Search dblp for Publications

export results for "toc:db/journals/isecure/isecure6.bht:"

 download as .bib file

@article{DBLP:journals/isecure/AlizadehAB14,
  author       = {Javad Alizadeh and
                  Mohammad Reza Aref and
                  Nasour Bagheri},
  title        = {Artemia: a family of provably secure authenticated encryption schemes},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {6},
  number       = {2},
  pages        = {125--139},
  year         = {2014},
  url          = {https://doi.org/10.22042/isecure.2015.6.2.3},
  doi          = {10.22042/ISECURE.2015.6.2.3},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/AlizadehAB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/DamianiCG14,
  author       = {Ernesto Damiani and
                  Stelvio Cimato and
                  Gabriele Gianini},
  title        = {A risk model for cloud processes},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {6},
  number       = {2},
  pages        = {99--123},
  year         = {2014},
  url          = {https://doi.org/10.22042/isecure.2015.6.2.2},
  doi          = {10.22042/ISECURE.2015.6.2.2},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/DamianiCG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/DoroudianS14,
  author       = {Mostafa Doroudian and
                  Hamid Reza Shahriari},
  title        = {A hybrid approach for database intrusion detection at transaction
                  and inter-transaction levels},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {6},
  number       = {2},
  pages        = {155--167},
  year         = {2014},
  url          = {https://doi.org/10.22042/isecure.2015.6.2.5},
  doi          = {10.22042/ISECURE.2015.6.2.5},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/DoroudianS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/FanianAB14,
  author       = {Ali Fanian and
                  Fariba Alamifar and
                  Mehdi Berenjkoub},
  title        = {An efficient non-repudiation billing protocol in heterogeneous 3G-WLAN
                  networks},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {6},
  number       = {2},
  pages        = {141--153},
  year         = {2014},
  url          = {https://doi.org/10.22042/isecure.2015.6.2.4},
  doi          = {10.22042/ISECURE.2015.6.2.4},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/FanianAB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/GhasemzadehPA14,
  author       = {Hamzeh Ghasemzadeh and
                  Ali Payandeh and
                  Mohammad Reza Aref},
  title        = {Toward an energy efficient PKC-based key management system for wireless
                  sensor networks},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {6},
  number       = {1},
  pages        = {53--66},
  year         = {2014},
  url          = {https://doi.org/10.22042/isecure.2014.6.1.5},
  doi          = {10.22042/ISECURE.2014.6.1.5},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/GhasemzadehPA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/Jalili14,
  author       = {Rasool Jalili},
  title        = {Editorial},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {6},
  number       = {1},
  pages        = {1--2},
  year         = {2014},
  url          = {https://doi.org/10.22042/isecure.2014.6.1.1},
  doi          = {10.22042/ISECURE.2014.6.1.1},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/Jalili14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/Jalili14a,
  author       = {Rasool Jalili},
  title        = {Editorial},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {6},
  number       = {2},
  pages        = {97--98},
  year         = {2014},
  url          = {https://doi.org/10.22042/isecure.2015.6.2.1},
  doi          = {10.22042/ISECURE.2015.6.2.1},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/Jalili14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/RajiMJ14,
  author       = {Fatemeh Raji and
                  Ali Miri and
                  Mohammad Davarpanah Jazi},
  title        = {A centralized privacy-preserving framework for online social networks},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {6},
  number       = {1},
  pages        = {35--52},
  year         = {2014},
  url          = {https://doi.org/10.22042/isecure.2014.6.1.4},
  doi          = {10.22042/ISECURE.2014.6.1.4},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/RajiMJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/RasoolzadehASA14,
  author       = {Shahram Rasoolzadeh and
                  Zahra Ahmadian and
                  Mahmoud Salmasizadeh and
                  Mohammad Reza Aref},
  title        = {Total break of Zorro using linear and differential attacks},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {6},
  number       = {1},
  pages        = {23--34},
  year         = {2014},
  url          = {https://doi.org/10.22042/isecure.2014.6.1.3},
  doi          = {10.22042/ISECURE.2014.6.1.3},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/RasoolzadehASA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/ShakeriG14,
  author       = {Ehsan Shakeri and
                  Shahrokh Ghaemmaghami},
  title        = {An extended feature set for blind image steganalysis in contourlet
                  domain},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {6},
  number       = {2},
  pages        = {169--181},
  year         = {2014},
  url          = {https://doi.org/10.22042/isecure.2014.6.2.6},
  doi          = {10.22042/ISECURE.2014.6.2.6},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/ShakeriG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/ShamaeiM14,
  author       = {Shiva Shamaei and
                  Ali Movaghar},
  title        = {A two-phase wormhole attack detection scheme in MANETs},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {6},
  number       = {2},
  pages        = {183--191},
  year         = {2014},
  url          = {https://doi.org/10.22042/isecure.2015.6.2.7},
  doi          = {10.22042/ISECURE.2015.6.2.7},
  timestamp    = {Wed, 12 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/ShamaeiM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/ShokrollahiSE14,
  author       = {Saeed Shokrollahi and
                  Fereidoon Shams and
                  Javad Esmaeili},
  title        = {Access control in ultra-large-scale systems using a data-centric middleware},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {6},
  number       = {1},
  pages        = {3--22},
  year         = {2014},
  url          = {https://doi.org/10.22042/isecure.2014.6.1.2},
  doi          = {10.22042/ISECURE.2014.6.1.2},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/ShokrollahiSE14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/TavakolyA14,
  author       = {Asghar Tavakoly and
                  Reza Ebrahimi Atani},
  title        = {Improving Tor security against timing and traffic analysis attacks
                  with fair randomization},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {6},
  number       = {1},
  pages        = {67--76},
  year         = {2014},
  url          = {https://doi.org/10.22042/isecure.2014.6.1.6},
  doi          = {10.22042/ISECURE.2014.6.1.6},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/TavakolyA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/ZabihiJH14,
  author       = {Mahdieh Zabihi and
                  Majid Vafaei Jahan and
                  Javad Hamidzadeh},
  title        = {A density based clustering approach to distinguish between web robot
                  and human requests to a web server},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {6},
  number       = {1},
  pages        = {77--89},
  year         = {2014},
  url          = {https://doi.org/10.22042/isecure.2014.6.1.7},
  doi          = {10.22042/ISECURE.2014.6.1.7},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/ZabihiJH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}