![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp for Publications
export results for "toc:db/journals/ijics/ijics14.bht:"
@article{DBLP:journals/ijics/Abu-AmaraB21, author = {Fadi Abu{-}Amara and Ameur Bensefia}, title = {A handwriting document encryption scheme based on segmentation and chaotic logarithmic map}, journal = {Int. J. Inf. Comput. Secur.}, volume = {14}, number = {3/4}, pages = {327--343}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.114709}, doi = {10.1504/IJICS.2021.114709}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Abu-AmaraB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/AlimehajHDNR21, author = {Vlera Alimehaj and Arbnor Halili and Ramadan Dervishi and Vehbi Neziri and Blerim Rexha}, title = {Analysing and comparing the digital seal according to eIDAS regulation with and without blockchain technology}, journal = {Int. J. Inf. Comput. Secur.}, volume = {14}, number = {2}, pages = {171--191}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.113174}, doi = {10.1504/IJICS.2021.113174}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/AlimehajHDNR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/AmbikaB21, author = {B. J. Ambika and M. K. Banga}, title = {A novel energy efficient routing algorithm for {MPLS-MANET} using fuzzy logic controller}, journal = {Int. J. Inf. Comput. Secur.}, volume = {14}, number = {1}, pages = {20--39}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.112206}, doi = {10.1504/IJICS.2021.112206}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/AmbikaB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/AmraniRA21, author = {Ayoub Amrani and Najat Rafalia and Jaafar Abouchabaka}, title = {Mobile agent security using Amrani et al.'s protocol and binary serialisation}, journal = {Int. J. Inf. Comput. Secur.}, volume = {14}, number = {2}, pages = {192--209}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.113175}, doi = {10.1504/IJICS.2021.113175}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/AmraniRA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/AnilI21, author = {G. L. Anil and J. L. Mazher Iqbal}, title = {Secure energy efficient network priority routing protocol for effective data collection and key management in dynamic WSNs}, journal = {Int. J. Inf. Comput. Secur.}, volume = {14}, number = {1}, pages = {60--78}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.112208}, doi = {10.1504/IJICS.2021.112208}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/AnilI21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/AnnaluriAP21, author = {Sreenivasa Rao Annaluri and Venkata Ramana Attili and Kalli Srinivasa Nageswara Prasad}, title = {Secure and unifold mining model for pattern discovery from streaming data}, journal = {Int. J. Inf. Comput. Secur.}, volume = {14}, number = {2}, pages = {136--145}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.113170}, doi = {10.1504/IJICS.2021.113170}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/AnnaluriAP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/CaoCDW21, author = {Nanyuan Cao and Zhenfu Cao and Xiaolei Dong and Haijiang Wang}, title = {Improved {RSA} lossy trapdoor function and applications}, journal = {Int. J. Inf. Comput. Secur.}, volume = {14}, number = {3/4}, pages = {229--241}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.114703}, doi = {10.1504/IJICS.2021.114703}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/CaoCDW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/FanTL21, author = {Zhijie Fan and Chengxiang Tan and Xin Li}, title = {A hierarchical method for assessing cyber security situation based on ontology and fuzzy cognitive maps}, journal = {Int. J. Inf. Comput. Secur.}, volume = {14}, number = {3/4}, pages = {242--262}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.114704}, doi = {10.1504/IJICS.2021.114704}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/FanTL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/GavadeCR21, author = {Jayashree D. Gavade and S. R. Chougule and Vishwaja Rathod}, title = {A robust passive blind copy-move image forgery detection}, journal = {Int. J. Inf. Comput. Secur.}, volume = {14}, number = {3/4}, pages = {300--317}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.114707}, doi = {10.1504/IJICS.2021.114707}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/GavadeCR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/JayasimhaR21, author = {Yenumaladoddi Jayasimha and R. Venkata Siva Reddy}, title = {A facial expression recognition model using hybrid feature selection and support vector machines}, journal = {Int. J. Inf. Comput. Secur.}, volume = {14}, number = {1}, pages = {79--97}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.112209}, doi = {10.1504/IJICS.2021.112209}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/JayasimhaR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/KV21, author = {Unnikrishnan K and Pramod K. V}, title = {Prediction-based robust blind reversible watermarking for relational databases}, journal = {Int. J. Inf. Comput. Secur.}, volume = {14}, number = {3/4}, pages = {211--228}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.114702}, doi = {10.1504/IJICS.2021.114702}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/KV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/LathaRD21, author = {S. Bhargavi Latha and D. Venkata Reddy and A. Damodaram}, title = {Video watermarking using neural networks}, journal = {Int. J. Inf. Comput. Secur.}, volume = {14}, number = {1}, pages = {40--59}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.112207}, doi = {10.1504/IJICS.2021.112207}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/LathaRD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/MoonR21, author = {Sunil K. Moon and Rajshree D. Raut}, title = {Anti-forensic reversible multi frame block to block pixel mapping information concealing approach to increase the robustness and perceptibility}, journal = {Int. J. Inf. Comput. Secur.}, volume = {14}, number = {3/4}, pages = {403--439}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.114713}, doi = {10.1504/IJICS.2021.114713}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/MoonR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/MumtazL21, author = {Majid Mumtaz and Ping Luo}, title = {An improved cryptanalysis of large {RSA} decryption exponent with constrained secret key}, journal = {Int. J. Inf. Comput. Secur.}, volume = {14}, number = {2}, pages = {102--117}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.113168}, doi = {10.1504/IJICS.2021.113168}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/MumtazL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/PonguwalaR21, author = {Maitreyi Ponguwala and Meda Sreenivasa Rao}, title = {Secured spray and focus protocol design in intermittently connected mobile networks}, journal = {Int. J. Inf. Comput. Secur.}, volume = {14}, number = {3/4}, pages = {344--353}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.114710}, doi = {10.1504/IJICS.2021.114710}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/PonguwalaR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/RaghavenderP21, author = {K. V. Raghavender and P. Premchand}, title = {Accurate and reliable detection of DDoS attacks based on {ARIMA-SWGARCH} model}, journal = {Int. J. Inf. Comput. Secur.}, volume = {14}, number = {2}, pages = {118--135}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.113169}, doi = {10.1504/IJICS.2021.113169}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/RaghavenderP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/RathP21, author = {Mamata Rath and Binod Kumar Pattanayak}, title = {Performance evaluation of optimised protocol in {MANET}}, journal = {Int. J. Inf. Comput. Secur.}, volume = {14}, number = {3/4}, pages = {318--326}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.114708}, doi = {10.1504/IJICS.2021.114708}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/RathP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/SaradiK21, author = {V. Partha Saradi and P. Kailasapathi}, title = {A novel binary encryption algorithm for navigation control of robotic vehicles through visible light communication}, journal = {Int. J. Inf. Comput. Secur.}, volume = {14}, number = {2}, pages = {160--170}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.113172}, doi = {10.1504/IJICS.2021.113172}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/SaradiK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/SarafSI21, author = {Iqra Saraf and Avinash K. Shrivastava and Javaid Iqbal}, title = {Effort-based fault detection and correction modelling for multi release of software}, journal = {Int. J. Inf. Comput. Secur.}, volume = {14}, number = {3/4}, pages = {354--379}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.114711}, doi = {10.1504/IJICS.2021.114711}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijics/SarafSI21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/SathishK21, author = {Kuppani Sathish and Kamakshaiah Kolli}, title = {Sustainable wireless clouds with security assurance}, journal = {Int. J. Inf. Comput. Secur.}, volume = {14}, number = {2}, pages = {146--159}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.113171}, doi = {10.1504/IJICS.2021.113171}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/SathishK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/ShailajaN21, author = {A. Shailaja and Krishnamurthy Gorappa Ningappa}, title = {A low area {VLSI} implementation of extended tiny encryption algorithm using Lorenz chaotic system}, journal = {Int. J. Inf. Comput. Secur.}, volume = {14}, number = {1}, pages = {3--19}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.112205}, doi = {10.1504/IJICS.2021.112205}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/ShailajaN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/SinghSBS21, author = {Amardeep Singh and Monika Singh and Divya Bansal and Sanjeev Sofat}, title = {Optimised K-anonymisation technique to deal with mutual friends and degree attacks}, journal = {Int. J. Inf. Comput. Secur.}, volume = {14}, number = {3/4}, pages = {281--299}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.114706}, doi = {10.1504/IJICS.2021.114706}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/SinghSBS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/SinghTV21, author = {Ajeet Singh and Appala Naidu Tentu and V. Ch. Venkaiah}, title = {A dynamic key management paradigm for secure wireless ad hoc network communications}, journal = {Int. J. Inf. Comput. Secur.}, volume = {14}, number = {3/4}, pages = {380--402}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.114712}, doi = {10.1504/IJICS.2021.114712}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/SinghTV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/WaqasAMY21, author = {Umer Waqas and Shazia Afzal and Mubeen Akhtar Mir and Muhammad Yousaf}, title = {Cryptographic strength evaluation of {AES} s-box variants}, journal = {Int. J. Inf. Comput. Secur.}, volume = {14}, number = {3/4}, pages = {263--280}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.114705}, doi = {10.1504/IJICS.2021.114705}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/WaqasAMY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.