Search dblp for Publications

export results for "toc:db/journals/ijics/ijics14.bht:"

 download as .bib file

@article{DBLP:journals/ijics/Abu-AmaraB21,
  author       = {Fadi Abu{-}Amara and
                  Ameur Bensefia},
  title        = {A handwriting document encryption scheme based on segmentation and
                  chaotic logarithmic map},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {14},
  number       = {3/4},
  pages        = {327--343},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.114709},
  doi          = {10.1504/IJICS.2021.114709},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Abu-AmaraB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/AlimehajHDNR21,
  author       = {Vlera Alimehaj and
                  Arbnor Halili and
                  Ramadan Dervishi and
                  Vehbi Neziri and
                  Blerim Rexha},
  title        = {Analysing and comparing the digital seal according to eIDAS regulation
                  with and without blockchain technology},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {14},
  number       = {2},
  pages        = {171--191},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.113174},
  doi          = {10.1504/IJICS.2021.113174},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/AlimehajHDNR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/AmbikaB21,
  author       = {B. J. Ambika and
                  M. K. Banga},
  title        = {A novel energy efficient routing algorithm for {MPLS-MANET} using
                  fuzzy logic controller},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {14},
  number       = {1},
  pages        = {20--39},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.112206},
  doi          = {10.1504/IJICS.2021.112206},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/AmbikaB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/AmraniRA21,
  author       = {Ayoub Amrani and
                  Najat Rafalia and
                  Jaafar Abouchabaka},
  title        = {Mobile agent security using Amrani et al.'s protocol and binary serialisation},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {14},
  number       = {2},
  pages        = {192--209},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.113175},
  doi          = {10.1504/IJICS.2021.113175},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/AmraniRA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/AnilI21,
  author       = {G. L. Anil and
                  J. L. Mazher Iqbal},
  title        = {Secure energy efficient network priority routing protocol for effective
                  data collection and key management in dynamic WSNs},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {14},
  number       = {1},
  pages        = {60--78},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.112208},
  doi          = {10.1504/IJICS.2021.112208},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/AnilI21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/AnnaluriAP21,
  author       = {Sreenivasa Rao Annaluri and
                  Venkata Ramana Attili and
                  Kalli Srinivasa Nageswara Prasad},
  title        = {Secure and unifold mining model for pattern discovery from streaming
                  data},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {14},
  number       = {2},
  pages        = {136--145},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.113170},
  doi          = {10.1504/IJICS.2021.113170},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/AnnaluriAP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/CaoCDW21,
  author       = {Nanyuan Cao and
                  Zhenfu Cao and
                  Xiaolei Dong and
                  Haijiang Wang},
  title        = {Improved {RSA} lossy trapdoor function and applications},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {14},
  number       = {3/4},
  pages        = {229--241},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.114703},
  doi          = {10.1504/IJICS.2021.114703},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/CaoCDW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/FanTL21,
  author       = {Zhijie Fan and
                  Chengxiang Tan and
                  Xin Li},
  title        = {A hierarchical method for assessing cyber security situation based
                  on ontology and fuzzy cognitive maps},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {14},
  number       = {3/4},
  pages        = {242--262},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.114704},
  doi          = {10.1504/IJICS.2021.114704},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/FanTL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/GavadeCR21,
  author       = {Jayashree D. Gavade and
                  S. R. Chougule and
                  Vishwaja Rathod},
  title        = {A robust passive blind copy-move image forgery detection},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {14},
  number       = {3/4},
  pages        = {300--317},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.114707},
  doi          = {10.1504/IJICS.2021.114707},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/GavadeCR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/JayasimhaR21,
  author       = {Yenumaladoddi Jayasimha and
                  R. Venkata Siva Reddy},
  title        = {A facial expression recognition model using hybrid feature selection
                  and support vector machines},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {14},
  number       = {1},
  pages        = {79--97},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.112209},
  doi          = {10.1504/IJICS.2021.112209},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/JayasimhaR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/KV21,
  author       = {Unnikrishnan K and
                  Pramod K. V},
  title        = {Prediction-based robust blind reversible watermarking for relational
                  databases},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {14},
  number       = {3/4},
  pages        = {211--228},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.114702},
  doi          = {10.1504/IJICS.2021.114702},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/KV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/LathaRD21,
  author       = {S. Bhargavi Latha and
                  D. Venkata Reddy and
                  A. Damodaram},
  title        = {Video watermarking using neural networks},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {14},
  number       = {1},
  pages        = {40--59},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.112207},
  doi          = {10.1504/IJICS.2021.112207},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/LathaRD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/MoonR21,
  author       = {Sunil K. Moon and
                  Rajshree D. Raut},
  title        = {Anti-forensic reversible multi frame block to block pixel mapping
                  information concealing approach to increase the robustness and perceptibility},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {14},
  number       = {3/4},
  pages        = {403--439},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.114713},
  doi          = {10.1504/IJICS.2021.114713},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/MoonR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/MumtazL21,
  author       = {Majid Mumtaz and
                  Ping Luo},
  title        = {An improved cryptanalysis of large {RSA} decryption exponent with
                  constrained secret key},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {14},
  number       = {2},
  pages        = {102--117},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.113168},
  doi          = {10.1504/IJICS.2021.113168},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/MumtazL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/PonguwalaR21,
  author       = {Maitreyi Ponguwala and
                  Meda Sreenivasa Rao},
  title        = {Secured spray and focus protocol design in intermittently connected
                  mobile networks},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {14},
  number       = {3/4},
  pages        = {344--353},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.114710},
  doi          = {10.1504/IJICS.2021.114710},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/PonguwalaR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/RaghavenderP21,
  author       = {K. V. Raghavender and
                  P. Premchand},
  title        = {Accurate and reliable detection of DDoS attacks based on {ARIMA-SWGARCH}
                  model},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {14},
  number       = {2},
  pages        = {118--135},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.113169},
  doi          = {10.1504/IJICS.2021.113169},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/RaghavenderP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/RathP21,
  author       = {Mamata Rath and
                  Binod Kumar Pattanayak},
  title        = {Performance evaluation of optimised protocol in {MANET}},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {14},
  number       = {3/4},
  pages        = {318--326},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.114708},
  doi          = {10.1504/IJICS.2021.114708},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/RathP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/SaradiK21,
  author       = {V. Partha Saradi and
                  P. Kailasapathi},
  title        = {A novel binary encryption algorithm for navigation control of robotic
                  vehicles through visible light communication},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {14},
  number       = {2},
  pages        = {160--170},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.113172},
  doi          = {10.1504/IJICS.2021.113172},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/SaradiK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/SarafSI21,
  author       = {Iqra Saraf and
                  Avinash K. Shrivastava and
                  Javaid Iqbal},
  title        = {Effort-based fault detection and correction modelling for multi release
                  of software},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {14},
  number       = {3/4},
  pages        = {354--379},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.114711},
  doi          = {10.1504/IJICS.2021.114711},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijics/SarafSI21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/SathishK21,
  author       = {Kuppani Sathish and
                  Kamakshaiah Kolli},
  title        = {Sustainable wireless clouds with security assurance},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {14},
  number       = {2},
  pages        = {146--159},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.113171},
  doi          = {10.1504/IJICS.2021.113171},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/SathishK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/ShailajaN21,
  author       = {A. Shailaja and
                  Krishnamurthy Gorappa Ningappa},
  title        = {A low area {VLSI} implementation of extended tiny encryption algorithm
                  using Lorenz chaotic system},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {14},
  number       = {1},
  pages        = {3--19},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.112205},
  doi          = {10.1504/IJICS.2021.112205},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/ShailajaN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/SinghSBS21,
  author       = {Amardeep Singh and
                  Monika Singh and
                  Divya Bansal and
                  Sanjeev Sofat},
  title        = {Optimised K-anonymisation technique to deal with mutual friends and
                  degree attacks},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {14},
  number       = {3/4},
  pages        = {281--299},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.114706},
  doi          = {10.1504/IJICS.2021.114706},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/SinghSBS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/SinghTV21,
  author       = {Ajeet Singh and
                  Appala Naidu Tentu and
                  V. Ch. Venkaiah},
  title        = {A dynamic key management paradigm for secure wireless ad hoc network
                  communications},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {14},
  number       = {3/4},
  pages        = {380--402},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.114712},
  doi          = {10.1504/IJICS.2021.114712},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/SinghTV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/WaqasAMY21,
  author       = {Umer Waqas and
                  Shazia Afzal and
                  Mubeen Akhtar Mir and
                  Muhammad Yousaf},
  title        = {Cryptographic strength evaluation of {AES} s-box variants},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {14},
  number       = {3/4},
  pages        = {263--280},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.114705},
  doi          = {10.1504/IJICS.2021.114705},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/WaqasAMY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics