{n}}a and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez}, title = {On the information leakage quantification of camera fingerprint estimates}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2021}, number = {1}, pages = {6}, year = {2021}, url = {https://doi.org/10.1186/s13635-021-00121-6}, doi = {10.1186/S13635-021-00121-6}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/Fernandez-Menduina21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/HaletaLS21, author = {Pavlo Haleta and Dmytro Likhomanov and Oleksandra Sokol}, title = {Multitask adversarial attack with dispersion amplification}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2021}, number = {1}, pages = {10}, year = {2021}, url = {https://doi.org/10.1186/s13635-021-00124-3}, doi = {10.1186/S13635-021-00124-3}, timestamp = {Mon, 25 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/HaletaLS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/KraetzerMDH21, author = {Christian Kraetzer and Andrey Makrushin and Jana Dittmann and Mario Hildebrandt}, title = {Potential advantages and limitations of using information fusion in media forensics - a discussion on the example of detecting face morphing attacks}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2021}, number = {1}, pages = {9}, year = {2021}, url = {https://doi.org/10.1186/s13635-021-00123-4}, doi = {10.1186/S13635-021-00123-4}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/KraetzerMDH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/PasquiniAB21, author = {Cecilia Pasquini and Irene Amerini and Giulia Boato}, title = {Media forensics on social media platforms: a survey}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2021}, number = {1}, pages = {4}, year = {2021}, url = {https://doi.org/10.1186/s13635-021-00117-2}, doi = {10.1186/S13635-021-00117-2}, timestamp = {Sun, 16 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/PasquiniAB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/ReddyRSRLA21, author = {T. Rama Reddy and P. V. G. D. Prasad Reddy and Rayudu Srinivas and Ch. V. Raghavendran and R. V. S. Lalitha and B. Annapurna}, title = {Proposing a reliable method of securing and verifying the credentials of graduates through blockchain}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2021}, number = {1}, pages = {7}, year = {2021}, url = {https://doi.org/10.1186/s13635-021-00122-5}, doi = {10.1186/S13635-021-00122-5}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/ReddyRSRLA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/RussoSL21, author = {Michele Russo and Nedim Srndic and Pavel Laskov}, title = {Detection of illicit cryptomining using network metadata}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2021}, number = {1}, pages = {11}, year = {2021}, url = {https://doi.org/10.1186/s13635-021-00126-1}, doi = {10.1186/S13635-021-00126-1}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejisec/RussoSL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/Schmitz21, author = {Roland Schmitz}, title = {Use of {SHDM} in commutative watermarking encryption}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2021}, number = {1}, pages = {1}, year = {2021}, url = {https://doi.org/10.1186/s13635-020-00115-w}, doi = {10.1186/S13635-020-00115-W}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/Schmitz21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/TondiCHL21, author = {Benedetta Tondi and Andrea Costanzo and Dequ Huang and Bin Li}, title = {Boosting CNN-based primary quantization matrix estimation of double {JPEG} images via a classification-like architecture}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2021}, number = {1}, pages = {5}, year = {2021}, url = {https://doi.org/10.1186/s13635-021-00119-0}, doi = {10.1186/S13635-021-00119-0}, timestamp = {Mon, 31 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejisec/TondiCHL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/YeSZ21, author = {Chengqiong Ye and Wenyu Shi and Rui Zhang}, title = {Research on gray correlation analysis and situation prediction of network information security}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2021}, number = {1}, pages = {3}, year = {2021}, url = {https://doi.org/10.1186/s13635-021-00118-1}, doi = {10.1186/S13635-021-00118-1}, timestamp = {Fri, 30 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/YeSZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/AbikoyeAHAK20, author = {Oluwakemi Christiana Abikoye and Abdullahi Abubakar and Ahmad Dokoro Haruna and Noah Oluwatobi Akande and Anthonia Aderonke Kayode}, title = {A novel technique to prevent {SQL} injection and cross-site scripting attacks using Knuth-Morris-Pratt string match algorithm}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2020}, pages = {14}, year = {2020}, url = {https://doi.org/10.1186/s13635-020-00113-y}, doi = {10.1186/S13635-020-00113-Y}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/AbikoyeAHAK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/CozzolinoMGPV20, author = {Davide Cozzolino and Francesco Marra and Diego Gragnaniello and Giovanni Poggi and Luisa Verdoliva}, title = {Combining {PRNU} and noiseprint for robust and efficient device source identification}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2020}, pages = {1}, year = {2020}, url = {https://doi.org/10.1186/s13635-020-0101-7}, doi = {10.1186/S13635-020-0101-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/CozzolinoMGPV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/DingRLOKH20, author = {Xinyi Ding and Zohreh Raziei and Eric C. Larson and Eli V. Olinick and Paul Krueger and Michael Hahsler}, title = {Swapped face detection using deep learning and subjective assessment}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2020}, pages = {6}, year = {2020}, url = {https://doi.org/10.1186/s13635-020-00109-8}, doi = {10.1186/S13635-020-00109-8}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/DingRLOKH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/DongKYF20, author = {Keming Dong and Hyoung Joong Kim and Xiaohan Yu and Xiaoqing Feng}, title = {Reversible data hiding for binary images based on adaptive overlapping pattern}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2020}, pages = {11}, year = {2020}, url = {https://doi.org/10.1186/s13635-020-00107-w}, doi = {10.1186/S13635-020-00107-W}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/DongKYF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/EllavarasonGD20, author = {Elakkiya Ellavarason and Richard M. Guest and Farzin Deravi}, title = {Evaluation of stability of swipe gesture authentication across usage scenarios of mobile device}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2020}, pages = {4}, year = {2020}, url = {https://doi.org/10.1186/s13635-020-00103-0}, doi = {10.1186/S13635-020-00103-0}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/EllavarasonGD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/KandasamySAR20, author = {Kamalanathan Kandasamy and Sethuraman Srinivas and Krishnashree Achuthan and P. Venkat Rangan}, title = {IoT cyber risk: a holistic analysis of cyber risk assessment frameworks, risk vectors, and risk ranking process}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2020}, pages = {8}, year = {2020}, url = {https://doi.org/10.1186/s13635-020-00111-0}, doi = {10.1186/S13635-020-00111-0}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/KandasamySAR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/MuthGABK20, author = {Philipp Muth and Matthias Geihs and Tolga Arul and Johannes Buchmann and Stefan Katzenbeisser}, title = {{ELSA:} efficient long-term secure storage of large datasets (full version) \({}^{\mbox{{\({_\ast}\)}}}\)}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2020}, pages = {9}, year = {2020}, url = {https://doi.org/10.1186/s13635-020-00108-9}, doi = {10.1186/S13635-020-00108-9}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejisec/MuthGABK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/NooriST20, author = {Davood Noori and Hassan Shakeri and Masood Niazi Torshiz}, title = {Scalable, efficient, and secure {RFID} with elliptic curve cryptosystem for Internet of Things in healthcare environment}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2020}, pages = {13}, year = {2020}, url = {https://doi.org/10.1186/s13635-020-00114-x}, doi = {10.1186/S13635-020-00114-X}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/NooriST20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/PasquiniB20, author = {Cecilia Pasquini and Rainer B{\"{o}}hme}, title = {Trembling triggers: exploring the sensitivity of backdoors in DNN-based face recognition}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2020}, pages = {12}, year = {2020}, url = {https://doi.org/10.1186/s13635-020-00104-z}, doi = {10.1186/S13635-020-00104-Z}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejisec/PasquiniB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/SotgiuDMBFFR20, author = {Angelo Sotgiu and Ambra Demontis and Marco Melis and Battista Biggio and Giorgio Fumera and Xiaoyi Feng and Fabio Roli}, title = {Deep neural rejection against adversarial examples}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2020}, pages = {5}, year = {2020}, url = {https://doi.org/10.1186/s13635-020-00105-y}, doi = {10.1186/S13635-020-00105-Y}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/SotgiuDMBFFR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/TaranRHV20, author = {Olga Taran and Shideh Rezaeifar and Taras Holotyak and Slava Voloshynovskiy}, title = {Machine learning through cryptographic glasses: combating adversarial attacks by key-based diversified aggregation}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2020}, pages = {10}, year = {2020}, url = {https://doi.org/10.1186/s13635-020-00106-x}, doi = {10.1186/S13635-020-00106-X}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejisec/TaranRHV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/TianWL20, author = {Junfeng Tian and Zilong Wang and Zhen Li}, title = {Low-cost data partitioning and encrypted backup scheme for defending against co-resident attacks}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2020}, pages = {7}, year = {2020}, url = {https://doi.org/10.1186/s13635-020-00110-1}, doi = {10.1186/S13635-020-00110-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/TianWL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/WhiskerdKJLEVDH20, author = {Nicholas Whiskerd and Nicklas K{\"{o}}rtge and Kris J{\"{u}}rgens and Kevin Lamsh{\"{o}}ft and Salatiel Ezennaya{-}Gomez and Claus Vielhauer and Jana Dittmann and Mario Hildebrandt}, title = {Keystroke biometrics in the encrypted domain: a first study on search suggestion functions of web search engines}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2020}, pages = {2}, year = {2020}, url = {https://doi.org/10.1186/s13635-020-0100-8}, doi = {10.1186/S13635-020-0100-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/WhiskerdKJLEVDH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/WrightS20, author = {Carrie Wright and Darryl Stewart}, title = {Understanding visual lip-based biometric authentication for mobile devices}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2020}, pages = {3}, year = {2020}, url = {https://doi.org/10.1186/s13635-020-0102-6}, doi = {10.1186/S13635-020-0102-6}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/WrightS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/ZhangAFA20, author = {Hanwei Zhang and Yannis Avrithis and Teddy Furon and Laurent Amsaleg}, title = {Smooth adversarial examples}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2020}, pages = {15}, year = {2020}, url = {https://doi.org/10.1186/s13635-020-00112-z}, doi = {10.1186/S13635-020-00112-Z}, timestamp = {Thu, 26 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejisec/ZhangAFA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/BuchmannGHKS19, author = {Johannes Buchmann and Matthias Geihs and Kay Hamacher and Stefan Katzenbeisser and Sebastian Stammler}, title = {Long-term integrity protection of genomic data}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2019}, pages = {15}, year = {2019}, url = {https://doi.org/10.1186/s13635-019-0099-x}, doi = {10.1186/S13635-019-0099-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/BuchmannGHKS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/DeshpandeMT19, author = {Pallavi Deshpande and Prachi Mukherji and Anil S. Tavildar}, title = {Accuracy enhancement of biometric recognition using iterative weights optimization algorithm}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2019}, pages = {6}, year = {2019}, url = {https://doi.org/10.1186/s13635-019-0089-z}, doi = {10.1186/S13635-019-0089-Z}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/DeshpandeMT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/FangXXZ19, author = {Xing Fang and Maochao Xu and Shouhuai Xu and Peng Zhao}, title = {A deep learning framework for predicting cyber attacks rates}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2019}, pages = {5}, year = {2019}, url = {https://doi.org/10.1186/s13635-019-0090-6}, doi = {10.1186/S13635-019-0090-6}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/FangXXZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/GehrmannRJ19, author = {Christian Gehrmann and Marcus Rodan and Niklas J{\"{o}}nsson}, title = {Metadata filtering for user-friendly centralized biometric authentication}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2019}, pages = {7}, year = {2019}, url = {https://doi.org/10.1186/s13635-019-0093-3}, doi = {10.1186/S13635-019-0093-3}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/GehrmannRJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/HuSMWZ19, author = {Yahong Hu and Xia Sheng and Jiafa Mao and Kaihui Wang and Danhong Zhong}, title = {Spark-based real-time proactive image tracking protection model}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2019}, pages = {3}, year = {2019}, url = {https://doi.org/10.1186/s13635-019-0086-2}, doi = {10.1186/S13635-019-0086-2}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/HuSMWZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/KnirschUE19, author = {Fabian Knirsch and Andreas Unterweger and Dominik Engel}, title = {Implementing a blockchain from scratch: why, how, and what we learned}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2019}, pages = {2}, year = {2019}, url = {https://doi.org/10.1186/s13635-019-0085-3}, doi = {10.1186/S13635-019-0085-3}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/KnirschUE19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/KucukGM19, author = {Kubilay Ahmet K{\"{u}}{\c{c}}{\"{u}}k and David Grawrock and Andrew Martin}, title = {Managing confidentiality leaks through private algorithms on Software Guard eXtensions {(SGX)} enclaves}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2019}, pages = {14}, year = {2019}, url = {https://doi.org/10.1186/s13635-019-0091-5}, doi = {10.1186/S13635-019-0091-5}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejisec/KucukGM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/MouawiECK19, author = {Riwa Mouawi and Imad H. Elhajj and Ali Chehab and Ayman I. Kayssi}, title = {Crowdsourcing for click fraud detection}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2019}, pages = {11}, year = {2019}, url = {https://doi.org/10.1186/s13635-019-0095-1}, doi = {10.1186/S13635-019-0095-1}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejisec/MouawiECK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/NembhardCE19, author = {Fitzroy Nembhard and Marco M. Carvalho and Thomas C. Eskridge}, title = {Towards the application of recommender systems to secure coding}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2019}, pages = {9}, year = {2019}, url = {https://doi.org/10.1186/s13635-019-0092-4}, doi = {10.1186/S13635-019-0092-4}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/NembhardCE19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/RizzoBM19, author = {Stefano Giovanni Rizzo and Flavio Bertini and Danilo Montesi}, title = {Fine-grain watermarking for intellectual property protection}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2019}, pages = {10}, year = {2019}, url = {https://doi.org/10.1186/s13635-019-0094-2}, doi = {10.1186/S13635-019-0094-2}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejisec/RizzoBM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/SharmaGGG19, author = {Jivitesh Sharma and Charul Giri and Ole{-}Christoffer Granmo and Morten Goodwin}, title = {Multi-layer intrusion detection system with ExtraTrees feature selection, extreme learning machine ensemble, and softmax aggregation}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2019}, pages = {16}, year = {2019}, url = {https://doi.org/10.1186/s13635-019-0098-y}, doi = {10.1186/S13635-019-0098-Y}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/SharmaGGG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/StankoCS19, author = {Taras Stanko and Bin Chen and Boris Skoric}, title = {Fingerprint template protection using minutia-pair spectral representations}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2019}, pages = {12}, year = {2019}, url = {https://doi.org/10.1186/s13635-019-0096-0}, doi = {10.1186/S13635-019-0096-0}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/StankoCS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/YangZWM19, author = {Wenjun Yang and Jiaying Zhang and Chundong Wang and Xiu{-}liang Mo}, title = {Situation prediction of large-scale Internet of Things network security}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2019}, pages = {13}, year = {2019}, url = {https://doi.org/10.1186/s13635-019-0097-z}, doi = {10.1186/S13635-019-0097-Z}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/YangZWM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/YerimaAS19, author = {Suleiman Y. Yerima and Mohammed K. Alzaylaee and Sakir Sezer}, title = {Machine learning-based dynamic analysis of Android apps with improved code coverage}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2019}, pages = {4}, year = {2019}, url = {https://doi.org/10.1186/s13635-019-0087-1}, doi = {10.1186/S13635-019-0087-1}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/YerimaAS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/ZhangMCZ19, author = {Chengli Zhang and Wenping Ma and Hefeng Chen and Feifei Zhao}, title = {A new method of generating hard random lattices with short bases}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2019}, pages = {8}, year = {2019}, url = {https://doi.org/10.1186/s13635-019-0088-0}, doi = {10.1186/S13635-019-0088-0}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/ZhangMCZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/ZhaoSPKK19, author = {Juan Zhao and Sachin Shetty and Jan Wei Pan and Charles A. Kamhoua and Kevin A. Kwiat}, title = {Transfer learning for detecting unknown network attacks}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2019}, pages = {1}, year = {2019}, url = {https://doi.org/10.1186/s13635-019-0084-4}, doi = {10.1186/S13635-019-0084-4}, timestamp = {Tue, 08 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/ZhaoSPKK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/CabajKKM18, author = {Krzysztof Cabaj and Zbigniew Kotulski and Bogdan Ksiezopolski and Wojciech Mazurczyk}, title = {Cybersecurity: trends, issues, and challenges}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2018}, pages = {10}, year = {2018}, url = {https://doi.org/10.1186/s13635-018-0080-0}, doi = {10.1186/S13635-018-0080-0}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/CabajKKM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/CaiV18, author = {Hang Cai and Krishna K. Venkatasubramanian}, title = {Detecting data manipulation attacks on physiological sensor measurements in wearable medical systems}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2018}, pages = {13}, year = {2018}, url = {https://doi.org/10.1186/s13635-018-0082-y}, doi = {10.1186/S13635-018-0082-Y}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/CaiV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/ChopraBJ18, author = {Khyati Chopra and Ranjan Bose and Anupam Joshi}, title = {Secrecy outage of threshold-based cooperative relay network with and without direct links}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2018}, pages = {7}, year = {2018}, url = {https://doi.org/10.1186/s13635-018-0077-8}, doi = {10.1186/S13635-018-0077-8}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejisec/ChopraBJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/GeraB18, author = {Jaideep Gera and Bhanu Prakash Battula}, title = {Detection of spoofed and non-spoofed DDoS attacks and discriminating them from flash crowds}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2018}, pages = {9}, year = {2018}, url = {https://doi.org/10.1186/s13635-018-0079-6}, doi = {10.1186/S13635-018-0079-6}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/GeraB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/HameedA18, author = {Sufian Hameed and Usman Murad Ali}, title = {{HADEC:} Hadoop-based live DDoS detection framework}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2018}, pages = {11}, year = {2018}, url = {https://doi.org/10.1186/s13635-018-0081-z}, doi = {10.1186/S13635-018-0081-Z}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/HameedA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/KotulskiNSTABOW18, author = {Zbigniew Kotulski and Tomasz Wojciech Nowak and Mariusz Sepczuk and Marcin Alan Tunia and Rafal Artych and Krzysztof Bocianiak and Tomasz Osko and Jean{-}Philippe Wary}, title = {Towards constructive approach to end-to-end slice isolation in 5G networks}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2018}, pages = {2}, year = {2018}, url = {https://doi.org/10.1186/s13635-018-0072-0}, doi = {10.1186/S13635-018-0072-0}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/KotulskiNSTABOW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/NavarroLDP18, author = {Julio Navarro and V{\'{e}}ronique Legrand and Aline Deruyver and Pierre Parrend}, title = {{OMMA:} open architecture for Operator-guided Monitoring of Multi-step Attacks}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2018}, pages = {6}, year = {2018}, url = {https://doi.org/10.1186/s13635-018-0075-x}, doi = {10.1186/S13635-018-0075-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/NavarroLDP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/PadillaM018, author = {Jonathan Mart{\'{\i}}nez Padilla and Uwe Meyer{-}Baese and Simon Foo}, title = {Security evaluation of Tree Parity Re-keying Machine implementations utilizing side-channel emissions}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2018}, pages = {3}, year = {2018}, url = {https://doi.org/10.1186/s13635-018-0073-z}, doi = {10.1186/S13635-018-0073-Z}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/PadillaM018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/ParrendNGDC18, author = {Pierre Parrend and Julio Navarro and Fabio Guigou and Aline Deruyver and Pierre Collet}, title = {Foundations and applications of artificial Intelligence for zero-day and multi-step attack detection}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2018}, pages = {4}, year = {2018}, url = {https://doi.org/10.1186/s13635-018-0074-y}, doi = {10.1186/S13635-018-0074-Y}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/ParrendNGDC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/Sharevski18, author = {Filipo Sharevski}, title = {Towards 5G cellular network forensics}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2018}, pages = {8}, year = {2018}, url = {https://doi.org/10.1186/s13635-018-0078-7}, doi = {10.1186/S13635-018-0078-7}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/Sharevski18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/SitekK18, author = {Albert Sitek and Zbigniew Kotulski}, title = {POS-originated transaction traces as a source of contextual information for risk management systems in {EFT} transactions}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2018}, pages = {5}, year = {2018}, url = {https://doi.org/10.1186/s13635-018-0076-9}, doi = {10.1186/S13635-018-0076-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/SitekK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/WangL18, author = {Liangming Wang and Fagui Liu}, title = {A trusted measurement model based on dynamic policy and privacy protection in IaaS security domain}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2018}, pages = {1}, year = {2018}, url = {https://doi.org/10.1186/s13635-018-0071-1}, doi = {10.1186/S13635-018-0071-1}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/WangL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/XuLLSS18, author = {Guangwei Xu and Miaolin Lai and Jing Li and Li Sun and Xiujin Shi}, title = {A generic integrity verification algorithm of version files for cloud deduplication data storage}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2018}, pages = {12}, year = {2018}, url = {https://doi.org/10.1186/s13635-018-0083-x}, doi = {10.1186/S13635-018-0083-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/XuLLSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/AldwairiAJ17, author = {Monther Aldwairi and Ansam M. Abu{-}Dalo and Moath H. A. Jarrah}, title = {Pattern matching of signature-based {IDS} using Myers algorithm under MapReduce framework}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2017}, pages = {9}, year = {2017}, url = {https://doi.org/10.1186/s13635-017-0062-7}, doi = {10.1186/S13635-017-0062-7}, timestamp = {Wed, 26 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/AldwairiAJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/BaiYW17, author = {Xiaolong Bai and Jie Yin and Yu{-}Ping Wang}, title = {Sensor Guardian: prevent privacy inference on Android sensors}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2017}, pages = {10}, year = {2017}, url = {https://doi.org/10.1186/s13635-017-0061-8}, doi = {10.1186/S13635-017-0061-8}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/BaiYW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/BrownAD17, author = {James Brown and Mohd Anwar and Gerry V. Dozier}, title = {An artificial immunity approach to malware detection in a mobile platform}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2017}, pages = {7}, year = {2017}, url = {https://doi.org/10.1186/s13635-017-0059-2}, doi = {10.1186/S13635-017-0059-2}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/BrownAD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/DeShuD17, author = {DeShu Lin and Ding Feng}, title = {Research on transmission of technology of downward information security for wellbore trajectory control}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2017}, pages = {17}, year = {2017}, url = {https://doi.org/10.1186/s13635-017-0069-0}, doi = {10.1186/S13635-017-0069-0}, timestamp = {Mon, 27 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejisec/DeShuD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/DoldG17, author = {Florian Dold and Christian Grothoff}, title = {Byzantine set-union consensus using efficient set reconciliation}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2017}, pages = {14}, year = {2017}, url = {https://doi.org/10.1186/s13635-017-0066-3}, doi = {10.1186/S13635-017-0066-3}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/DoldG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/DrewHM17, author = {Jake Drew and Michael Hahsler and Tyler Moore}, title = {Polymorphic malware detection using sequence classification methods and ensembles}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2017}, pages = {2}, year = {2017}, url = {https://doi.org/10.1186/s13635-017-0055-6}, doi = {10.1186/S13635-017-0055-6}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/DrewHM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/GallosKF17, author = {Lazaros K. Gallos and Maciej Korczynski and Nina H. Fefferman}, title = {Anomaly detection through information sharing under different topologies}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2017}, pages = {5}, year = {2017}, url = {https://doi.org/10.1186/s13635-017-0056-5}, doi = {10.1186/S13635-017-0056-5}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/GallosKF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/GuoFC17, author = {Zhen Guo and Yu Fu and Chunjie Cao}, title = {Secure first-price sealed-bid auction scheme}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2017}, pages = {16}, year = {2017}, url = {https://doi.org/10.1186/s13635-017-0068-1}, doi = {10.1186/S13635-017-0068-1}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/GuoFC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/IliouKTVK17, author = {Christos Iliou and George Kalpakis and Theodora Tsikrika and Stefanos Vrochidis and Ioannis Kompatsiaris}, title = {Hybrid focused crawling on the Surface and the Dark Web}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2017}, pages = {11}, year = {2017}, url = {https://doi.org/10.1186/s13635-017-0064-5}, doi = {10.1186/S13635-017-0064-5}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/IliouKTVK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/JiangK17, author = {Feng Jiang and Brian King}, title = {A novel quality assessment for visual secret sharing schemes}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2017}, pages = {1}, year = {2017}, url = {https://doi.org/10.1186/s13635-016-0053-0}, doi = {10.1186/S13635-016-0053-0}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/JiangK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/KnirschEE17, author = {Fabian Knirsch and G{\"{u}}nther Eibl and Dominik Engel}, title = {Multi-resolution privacy-enhancing technologies for smart metering}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2017}, pages = {6}, year = {2017}, url = {https://doi.org/10.1186/s13635-017-0058-3}, doi = {10.1186/S13635-017-0058-3}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/KnirschEE17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/MotzekGDGM17, author = {Alexander Motzek and Gustavo Gonzalez Granadillo and Herv{\'{e}} Debar and Joaqu{\'{\i}}n Garc{\'{\i}}a and Ralf M{\"{o}}ller}, title = {Selection of Pareto-efficient response plans based on financial and operational assessments}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2017}, pages = {12}, year = {2017}, url = {https://doi.org/10.1186/s13635-017-0063-6}, doi = {10.1186/S13635-017-0063-6}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejisec/MotzekGDGM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/OglazaLZBB17, author = {Arnaud Oglaza and Romain Laborde and Pascale Zarat{\'{e}} and Abdelmalek Benzekri and Fran{\c{c}}ois Barr{\`{e}}re}, title = {A new approach for managing Android permissions: learning users' preferences}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2017}, pages = {13}, year = {2017}, url = {https://doi.org/10.1186/s13635-017-0065-4}, doi = {10.1186/S13635-017-0065-4}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejisec/OglazaLZBB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/Rubio-HernanCG17, author = {Jose Rubio{-}Hernan and Luca De Cicco and Joaqu{\'{\i}}n Garc{\'{\i}}a}, title = {On the use of watermark-based schemes to detect cyber-physical attacks}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2017}, pages = {8}, year = {2017}, url = {https://doi.org/10.1186/s13635-017-0060-9}, doi = {10.1186/S13635-017-0060-9}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/Rubio-HernanCG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/ShullaniFISP17, author = {Dasara Shullani and Marco Fontani and Massimo Iuliani and Omar Al Shaya and Alessandro Piva}, title = {{VISION:} a video and image dataset for source identification}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2017}, pages = {15}, year = {2017}, url = {https://doi.org/10.1186/s13635-017-0067-2}, doi = {10.1186/S13635-017-0067-2}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/ShullaniFISP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/SokolMH17, author = {Pavol Sokol and Jakub M{\'{\i}}sek and Martin Hus{\'{a}}k}, title = {Honeypots and honeynets: issues of privacy}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2017}, pages = {4}, year = {2017}, url = {https://doi.org/10.1186/s13635-017-0057-4}, doi = {10.1186/S13635-017-0057-4}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/SokolMH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/VeugenDEPVW17, author = {Thijs Veugen and Jeroen Doumen and Zekeriya Erkin and Gaetano Pellegrino and Sicco Verwer and Jos H. Weber}, title = {Improved privacy of dynamic group services}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2017}, pages = {3}, year = {2017}, url = {https://doi.org/10.1186/s13635-017-0054-7}, doi = {10.1186/S13635-017-0054-7}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/VeugenDEPVW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/YangYW17, author = {Guang Yang and Shuofeng Yu and Shouwen Wen}, title = {Research on fault diagnosis system of hall for workshop of meta-synthetic engineering based on information fusion}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2017}, pages = {18}, year = {2017}, url = {https://doi.org/10.1186/s13635-017-0070-7}, doi = {10.1186/S13635-017-0070-7}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/YangYW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/BahwairethTBJT16, author = {Khadijah Bahwaireth and Lo'ai Tawalbeh and Elhadj Benkhelifa and Yaser Jararweh and Mohammad Tawalbeh}, title = {Experimental comparison of simulation tools for efficient cloud and mobile cloud computing applications}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2016}, pages = {15}, year = {2016}, url = {https://doi.org/10.1186/s13635-016-0039-y}, doi = {10.1186/S13635-016-0039-Y}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/BahwairethTBJT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/Bottinger16, author = {Konstantin B{\"{o}}ttinger}, title = {Fuzzing binaries with L{\'{e}}vy flight swarms}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2016}, pages = {28}, year = {2016}, url = {https://doi.org/10.1186/s13635-016-0052-1}, doi = {10.1186/S13635-016-0052-1}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/Bottinger16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/ChenLLZZ16, author = {Jingning Chen and Fenlin Liu and Xiangyang Luo and Fan Zhao and Guang Zhu}, title = {A landmark calibration-based {IP} geolocation approach}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2016}, pages = {4}, year = {2016}, url = {https://doi.org/10.1186/s13635-015-0029-5}, doi = {10.1186/S13635-015-0029-5}, timestamp = {Fri, 13 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/ChenLLZZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/ChengZYL16, author = {Hang Cheng and Xinpeng Zhang and Jiang Yu and Fengyong Li}, title = {Markov process-based retrieval for encrypted {JPEG} images}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2016}, pages = {1}, year = {2016}, url = {https://doi.org/10.1186/s13635-015-0028-6}, doi = {10.1186/S13635-015-0028-6}, timestamp = {Tue, 01 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejisec/ChengZYL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/ChoCSCK16, author = {Geumhwan Cho and Junsung Cho and Youngbae Song and Donghyun Choi and Hyoungshick Kim}, title = {Combating online fraud attacks in mobile-based advertising}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2016}, pages = {2}, year = {2016}, url = {https://doi.org/10.1186/s13635-015-0027-7}, doi = {10.1186/S13635-015-0027-7}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/ChoCSCK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/DK16, author = {Pramodh Krishna D. and Venu Gopal Rao K.}, title = {Generalized weighted tree similarity algorithms for taxonomy trees}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2016}, pages = {12}, year = {2016}, url = {https://doi.org/10.1186/s13635-016-0035-2}, doi = {10.1186/S13635-016-0035-2}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/DK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/El-BoozAE16, author = {Sheren A. El{-}Booz and Gamal Attiya and Nawal A. El{-}Fishawy}, title = {A secure cloud storage system combining time-based one-time password and automatic blocker protocol}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2016}, pages = {13}, year = {2016}, url = {https://doi.org/10.1186/s13635-016-0037-0}, doi = {10.1186/S13635-016-0037-0}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejisec/El-BoozAE16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/FanYFWC16, author = {Kefeng Fan and Xiangzhen Yao and Xiaohe Fan and Yong Wang and Mingjie Chen}, title = {A new usage control protocol for data protection of cloud environment}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2016}, pages = {7}, year = {2016}, url = {https://doi.org/10.1186/s13635-016-0031-6}, doi = {10.1186/S13635-016-0031-6}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/FanYFWC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/GhaziMRSH16, author = {Yumna Ghazi and Rahat Masood and Abid Rauf and Muhammad Awais Shibli and Osman Hassan}, title = {DB-SECaaS: a cloud-based protection system for document-oriented NoSQL databases}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2016}, pages = {16}, year = {2016}, url = {https://doi.org/10.1186/s13635-016-0040-5}, doi = {10.1186/S13635-016-0040-5}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejisec/GhaziMRSH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/GuptaYC16, author = {Brij B. Gupta and Shingo Yamaguchi and Pethuru Raj Chelliah}, title = {Guest editorial special issues on security trends in mobile cloud computing, web, and social networking}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2016}, pages = {27}, year = {2016}, url = {https://doi.org/10.1186/s13635-016-0051-2}, doi = {10.1186/S13635-016-0051-2}, timestamp = {Fri, 26 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejisec/GuptaYC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/HuberTWRS16, author = {Manuel Huber and Benjamin Taubmann and Sascha Wessel and Hans P. Reiser and Georg Sigl}, title = {A flexible framework for mobile device forensics based on cold boot attacks}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2016}, pages = {17}, year = {2016}, url = {https://doi.org/10.1186/s13635-016-0041-4}, doi = {10.1186/S13635-016-0041-4}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/HuberTWRS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/HummerKNFP16, author = {Matthias Hummer and Michael Kunz and Michael Netter and Ludwig Fuchs and G{\"{u}}nther Pernul}, title = {Adaptive identity and access management - contextual data based policies}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2016}, pages = {19}, year = {2016}, url = {https://doi.org/10.1186/s13635-016-0043-2}, doi = {10.1186/S13635-016-0043-2}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/HummerKNFP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/HusakCJC16, author = {Martin Hus{\'{a}}k and Milan Cerm{\'{a}}k and Tom{\'{a}}s Jirs{\'{\i}}k and Pavel Celeda}, title = {{HTTPS} traffic analysis and client identification using passive {SSL/TLS} fingerprinting}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2016}, pages = {6}, year = {2016}, url = {https://doi.org/10.1186/s13635-016-0030-7}, doi = {10.1186/S13635-016-0030-7}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/HusakCJC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/JainG16, author = {Ankit Kumar Jain and Brij B. Gupta}, title = {A novel approach to protect against phishing attacks at client side using auto-updated white-list}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2016}, pages = {9}, year = {2016}, url = {https://doi.org/10.1186/s13635-016-0034-3}, doi = {10.1186/S13635-016-0034-3}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/JainG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/KotzerkeHDHSVH16, author = {Johannes Kotzerke and Hao Hao and Stephen A. Davis and Robert Hayes and Luuk J. Spreeuwers and Raymond N. J. Veldhuis and Kathy J. Horadam}, title = {Identification performance of evidential value estimation for ridge-based biometrics}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2016}, pages = {24}, year = {2016}, url = {https://doi.org/10.1186/s13635-016-0050-3}, doi = {10.1186/S13635-016-0050-3}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/KotzerkeHDHSVH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/Laarhoven16, author = {Thijs Laarhoven}, title = {Asymptotics of fingerprinting and group testing: capacity-achieving log-likelihood decoders}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2016}, pages = {3}, year = {2016}, url = {https://doi.org/10.1186/s13635-015-0026-8}, doi = {10.1186/S13635-015-0026-8}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/Laarhoven16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/MachadoBSS16, author = {Raphael C. S. Machado and Davidson R. Boccardo and Vin{\'{\i}}cius Gusm{\~{a}}o Pereira de S{\'{a}} and Jayme Luiz Szwarcfiter}, title = {Software control and intellectual property protection in cyber-physical systems}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2016}, pages = {8}, year = {2016}, url = {https://doi.org/10.1186/s13635-016-0032-5}, doi = {10.1186/S13635-016-0032-5}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/MachadoBSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/NateghizadEL16, author = {Majid Nateghizad and Zekeriya Erkin and Reginald L. Lagendijk}, title = {An efficient privacy-preserving comparison protocol in smart metering systems}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2016}, pages = {11}, year = {2016}, url = {https://doi.org/10.1186/s13635-016-0033-4}, doi = {10.1186/S13635-016-0033-4}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/NateghizadEL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/QiPS16, author = {Qilin Qi and Dongming Peng and Hamid Sharif}, title = {{DST} approach to enhance audio quality on lost audio packet steganography}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2016}, pages = {20}, year = {2016}, url = {https://doi.org/10.1186/s13635-016-0046-z}, doi = {10.1186/S13635-016-0046-Z}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/QiPS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/RathgebTWB16, author = {Christian Rathgeb and Benjamin Tams and Johannes Wagner and Christoph Busch}, title = {Unlinkable improved multi-biometric iris fuzzy vault}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2016}, pages = {26}, year = {2016}, url = {https://doi.org/10.1186/s13635-016-0049-9}, doi = {10.1186/S13635-016-0049-9}, timestamp = {Tue, 05 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejisec/RathgebTWB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/SrndicL16, author = {Nedim Srndic and Pavel Laskov}, title = {Hidost: a static machine-learning-based detector of malicious files}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2016}, pages = {22}, year = {2016}, url = {https://doi.org/10.1186/s13635-016-0045-0}, doi = {10.1186/S13635-016-0045-0}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/SrndicL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/ToriiKYITM16, author = {Naoya Torii and Hirotaka Kokubo and Dai Yamamoto and Kouichi Itoh and Masahiko Takenaka and Tsutomu Matsumoto}, title = {{ASIC} implementation of random number generators using {SR} latches and its evaluation}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2016}, pages = {10}, year = {2016}, url = {https://doi.org/10.1186/s13635-016-0036-1}, doi = {10.1186/S13635-016-0036-1}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/ToriiKYITM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/UllrichCFW16, author = {Johanna Ullrich and Jordan Cropper and Peter Fr{\"{u}}hwirt and Edgar R. Weippl}, title = {The role and security of firewalls in cyber-physical cloud computing}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2016}, pages = {18}, year = {2016}, url = {https://doi.org/10.1186/s13635-016-0042-3}, doi = {10.1186/S13635-016-0042-3}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/UllrichCFW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/UnterwegerKEE16, author = {Andreas Unterweger and Fabian Knirsch and G{\"{u}}nther Eibl and Dominik Engel}, title = {Privacy-preserving load profile matching for tariff decisions in smart grids}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2016}, pages = {21}, year = {2016}, url = {https://doi.org/10.1186/s13635-016-0044-1}, doi = {10.1186/S13635-016-0044-1}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/UnterwegerKEE16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/WangZ16, author = {Qing Wang and Rong Zhang}, title = {Double {JPEG} compression forensics based on a convolutional neural network}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2016}, pages = {23}, year = {2016}, url = {https://doi.org/10.1186/s13635-016-0047-y}, doi = {10.1186/S13635-016-0047-Y}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/WangZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/WildHFU16, author = {Peter Wild and Heinz Hofbauer and James M. Ferryman and Andreas Uhl}, title = {Quality-based iris segmentation-level fusion}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2016}, pages = {25}, year = {2016}, url = {https://doi.org/10.1186/s13635-016-0048-x}, doi = {10.1186/S13635-016-0048-X}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/WildHFU16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/XuH16, author = {Hansong Xu and Kun Hua}, title = {Secured {ECG} signal transmission for human emotional stress classification in wireless body area networks}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2016}, pages = {5}, year = {2016}, url = {https://doi.org/10.1186/s13635-015-0024-x}, doi = {10.1186/S13635-015-0024-X}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/XuH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/ZhangMW16, author = {Shuhui Zhang and Xiangxu Meng and Lianhai Wang}, title = {An adaptive approach for Linux memory analysis based on kernel code reconstruction}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2016}, pages = {14}, year = {2016}, url = {https://doi.org/10.1186/s13635-016-0038-z}, doi = {10.1186/S13635-016-0038-Z}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/ZhangMW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/0001GM15, author = {Jos{\'{e}} Marinho and Jorge Granjal and Edmundo Monteiro}, title = {A survey on security attacks and countermeasures with primary user detection in cognitive radio networks}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2015}, pages = {4}, year = {2015}, url = {https://doi.org/10.1186/s13635-015-0021-0}, doi = {10.1186/S13635-015-0021-0}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/0001GM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/BarmanSC15, author = {Subhas Barman and Debasis Samanta and Samiran Chattopadhyay}, title = {Fingerprint-based crypto-biometric system for network security}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2015}, pages = {3}, year = {2015}, url = {https://doi.org/10.1186/s13635-015-0020-1}, doi = {10.1186/S13635-015-0020-1}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/BarmanSC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/BianchiPS15, author = {Tiziano Bianchi and Alessandro Piva and Dasara Shullani}, title = {Anticollusion solutions for asymmetric fingerprinting protocols based on client side embedding}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2015}, pages = {6}, year = {2015}, url = {https://doi.org/10.1186/s13635-015-0023-y}, doi = {10.1186/S13635-015-0023-Y}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/BianchiPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/FuchsHMF15, author = {Karl{-}Peter Fuchs and Dominik Herrmann and Andrea Micheloni and Hannes Federrath}, title = {Laribus: privacy-preserving detection of fake {SSL} certificates with a social {P2P} notary network}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2015}, pages = {1}, year = {2015}, url = {https://doi.org/10.1186/s13635-014-0018-0}, doi = {10.1186/S13635-014-0018-0}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/FuchsHMF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/QiaoRCZ15, author = {Tong Qiao and Florent Retraint and R{\'{e}}mi Cogranne and Cathel Zitzmann}, title = {Steganalysis of JSteg algorithm using hypothesis testing theory}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2015}, pages = {2}, year = {2015}, url = {https://doi.org/10.1186/s13635-015-0019-7}, doi = {10.1186/S13635-015-0019-7}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/QiaoRCZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/RaghavendraB15, author = {Ramachandra Raghavendra and Christoph Busch}, title = {Texture based features for robust palmprint recognition: a comparative study}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2015}, pages = {5}, year = {2015}, url = {https://doi.org/10.1186/s13635-015-0022-z}, doi = {10.1186/S13635-015-0022-Z}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/RaghavendraB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/RassSB15, author = {Stefan Rass and Peter Schartner and Monika Brodbeck}, title = {Private function evaluation by local two-party computation}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2015}, pages = {7}, year = {2015}, url = {https://doi.org/10.1186/s13635-015-0025-9}, doi = {10.1186/S13635-015-0025-9}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/RassSB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/BianchiRFRP14, author = {Tiziano Bianchi and Alessia De Rosa and Marco Fontani and Giovanni Rocciolo and Alessandro Piva}, title = {Detection and localization of double compression in {MP3} audio tracks}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2014}, pages = {10}, year = {2014}, url = {https://doi.org/10.1186/1687-417X-2014-10}, doi = {10.1186/1687-417X-2014-10}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/BianchiRFRP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/ChabchoubCD14, author = {Yousra Chabchoub and Raja Chiky and Betul Dogan}, title = {How can sliding HyperLogLog and {EWMA} detect port scan attacks in {IP} traffic?}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2014}, pages = {5}, year = {2014}, url = {https://doi.org/10.1186/1687-417X-2014-5}, doi = {10.1186/1687-417X-2014-5}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/ChabchoubCD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/CiptasariRS14, author = {Rimba Whidiana Ciptasari and Kyung Hyune Rhee and Kouichi Sakurai}, title = {An enhanced audio ownership protection scheme based on visual cryptography}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2014}, pages = {2}, year = {2014}, url = {https://doi.org/10.1186/1687-417X-2014-2}, doi = {10.1186/1687-417X-2014-2}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/CiptasariRS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/DrewM14, author = {Jake Drew and Tyler Moore}, title = {Optimized combined-clustering methods for finding replicated criminal websites}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2014}, pages = {14}, year = {2014}, url = {https://doi.org/10.1186/s13635-014-0014-4}, doi = {10.1186/S13635-014-0014-4}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/DrewM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/EssaouiniCCK14, author = {Nada Essaouini and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Anas Abou El Kalam}, title = {Conflict detection in obligation with deadline policies}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2014}, pages = {13}, year = {2014}, url = {https://doi.org/10.1186/s13635-014-0013-5}, doi = {10.1186/S13635-014-0013-5}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/EssaouiniCCK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/HoHSB14, author = {Anh Thu Phan Ho and Bao An Mai Hoang and Wadih Sawaya and Patrick Bas}, title = {Document authentication using graphical codes: reliable performance analysis and channel optimization}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2014}, pages = {9}, year = {2014}, url = {https://doi.org/10.1186/1687-417X-2014-9}, doi = {10.1186/1687-417X-2014-9}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/HoHSB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/HolubFD14, author = {Vojtech Holub and Jessica J. Fridrich and Tom{\'{a}}s Denemark}, title = {Universal distortion function for steganography in an arbitrary domain}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2014}, pages = {1}, year = {2014}, url = {https://doi.org/10.1186/1687-417X-2014-1}, doi = {10.1186/1687-417X-2014-1}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/HolubFD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/HuWSSJS14, author = {Xin Hu and Ting Wang and Marc Ph. Stoecklin and Douglas Lee Schales and Jiyong Jang and Reiner Sailer}, title = {{MUSE:} asset risk scoring in enterprise network with mutually reinforced reputation propagation}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2014}, pages = {17}, year = {2014}, url = {https://doi.org/10.1186/s13635-014-0017-1}, doi = {10.1186/S13635-014-0017-1}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/HuWSSJS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/IsacenkovaTCFB14, author = {Jelena Isacenkova and Olivier Thonnard and Andrei Costin and Aur{\'{e}}lien Francillon and Davide Balzarotti}, title = {Inside the {SCAM} Jungle: {A} Closer Look at 419 Scam Email Operations}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2014}, pages = {4}, year = {2014}, url = {https://doi.org/10.1186/1687-417X-2014-4}, doi = {10.1186/1687-417X-2014-4}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejisec/IsacenkovaTCFB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/IslamMG14, author = {Saiful Islam and Mangat Rai Modi and Phalguni Gupta}, title = {Edge-based image steganography}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2014}, pages = {8}, year = {2014}, url = {https://doi.org/10.1186/1687-417X-2014-8}, doi = {10.1186/1687-417X-2014-8}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/IslamMG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/JenischU14, author = {Stefan Jenisch and Andreas Uhl}, title = {A detailed evaluation of format-compliant encryption methods for {JPEG} XR-compressed images}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2014}, pages = {6}, year = {2014}, url = {https://doi.org/10.1186/1687-417X-2014-6}, doi = {10.1186/1687-417X-2014-6}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/JenischU14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/JoverLR14, author = {Roger Piqueras Jover and Joshua Lackey and Arvind Raghavan}, title = {Enhancing the security of {LTE} networks against jamming attacks}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2014}, pages = {7}, year = {2014}, url = {https://doi.org/10.1186/1687-417X-2014-7}, doi = {10.1186/1687-417X-2014-7}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/JoverLR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/KarapistoliE14, author = {Eirini D. Karapistoli and Anastasios A. Economides}, title = {{ADLU:} a novel anomaly detection and location-attribution algorithm for {UWB} wireless sensor networks}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2014}, pages = {3}, year = {2014}, url = {https://doi.org/10.1186/1687-417X-2014-3}, doi = {10.1186/1687-417X-2014-3}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/KarapistoliE14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/NarangHV14, author = {Pratik Narang and Chittaranjan Hota and V. N. Venkatakrishnan}, title = {PeerShark: flow-clustering and conversation-generation for malicious peer-to-peer traffic identification}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2014}, pages = {15}, year = {2014}, url = {https://doi.org/10.1186/s13635-014-0015-3}, doi = {10.1186/S13635-014-0015-3}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/NarangHV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/RichthammerNRSP14, author = {Christian Richthammer and Michael Netter and Moritz Riesner and Johannes S{\"{a}}nger and G{\"{u}}nther Pernul}, title = {Taxonomy of social network data types}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2014}, pages = {11}, year = {2014}, url = {https://doi.org/10.1186/s13635-014-0011-7}, doi = {10.1186/S13635-014-0011-7}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/RichthammerNRSP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/ShulmanW14, author = {Haya Schulmann and Michael Waidner}, title = {{DNSSEC} for cyber forensics}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2014}, pages = {16}, year = {2014}, url = {https://doi.org/10.1186/s13635-014-0016-2}, doi = {10.1186/S13635-014-0016-2}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/ShulmanW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/AbdulCG13, author = {Wadood Abdul and Philippe Carr{\'{e}} and Philippe Gaborit}, title = {Error correcting codes for robust color wavelet watermarking}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2013}, pages = {1}, year = {2013}, url = {https://doi.org/10.1186/1687-417X-2013-1}, doi = {10.1186/1687-417X-2013-1}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/AbdulCG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/AmeriniBCC13, author = {Irene Amerini and Mauro Barni and Roberto Caldelli and Andrea Costanzo}, title = {Removal and injection of keypoints for SIFT-based copy-move counter-forensics}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2013}, pages = {8}, year = {2013}, url = {https://doi.org/10.1186/1687-417X-2013-8}, doi = {10.1186/1687-417X-2013-8}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/AmeriniBCC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/ErkinVTL13, author = {Zekeriya Erkin and Thijs Veugen and Tomas Toft and Reginald L. Lagendijk}, title = {Privacy-preserving distributed clustering}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2013}, pages = {4}, year = {2013}, url = {https://doi.org/10.1186/1687-417X-2013-4}, doi = {10.1186/1687-417X-2013-4}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/ErkinVTL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/ForoushaniZ13, author = {Vahid Aghaei Foroushani and Nur Zincir{-}Heywood}, title = {{IP} traceback through (authenticated) deterministic flow marking: an empirical evaluation}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2013}, pages = {5}, year = {2013}, url = {https://doi.org/10.1186/1687-417X-2013-5}, doi = {10.1186/1687-417X-2013-5}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejisec/ForoushaniZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/GargKC13, author = {Vaibhav Garg and Thomas Koster and Linda Jean Camp}, title = {Cross-country analysis of spambots}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2013}, pages = {3}, year = {2013}, url = {https://doi.org/10.1186/1687-417X-2013-3}, doi = {10.1186/1687-417X-2013-3}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/GargKC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/MillikenSM13, author = {Jonny Milliken and Valerio Selis and Alan Marshall}, title = {Detection and analysis of the Chameleon WiFi access point virus}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2013}, pages = {2}, year = {2013}, url = {https://doi.org/10.1186/1687-417X-2013-2}, doi = {10.1186/1687-417X-2013-2}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/MillikenSM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/OhanaS13, author = {Donny Jacob Ohana and Narasimha K. Shashidhar}, title = {Do private and portable web browsers leave incriminating evidence?: a forensic analysis of residual artifacts from private and portable web browsing sessions}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2013}, pages = {6}, year = {2013}, url = {https://doi.org/10.1186/1687-417X-2013-6}, doi = {10.1186/1687-417X-2013-6}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejisec/OhanaS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/RaftopoulosD13, author = {Elias Raftopoulos and Xenofontas A. Dimitropoulos}, title = {A quality metric for {IDS} signatures: in the wild the size matters}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2013}, pages = {7}, year = {2013}, url = {https://doi.org/10.1186/1687-417X-2013-7}, doi = {10.1186/1687-417X-2013-7}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/RaftopoulosD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/EngelSU12, author = {Dominik Engel and Thomas St{\"{u}}tz and Andreas Uhl}, title = {Assessing {JPEG2000} encryption with key-dependent wavelet packets}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2012}, pages = {2}, year = {2012}, url = {https://doi.org/10.1186/1687-417X-2012-2}, doi = {10.1186/1687-417X-2012-2}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/EngelSU12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/RamanathanW12, author = {Venkatesh Ramanathan and Harry Wechsler}, title = {phishGILLNET-phishing detection using probabilistic latent semantic analysis}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2012}, pages = {1}, year = {2012}, url = {https://doi.org/10.1186/1687-417X-2012-1}, doi = {10.1186/1687-417X-2012-1}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/RamanathanW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/Bakhoum11, author = {Ezzat G. Bakhoum}, title = {Intrusion detection model based on selective packet sampling}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2011}, pages = {2}, year = {2011}, url = {https://doi.org/10.1186/1687-417X-2011-2}, doi = {10.1186/1687-417X-2011-2}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/Bakhoum11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/ChenV11, author = {Chun Chen and Raymond N. J. Veldhuis}, title = {Binary Biometric Representation through Pairwise Adaptive Phase Quantization}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2011}, year = {2011}, url = {https://doi.org/10.1155/2011/543106}, doi = {10.1155/2011/543106}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/ChenV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/JemaaDJ11, author = {Yousra Ben Jemaa and Ahmed Derbel and Ahmed Ben Jmaa}, title = {2DPCA fractal features and genetic algorithm for efficient face representation and recognition}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2011}, pages = {1}, year = {2011}, url = {https://doi.org/10.1186/1687-417X-2011-1}, doi = {10.1186/1687-417X-2011-1}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/JemaaDJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/Kuribayashi11, author = {Minoru Kuribayashi}, title = {Hierarchical Spread Spectrum Fingerprinting Scheme Based on the {CDMA} Technique}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2011}, year = {2011}, url = {https://doi.org/10.1155/2011/502782}, doi = {10.1155/2011/502782}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/Kuribayashi11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/MalekzadehGS11, author = {Mina Malekzadeh and Abdul Azim Abdul Ghani and Shamala Subramaniam}, title = {Protected control packets to prevent denial of services attacks in {IEEE} 802.11 wireless networks}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2011}, pages = {4}, year = {2011}, url = {https://doi.org/10.1186/1687-417X-2011-4}, doi = {10.1186/1687-417X-2011-4}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/MalekzadehGS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/MaoZNYZ11, author = {Jiafa Mao and Ru Zhang and Xinxin Niu and Yixian Yang and Linna Zhou}, title = {Research of Spatial Domain Image Digital Watermarking Payload}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2011}, year = {2011}, url = {https://doi.org/10.1155/2011/502748}, doi = {10.1155/2011/502748}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/MaoZNYZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/NtalianisTD11, author = {Klimis S. Ntalianis and Nicolas Tsapatsoulis and Athanasios Drigas}, title = {Video-Object Oriented Biometrics Hiding for User Authentication under Error-Prone Transmissions}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2011}, year = {2011}, url = {https://doi.org/10.1155/2011/174945}, doi = {10.1155/2011/174945}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/NtalianisTD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/RathgebU11, author = {Christian Rathgeb and Andreas Uhl}, title = {A survey on biometric cryptosystems and cancelable biometrics}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2011}, pages = {3}, year = {2011}, url = {https://doi.org/10.1186/1687-417X-2011-3}, doi = {10.1186/1687-417X-2011-3}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/RathgebU11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/BalakirskyV10, author = {Vladimir B. Balakirsky and A. J. Han Vinck}, title = {A Simple Scheme for Constructing Fault-Tolerant Passwords from Biometric Data}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2010}, year = {2010}, url = {https://doi.org/10.1155/2010/819376}, doi = {10.1155/2010/819376}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/BalakirskyV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/CaldelliFB10, author = {Roberto Caldelli and Francesco Filippini and Rudy Becarelli}, title = {Reversible Watermarking Techniques: An Overview and a Classification}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2010}, year = {2010}, url = {https://doi.org/10.1155/2010/134546}, doi = {10.1155/2010/134546}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/CaldelliFB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/GafurovBYB10, author = {Davrondzhon Gafurov and Patrick Bours and Bian Yang and Christoph Busch}, title = {{GUC100} Multisensor Fingerprint Database for In-House (Semipublic) Performance Test}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2010}, year = {2010}, url = {https://doi.org/10.1155/2010/391761}, doi = {10.1155/2010/391761}, timestamp = {Wed, 06 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejisec/GafurovBYB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/Kuribayashi10, author = {Minoru Kuribayashi}, title = {On the Implementation of Spread Spectrum Fingerprinting in Asymmetric Cryptographic Protocol}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2010}, year = {2010}, url = {https://doi.org/10.1155/2010/694797}, doi = {10.1155/2010/694797}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/Kuribayashi10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/SinaieV10, author = {Mahnaz Sinaie and Vahid Tabataba Vakili}, title = {Secure Arithmetic Coding with Error Detection Capability}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2010}, year = {2010}, url = {https://doi.org/10.1155/2010/621521}, doi = {10.1155/2010/621521}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejisec/SinaieV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/Suthaharan10, author = {Shan Suthaharan}, title = {Logistic Map-Based Fragile Watermarking for Pixel Level Tamper Detection and Resistance}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2010}, year = {2010}, url = {https://doi.org/10.1155/2010/829516}, doi = {10.1155/2010/829516}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejisec/Suthaharan10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/AlrodhanM09, author = {Waleed A. Alrodhan and Chris J. Mitchell}, title = {Improving the Security of CardSpace}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2009}, year = {2009}, url = {https://doi.org/10.1155/2009/167216}, doi = {10.1155/2009/167216}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/AlrodhanM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/BianchiPB09, author = {Tiziano Bianchi and Alessandro Piva and Mauro Barni}, title = {Encrypted Domain {DCT} Based on Homomorphic Cryptosystems}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2009}, year = {2009}, url = {https://doi.org/10.1155/2009/716357}, doi = {10.1155/2009/716357}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/BianchiPB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/CarrilloKM09, author = {Paula Carrillo and Hari Kalva and Spyros S. Magliveras}, title = {Compression Independent Reversible Encryption for Privacy in Video Surveillance}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2009}, year = {2009}, url = {https://doi.org/10.1155/2009/429581}, doi = {10.1155/2009/429581}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/CarrilloKM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/ChaoWLC09, author = {Ruey{-}Ming Chao and Hsien{-}Chung Wu and Chih{-}Chiang Lee and Yen{-}Ping Chu}, title = {A Novel Image Data Hiding Scheme with Diamond Encoding}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2009}, year = {2009}, url = {https://doi.org/10.1155/2009/658047}, doi = {10.1155/2009/658047}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/ChaoWLC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/CheungKS09, author = {Sen{-}ching Samson Cheung and Deepa Kundur and Andrew W. Senior}, title = {Enhancing Privacy Protection in Multimedia Systems}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2009}, year = {2009}, url = {https://doi.org/10.1155/2009/710919}, doi = {10.1155/2009/710919}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/CheungKS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/FontaineG09, author = {Caroline Fontaine and Fabien Galand}, title = {How Reed-Solomon Codes Can Improve Steganographic Schemes}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2009}, year = {2009}, url = {https://doi.org/10.1155/2009/274845}, doi = {10.1155/2009/274845}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/FontaineG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/GoljanW09, author = {Miroslav Goljan and Andreas Westfeld}, title = {Secure Steganography in Multimedia Content}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2009}, year = {2009}, url = {https://doi.org/10.1155/2009/257131}, doi = {10.1155/2009/257131}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/GoljanW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/ItoK09, author = {Izumi Ito and Hitoshi Kiya}, title = {One-Time Key Based Phase Scrambling for Phase-Only Correlation between Visually Protected Images}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2009}, year = {2009}, url = {https://doi.org/10.1155/2009/841045}, doi = {10.1155/2009/841045}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/ItoK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/LiIYNB09, author = {Guangzhen Li and Yoshimichi Ito and Xiaoyi Yu and Naoko Nitta and Noboru Babaguchi}, title = {Recoverable Privacy Protection for Video Content Distribution}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2009}, year = {2009}, url = {https://doi.org/10.1155/2009/293031}, doi = {10.1155/2009/293031}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/LiIYNB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/LvW09, author = {Xudong Lv and Z. Jane Wang}, title = {An Extended Image Hashing Concept: Content-Based Fingerprinting Using {FJLT}}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2009}, year = {2009}, url = {https://doi.org/10.1155/2009/859859}, doi = {10.1155/2009/859859}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/LvW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/MicheBLJS09, author = {Yoan Miche and Patrick Bas and Amaury Lendasse and Christian Jutten and Olli Simula}, title = {Reliable Steganalysis Using a Minimum Set of Samples and Features}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2009}, year = {2009}, url = {https://doi.org/10.1155/2009/901381}, doi = {10.1155/2009/901381}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/MicheBLJS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/ParuchuriCH09, author = {Jithendra K. Paruchuri and Sen{-}Ching S. Cheung and Michael W. Hail}, title = {Video Data Hiding for Managing Privacy Information in Surveillance Systems}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2009}, year = {2009}, url = {https://doi.org/10.1155/2009/236139}, doi = {10.1155/2009/236139}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/ParuchuriCH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/RossiGC09, author = {Lorenzo Rossi and Fabio Garzia and Roberto Cusani}, title = {Peak-Shaped-Based Steganographic Technique for {JPEG} Images}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2009}, year = {2009}, url = {https://doi.org/10.1155/2009/382310}, doi = {10.1155/2009/382310}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/RossiGC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/ScagliolaPG09, author = {Michele Scagliola and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Pietro Guccione}, title = {High-Rate Data-Hiding Robust to Linear Filtering for Colored Hosts}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2009}, year = {2009}, url = {https://doi.org/10.1155/2009/914937}, doi = {10.1155/2009/914937}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/ScagliolaPG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/WuD09, author = {Hao{-}Tian Wu and Jean{-}Luc Dugelay}, title = {Steganography in 3D Geometries and Images by Adjacent Bin Mapping}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2009}, year = {2009}, url = {https://doi.org/10.1155/2009/317165}, doi = {10.1155/2009/317165}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/WuD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/YeLZC09, author = {Shuiming Ye and Ying Luo and Jian Zhao and Sen{-}Ching S. Cheung}, title = {Anonymous Biometric Access Control}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2009}, year = {2009}, url = {https://doi.org/10.1155/2009/865259}, doi = {10.1155/2009/865259}, timestamp = {Thu, 31 Mar 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/YeLZC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/CerouFG08, author = {Fr{\'{e}}d{\'{e}}ric C{\'{e}}rou and Teddy Furon and Arnaud Guyader}, title = {Experimental Assessment of the Reliability for Watermarking and Fingerprinting Schemes}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2008}, year = {2008}, url = {https://doi.org/10.1155/2008/414962}, doi = {10.1155/2008/414962}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/CerouFG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/DAngeloBM08, author = {Angela D'Angelo and Mauro Barni and Neri Merhav}, title = {Stochastic Image Warping for Improved Watermark Desynchronization}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2008}, year = {2008}, url = {https://doi.org/10.1155/2008/345184}, doi = {10.1155/2008/345184}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/DAngeloBM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/EltahirSIL08, author = {Wasil Elsadig Eltahir and Momoh{-}Jimoh E. Salami and Ahmad Faris Ismail and Weng Kin Lai}, title = {Design and Evaluation of a Pressure-Based Typing Biometric Authentication System}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2008}, year = {2008}, url = {https://doi.org/10.1155/2008/345047}, doi = {10.1155/2008/345047}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/EltahirSIL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/FuronB08, author = {Teddy Furon and Patrick Bas}, title = {Broken Arrows}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2008}, year = {2008}, url = {https://doi.org/10.1155/2008/597040}, doi = {10.1155/2008/597040}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/FuronB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/HurleyBS08, author = {Neil J. Hurley and F{\'{e}}lix Balado and Guenole C. M. Silvestre}, title = {Markov Modelling of Fingerprinting Systems for Collision Analysis}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2008}, year = {2008}, url = {https://doi.org/10.1155/2008/195238}, doi = {10.1155/2008/195238}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/HurleyBS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/LaimerU08, author = {Gerold Laimer and Andreas Uhl}, title = {Key-Dependent JPEG2000-Based Robust Hashing for Secure Image Authentication}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2008}, year = {2008}, url = {https://doi.org/10.1155/2008/895174}, doi = {10.1155/2008/895174}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/LaimerU08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/MassoudiLVMQ08, author = {Ayoub Massoudi and Fr{\'{e}}d{\'{e}}ric Lef{\`{e}}bvre and Christophe De Vleeschouwer and Beno{\^{\i}}t Macq and Jean{-}Jacques Quisquater}, title = {Overview on Selective Encryption of Image and Video: Challenges and Perspectives}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2008}, year = {2008}, url = {https://doi.org/10.1155/2008/179290}, doi = {10.1155/2008/179290}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/MassoudiLVMQ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/Schaathun08, author = {Hans Georg Schaathun}, title = {Novel Attacks on Spread-Spectrum Fingerprinting}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2008}, year = {2008}, url = {https://doi.org/10.1155/2008/803217}, doi = {10.1155/2008/803217}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/Schaathun08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/ZebbicheKB08, author = {Khalil Zebbiche and Fouad Khelifi and Ahmed Bouridane}, title = {An Efficient Watermarking Technique for the Protection of Fingerprint Images}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2008}, year = {2008}, url = {https://doi.org/10.1155/2008/918601}, doi = {10.1155/2008/918601}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/ZebbicheKB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/BorzinoAS07, author = {Angelo M. C. R. Borzino and J. A. Apolin{\'{a}}rio Jr. and Dirceu G. da Silva}, title = {An Efficient Objective Intelligibility Measure for Frequency Domain Scramblers}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2007}, year = {2007}, url = {https://doi.org/10.1155/2007/32028}, doi = {10.1155/2007/32028}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/BorzinoAS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/CheungN07, author = {Sen{-}Ching S. Cheung and Thinh P. Nguyen}, title = {Secure Multiparty Computation between Distrusted Networks Terminals}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2007}, year = {2007}, url = {https://doi.org/10.1155/2007/51368}, doi = {10.1155/2007/51368}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/CheungN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/ComesanaP07, author = {Pedro Comesa{\~{n}}a and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez}, title = {Breaking the {BOWS} Watermarking System: Key Guessing and Sensitivity Attacks}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2007}, year = {2007}, url = {https://doi.org/10.1155/2007/25308}, doi = {10.1155/2007/25308}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/ComesanaP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/CraverAY07, author = {Scott Craver and Idris M. Atakli and Jun Yu}, title = {Reverse-Engineering a Watermark Detector Using an Oracle}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2007}, year = {2007}, url = {https://doi.org/10.1155/2007/43034}, doi = {10.1155/2007/43034}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/CraverAY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/EngelSU07, author = {Dominik Engel and Thomas St{\"{u}}tz and Andreas Uhl}, title = {Format-Compliant {JPEG2000} Encryption in {JPSEC:} Security, Applicability, and the Impact of Compression Parameters}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2007}, year = {2007}, url = {https://doi.org/10.1155/2007/94565}, doi = {10.1155/2007/94565}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/EngelSU07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/ErkinPKLSNB07, author = {Zekeriya Erkin and Alessandro Piva and Stefan Katzenbeisser and Reginald L. Lagendijk and Jamshid Shokrollahi and Gregory Neven and Mauro Barni}, title = {Protection and Retrieval of Encrypted Multimedia Content: When Cryptography Meets Signal Processing}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2007}, year = {2007}, url = {https://doi.org/10.1155/2007/78943}, doi = {10.1155/2007/78943}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/ErkinPKLSNB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/FontaineG07, author = {Caroline Fontaine and Fabien Galand}, title = {A Survey of Homomorphic Encryption for Nonspecialists}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2007}, year = {2007}, url = {https://doi.org/10.1155/2007/13801}, doi = {10.1155/2007/13801}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/FontaineG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/GschwandtnerUW07, author = {Michael Gschwandtner and Andreas Uhl and Peter Wild}, title = {Transmission Error and Compression Robustness of 2D Chaotic Map Image Encryption Schemes}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2007}, year = {2007}, url = {https://doi.org/10.1155/2007/48179}, doi = {10.1155/2007/48179}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/GschwandtnerUW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/HaleemSC07, author = {Mohamed A. Haleem and K. P. Subbalakshmi and Rajarathnam Chandramouli}, title = {Joint Encryption and Compression of Correlated Sources with Side Information}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2007}, year = {2007}, url = {https://doi.org/10.1155/2007/98374}, doi = {10.1155/2007/98374}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/HaleemSC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/LiuS07, author = {Yi{-}Wen Liu and Julius O. Smith III}, title = {Audio Watermarking through Deterministic plus Stochastic Signal Decomposition}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2007}, year = {2007}, url = {https://doi.org/10.1155/2007/75961}, doi = {10.1155/2007/75961}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/LiuS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/MagliGO07, author = {Enrico Magli and Marco Grangetto and Gabriella Olmo}, title = {Joint Source, Channel Coding, and Secrecy}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2007}, year = {2007}, url = {https://doi.org/10.1155/2007/79048}, doi = {10.1155/2007/79048}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejisec/MagliGO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/MagliS07, author = {Enrico Magli and Qibin Sun}, title = {The Interplay between Compression and Security for Image and Video Communication and Adaptation over Networks}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2007}, year = {2007}, url = {https://doi.org/10.1155/2007/19824}, doi = {10.1155/2007/19824}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/MagliS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/OrlandiPB07, author = {Claudio Orlandi and Alessandro Piva and Mauro Barni}, title = {Oblivious Neural Network Computing via Homomorphic Encryption}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2007}, year = {2007}, url = {https://doi.org/10.1155/2007/37343}, doi = {10.1155/2007/37343}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/OrlandiPB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/PivaB07, author = {Alessandro Piva and Mauro Barni}, title = {Design and Analysis of the First {BOWS} Contest}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2007}, year = {2007}, url = {https://doi.org/10.1155/2007/98684}, doi = {10.1155/2007/98684}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/PivaB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/PivaK07, author = {Alessandro Piva and Stefan Katzenbeisser}, title = {Signal Processing in the Encrypted Domain}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2007}, year = {2007}, url = {https://doi.org/10.1155/2007/82790}, doi = {10.1155/2007/82790}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/PivaK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/PrinsEL07, author = {Jeroen P. Prins and Zekeriya Erkin and Reginald L. Lagendijk}, title = {Anonymous Fingerprinting with Robust {QIM} Watermarking Techniques}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2007}, year = {2007}, url = {https://doi.org/10.1155/2007/31340}, doi = {10.1155/2007/31340}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/PrinsEL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/SocekMCMKF07, author = {Daniel Socek and Spyros S. Magliveras and Dubravko Culibrk and Oge Marques and Hari Kalva and Borko Furht}, title = {Digital Video Encryption Algorithms Based on Correlation-Preserving Permutations}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2007}, year = {2007}, url = {https://doi.org/10.1155/2007/52965}, doi = {10.1155/2007/52965}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/SocekMCMKF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/Troncoso-PastorizaP07, author = {Juan Ram{\'{o}}n Troncoso{-}Pastoriza and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez}, title = {Efficient Zero-Knowledge Watermark Detection with Improved Robustness to Sensitivity Attacks}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2007}, year = {2007}, url = {https://doi.org/10.1155/2007/45731}, doi = {10.1155/2007/45731}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/Troncoso-PastorizaP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/Westfeld07, author = {Andreas Westfeld}, title = {A Workbench for the {BOWS} Contest}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2007}, year = {2007}, url = {https://doi.org/10.1155/2007/64521}, doi = {10.1155/2007/64521}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/Westfeld07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/XieK07, author = {Dahua Xie and C.{-}C. Jay Kuo}, title = {Multimedia Encryption with Joint Randomized Entropy Coding and Rotation in Partitioned Bitstream}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2007}, year = {2007}, url = {https://doi.org/10.1155/2007/35262}, doi = {10.1155/2007/35262}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/XieK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/YangZLY07, author = {Yang Yang and Bin B. Zhu and Shipeng Li and Neng H. Yu}, title = {Efficient and Syntax-Compliant {JPEG} 2000 Encryption Preserving Original Fine Granularity of Scalability}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2007}, year = {2007}, url = {https://doi.org/10.1155/2007/56365}, doi = {10.1155/2007/56365}, timestamp = {Fri, 20 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejisec/YangZLY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.