![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp for Publications
export results for "toc:db/journals/ijics/ijics7.bht:"
@article{DBLP:journals/ijics/CurranMH15, author = {Kevin Curran and Vivian Maynes and Declan Harkin}, title = {Mobile device security}, journal = {Int. J. Inf. Comput. Secur.}, volume = {7}, number = {1}, pages = {1--13}, year = {2015}, url = {https://doi.org/10.1504/IJICS.2015.069205}, doi = {10.1504/IJICS.2015.069205}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/CurranMH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/KhouryT15, author = {Rapha{\"{e}}l Khoury and Nadia Tawbi}, title = {Equivalence-preserving corrective enforcement of security properties}, journal = {Int. J. Inf. Comput. Secur.}, volume = {7}, number = {2/3/4}, pages = {113--139}, year = {2015}, url = {https://doi.org/10.1504/IJICS.2015.073011}, doi = {10.1504/IJICS.2015.073011}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/KhouryT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/KumarM15, author = {Rakesh Kumar and Geetu Mahajan}, title = {A novel framework for secure file transmission using modified {AES} and {MD5} algorithms}, journal = {Int. J. Inf. Comput. Secur.}, volume = {7}, number = {2/3/4}, pages = {91--112}, year = {2015}, url = {https://doi.org/10.1504/IJICS.2015.073012}, doi = {10.1504/IJICS.2015.073012}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/KumarM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Mahoney15, author = {William R. Mahoney}, title = {Modifications to {GCC} for increased software privacy}, journal = {Int. J. Inf. Comput. Secur.}, volume = {7}, number = {2/3/4}, pages = {160--176}, year = {2015}, url = {https://doi.org/10.1504/IJICS.2015.073024}, doi = {10.1504/IJICS.2015.073024}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Mahoney15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/MantasSGJG15, author = {Georgios Mantas and Natalia Stakhanova and Hugo Gonzalez and Hossein Hadian Jazi and Ali A. Ghorbani}, title = {Application-layer denial of service attacks: taxonomy and survey}, journal = {Int. J. Inf. Comput. Secur.}, volume = {7}, number = {2/3/4}, pages = {216--239}, year = {2015}, url = {https://doi.org/10.1504/IJICS.2015.073028}, doi = {10.1504/IJICS.2015.073028}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/MantasSGJG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/NiuZXY15, author = {Lei Niu and Changqing Zhang and Qi Xia and Yong Yu}, title = {Advanced security analysis of a signature scheme with message recovery}, journal = {Int. J. Inf. Comput. Secur.}, volume = {7}, number = {1}, pages = {39--48}, year = {2015}, url = {https://doi.org/10.1504/IJICS.2015.069212}, doi = {10.1504/IJICS.2015.069212}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijics/NiuZXY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/OlaniyiAOO15, author = {Olayemi M. Olaniyi and Oladiran T. Arulogun and Oluwasayo E. Omidiora and Oladotun Olusola Okediran}, title = {Implementing generic security requirements in e-voting using modified stegano-cryptographic approach}, journal = {Int. J. Inf. Comput. Secur.}, volume = {7}, number = {1}, pages = {64--90}, year = {2015}, url = {https://doi.org/10.1504/IJICS.2015.069214}, doi = {10.1504/IJICS.2015.069214}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/OlaniyiAOO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Pan15, author = {Jonathan Pan}, title = {Data leakage triage: quantitative measure of effectiveness of containment plan}, journal = {Int. J. Inf. Comput. Secur.}, volume = {7}, number = {2/3/4}, pages = {240--254}, year = {2015}, url = {https://doi.org/10.1504/IJICS.2015.073032}, doi = {10.1504/IJICS.2015.073032}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Pan15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/PrasanthB15, author = {Narayanan Prasanth and Kannan Balasubramanian}, title = {Performance analysis of buffered crossbar switch scheduling algorithms}, journal = {Int. J. Inf. Comput. Secur.}, volume = {7}, number = {1}, pages = {49--63}, year = {2015}, url = {https://doi.org/10.1504/IJICS.2015.069208}, doi = {10.1504/IJICS.2015.069208}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/PrasanthB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/RoySC15, author = {Ratnakirti Roy and Shabnam Samima and Suvamoy Changder}, title = {A map-based image steganography scheme for {RGB} images}, journal = {Int. J. Inf. Comput. Secur.}, volume = {7}, number = {2/3/4}, pages = {196--215}, year = {2015}, url = {https://doi.org/10.1504/IJICS.2015.073026}, doi = {10.1504/IJICS.2015.073026}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/RoySC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/ThangavelVMN15, author = {M. Thangavel and P. Varalakshmi and Mukund Murrali and K. Nithya}, title = {Secure file storage and retrieval in cloud}, journal = {Int. J. Inf. Comput. Secur.}, volume = {7}, number = {2/3/4}, pages = {177--195}, year = {2015}, url = {https://doi.org/10.1504/IJICS.2015.073025}, doi = {10.1504/IJICS.2015.073025}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/ThangavelVMN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/WangR15, author = {Peng Wang and Chinya V. Ravishankar}, title = {Hierarchical policy delegation in multiple-authority {ABE}}, journal = {Int. J. Inf. Comput. Secur.}, volume = {7}, number = {2/3/4}, pages = {140--159}, year = {2015}, url = {https://doi.org/10.1504/IJICS.2015.073020}, doi = {10.1504/IJICS.2015.073020}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/WangR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/XuLM15, author = {Haixia Xu and Bao Li and Qixiang Mei}, title = {Complementary witness soundness for witness indistinguishable proof system and {CCA2} public-key encryption schemes}, journal = {Int. J. Inf. Comput. Secur.}, volume = {7}, number = {1}, pages = {14--38}, year = {2015}, url = {https://doi.org/10.1504/IJICS.2015.069211}, doi = {10.1504/IJICS.2015.069211}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/XuLM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.