Search dblp for Publications

export results for "toc:db/journals/ijics/ijics7.bht:"

 download as .bib file

@article{DBLP:journals/ijics/CurranMH15,
  author       = {Kevin Curran and
                  Vivian Maynes and
                  Declan Harkin},
  title        = {Mobile device security},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {7},
  number       = {1},
  pages        = {1--13},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJICS.2015.069205},
  doi          = {10.1504/IJICS.2015.069205},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/CurranMH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/KhouryT15,
  author       = {Rapha{\"{e}}l Khoury and
                  Nadia Tawbi},
  title        = {Equivalence-preserving corrective enforcement of security properties},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {7},
  number       = {2/3/4},
  pages        = {113--139},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJICS.2015.073011},
  doi          = {10.1504/IJICS.2015.073011},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/KhouryT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/KumarM15,
  author       = {Rakesh Kumar and
                  Geetu Mahajan},
  title        = {A novel framework for secure file transmission using modified {AES}
                  and {MD5} algorithms},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {7},
  number       = {2/3/4},
  pages        = {91--112},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJICS.2015.073012},
  doi          = {10.1504/IJICS.2015.073012},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/KumarM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Mahoney15,
  author       = {William R. Mahoney},
  title        = {Modifications to {GCC} for increased software privacy},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {7},
  number       = {2/3/4},
  pages        = {160--176},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJICS.2015.073024},
  doi          = {10.1504/IJICS.2015.073024},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Mahoney15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/MantasSGJG15,
  author       = {Georgios Mantas and
                  Natalia Stakhanova and
                  Hugo Gonzalez and
                  Hossein Hadian Jazi and
                  Ali A. Ghorbani},
  title        = {Application-layer denial of service attacks: taxonomy and survey},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {7},
  number       = {2/3/4},
  pages        = {216--239},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJICS.2015.073028},
  doi          = {10.1504/IJICS.2015.073028},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/MantasSGJG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/NiuZXY15,
  author       = {Lei Niu and
                  Changqing Zhang and
                  Qi Xia and
                  Yong Yu},
  title        = {Advanced security analysis of a signature scheme with message recovery},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {7},
  number       = {1},
  pages        = {39--48},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJICS.2015.069212},
  doi          = {10.1504/IJICS.2015.069212},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijics/NiuZXY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/OlaniyiAOO15,
  author       = {Olayemi M. Olaniyi and
                  Oladiran T. Arulogun and
                  Oluwasayo E. Omidiora and
                  Oladotun Olusola Okediran},
  title        = {Implementing generic security requirements in e-voting using modified
                  stegano-cryptographic approach},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {7},
  number       = {1},
  pages        = {64--90},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJICS.2015.069214},
  doi          = {10.1504/IJICS.2015.069214},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/OlaniyiAOO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Pan15,
  author       = {Jonathan Pan},
  title        = {Data leakage triage: quantitative measure of effectiveness of containment
                  plan},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {7},
  number       = {2/3/4},
  pages        = {240--254},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJICS.2015.073032},
  doi          = {10.1504/IJICS.2015.073032},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Pan15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/PrasanthB15,
  author       = {Narayanan Prasanth and
                  Kannan Balasubramanian},
  title        = {Performance analysis of buffered crossbar switch scheduling algorithms},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {7},
  number       = {1},
  pages        = {49--63},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJICS.2015.069208},
  doi          = {10.1504/IJICS.2015.069208},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/PrasanthB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/RoySC15,
  author       = {Ratnakirti Roy and
                  Shabnam Samima and
                  Suvamoy Changder},
  title        = {A map-based image steganography scheme for {RGB} images},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {7},
  number       = {2/3/4},
  pages        = {196--215},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJICS.2015.073026},
  doi          = {10.1504/IJICS.2015.073026},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/RoySC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/ThangavelVMN15,
  author       = {M. Thangavel and
                  P. Varalakshmi and
                  Mukund Murrali and
                  K. Nithya},
  title        = {Secure file storage and retrieval in cloud},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {7},
  number       = {2/3/4},
  pages        = {177--195},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJICS.2015.073025},
  doi          = {10.1504/IJICS.2015.073025},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/ThangavelVMN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/WangR15,
  author       = {Peng Wang and
                  Chinya V. Ravishankar},
  title        = {Hierarchical policy delegation in multiple-authority {ABE}},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {7},
  number       = {2/3/4},
  pages        = {140--159},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJICS.2015.073020},
  doi          = {10.1504/IJICS.2015.073020},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/WangR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/XuLM15,
  author       = {Haixia Xu and
                  Bao Li and
                  Qixiang Mei},
  title        = {Complementary witness soundness for witness indistinguishable proof
                  system and {CCA2} public-key encryption schemes},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {7},
  number       = {1},
  pages        = {14--38},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJICS.2015.069211},
  doi          = {10.1504/IJICS.2015.069211},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/XuLM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics