![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp for Publications
export results for "toc:db/journals/istr/istr18.bht:"
@article{DBLP:journals/istr/AhmadiS13, author = {Hadi Ahmadi and Reihaneh Safavi{-}Naini}, title = {Message transmission and key establishment: General equality for weak and strong capacities}, journal = {J. Inf. Secur. Appl.}, volume = {18}, number = {1}, pages = {83--95}, year = {2013}, url = {https://doi.org/10.1016/j.jisa.2013.07.007}, doi = {10.1016/J.JISA.2013.07.007}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/AhmadiS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChakrabortyJB13, author = {Soumendu Chakraborty and Anand Singh Jalal and Charul Bhatnagar}, title = {Secret image sharing using grayscale payload decomposition and irreversible image steganography}, journal = {J. Inf. Secur. Appl.}, volume = {18}, number = {4}, pages = {180--192}, year = {2013}, url = {https://doi.org/10.1016/j.istr.2013.02.006}, doi = {10.1016/J.ISTR.2013.02.006}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/ChakrabortyJB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChengW13, author = {Lee{-}Ming Cheng and K. W. Wong}, title = {Editorial: Smart Card and {RFID} Security}, journal = {J. Inf. Secur. Appl.}, volume = {18}, number = {2-3}, pages = {97}, year = {2013}, url = {https://doi.org/10.1016/j.jisa.2013.10.001}, doi = {10.1016/J.JISA.2013.10.001}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/ChengW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/CuppensCBME13, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Meriam Ben{-}Ghorbel{-}Talbi and Stephane Morucci and Nada Essaouini}, title = {Smatch: Formal dynamic session management model for {RBAC}}, journal = {J. Inf. Secur. Appl.}, volume = {18}, number = {1}, pages = {30--44}, year = {2013}, url = {https://doi.org/10.1016/j.jisa.2013.07.001}, doi = {10.1016/J.JISA.2013.07.001}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/CuppensCBME13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/CuppensCDSGT13, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Ernesto Damiani and Radu State and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Nadia Tawbi}, title = {Editorial}, journal = {J. Inf. Secur. Appl.}, volume = {18}, number = {1}, pages = {1}, year = {2013}, url = {https://doi.org/10.1016/j.jisa.2013.08.004}, doi = {10.1016/J.JISA.2013.08.004}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/CuppensCDSGT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/FitzgeraldNF13, author = {William M. Fitzgerald and Ultan Neville and Simon N. Foley}, title = {{MASON:} Mobile autonomic security for network access controls}, journal = {J. Inf. Secur. Appl.}, volume = {18}, number = {1}, pages = {14--29}, year = {2013}, url = {https://doi.org/10.1016/j.jisa.2013.08.001}, doi = {10.1016/J.JISA.2013.08.001}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/FitzgeraldNF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/GadyatskayaM0C13, author = {Olga Gadyatskaya and Fabio Massacci and Quang Huy Nguyen and Boutheina Chetali}, title = {Load time code validation for mobile phone Java Cards}, journal = {J. Inf. Secur. Appl.}, volume = {18}, number = {2-3}, pages = {108--129}, year = {2013}, url = {https://doi.org/10.1016/j.jisa.2013.07.004}, doi = {10.1016/J.JISA.2013.07.004}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/GadyatskayaM0C13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/GujjunooriA13, author = {Sagar Gujjunoori and B. B. Amberker}, title = {{DCT} based reversible data embedding for {MPEG-4} video using {HVS} characteristics}, journal = {J. Inf. Secur. Appl.}, volume = {18}, number = {4}, pages = {157--166}, year = {2013}, url = {https://doi.org/10.1016/j.istr.2013.01.002}, doi = {10.1016/J.ISTR.2013.01.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/GujjunooriA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HamadoucheL13, author = {Samiya Hamadouche and Jean{-}Louis Lanet}, title = {Virus in a smart card: Myth or reality?}, journal = {J. Inf. Secur. Appl.}, volume = {18}, number = {2-3}, pages = {130--137}, year = {2013}, url = {https://doi.org/10.1016/j.jisa.2013.08.005}, doi = {10.1016/J.JISA.2013.08.005}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/HamadoucheL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KalraS13, author = {Sheetal Kalra and Sandeep K. Sood}, title = {Advanced remote user authentication protocol for multi-server architecture based on {ECC}}, journal = {J. Inf. Secur. Appl.}, volume = {18}, number = {2-3}, pages = {98--107}, year = {2013}, url = {https://doi.org/10.1016/j.jisa.2013.07.005}, doi = {10.1016/J.JISA.2013.07.005}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/KalraS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KamelL13, author = {Nassima Kamel and Jean{-}Louis Lanet}, title = {Risks induced by Web applications on smart cards}, journal = {J. Inf. Secur. Appl.}, volume = {18}, number = {2-3}, pages = {148--156}, year = {2013}, url = {https://doi.org/10.1016/j.jisa.2013.09.002}, doi = {10.1016/J.JISA.2013.09.002}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/KamelL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Kheir13, author = {Nizar Kheir}, title = {Behavioral classification and detection of malware through {HTTP} user agent anomalies}, journal = {J. Inf. Secur. Appl.}, volume = {18}, number = {1}, pages = {2--13}, year = {2013}, url = {https://doi.org/10.1016/j.jisa.2013.07.006}, doi = {10.1016/J.JISA.2013.07.006}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/Kheir13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KriegGSWBGH13, author = {Armin Krieg and Johannes Grinschgl and Christian Steger and Reinhold Weiss and Holger Bock and Andreas Genser and Josef Haid}, title = {Hardware accelerated smart-card software evaluation supported by information leakage and activity sensors}, journal = {J. Inf. Secur. Appl.}, volume = {18}, number = {2-3}, pages = {138--147}, year = {2013}, url = {https://doi.org/10.1016/j.jisa.2013.09.001}, doi = {10.1016/J.JISA.2013.09.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/KriegGSWBGH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LeeLH13, author = {Cheng{-}Chi Lee and Yan{-}Ming Lai and Chin{-}Sung Hsiao}, title = {Cryptanalysis of a simple key assignment for access control based on polynomial}, journal = {J. Inf. Secur. Appl.}, volume = {18}, number = {4}, pages = {215--218}, year = {2013}, url = {https://doi.org/10.1016/j.jisa.2013.12.001}, doi = {10.1016/J.JISA.2013.12.001}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/LeeLH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/NguyenWL13, author = {Thi Hanh Nguyen and Yi Wang and Renfa Li}, title = {An improved ridge features extraction algorithm for distorted fingerprints matching}, journal = {J. Inf. Secur. Appl.}, volume = {18}, number = {4}, pages = {206--214}, year = {2013}, url = {https://doi.org/10.1016/j.jisa.2013.11.001}, doi = {10.1016/J.JISA.2013.11.001}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/NguyenWL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/RezaB13, author = {Tahsin Arafat Reza and Michel Barbeau}, title = {QaASs: QoS aware adaptive security scheme for video streaming in MANETs}, journal = {J. Inf. Secur. Appl.}, volume = {18}, number = {1}, pages = {68--82}, year = {2013}, url = {https://doi.org/10.1016/j.jisa.2013.08.003}, doi = {10.1016/J.JISA.2013.08.003}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/RezaB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SaadT13, author = {Sherif Saad and Issa Traor{\'{e}}}, title = {Semantic aware attack scenarios reconstruction}, journal = {J. Inf. Secur. Appl.}, volume = {18}, number = {1}, pages = {53--67}, year = {2013}, url = {https://doi.org/10.1016/j.jisa.2013.08.002}, doi = {10.1016/J.JISA.2013.08.002}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/SaadT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SanthiA13, author = {V. Santhi and Pachiyappan Arulmozhivarman}, title = {Hadamard transform based adaptive visible/invisible watermarking scheme for digital images}, journal = {J. Inf. Secur. Appl.}, volume = {18}, number = {4}, pages = {167--179}, year = {2013}, url = {https://doi.org/10.1016/j.istr.2013.01.001}, doi = {10.1016/J.ISTR.2013.01.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/SanthiA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ShamalaAY13, author = {Palaniappan Shamala and Rabiah Ahmad and Mariana Yusoff}, title = {A conceptual framework of info structure for information security risk assessment {(ISRA)}}, journal = {J. Inf. Secur. Appl.}, volume = {18}, number = {1}, pages = {45--52}, year = {2013}, url = {https://doi.org/10.1016/j.jisa.2013.07.002}, doi = {10.1016/J.JISA.2013.07.002}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ShamalaAY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/TurkanovicP13, author = {Muhamed Turkanovic and Gregor Polancic}, title = {On the security of certain e-communication types: Risks, user awareness and recommendations}, journal = {J. Inf. Secur. Appl.}, volume = {18}, number = {4}, pages = {193--205}, year = {2013}, url = {https://doi.org/10.1016/j.jisa.2013.07.003}, doi = {10.1016/J.JISA.2013.07.003}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/TurkanovicP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.