Search dblp for Publications

export results for "toc:db/journals/istr/istr18.bht:"

 download as .bib file

@article{DBLP:journals/istr/AhmadiS13,
  author       = {Hadi Ahmadi and
                  Reihaneh Safavi{-}Naini},
  title        = {Message transmission and key establishment: General equality for weak
                  and strong capacities},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {18},
  number       = {1},
  pages        = {83--95},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jisa.2013.07.007},
  doi          = {10.1016/J.JISA.2013.07.007},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/AhmadiS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChakrabortyJB13,
  author       = {Soumendu Chakraborty and
                  Anand Singh Jalal and
                  Charul Bhatnagar},
  title        = {Secret image sharing using grayscale payload decomposition and irreversible
                  image steganography},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {18},
  number       = {4},
  pages        = {180--192},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.istr.2013.02.006},
  doi          = {10.1016/J.ISTR.2013.02.006},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/ChakrabortyJB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChengW13,
  author       = {Lee{-}Ming Cheng and
                  K. W. Wong},
  title        = {Editorial: Smart Card and {RFID} Security},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {18},
  number       = {2-3},
  pages        = {97},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jisa.2013.10.001},
  doi          = {10.1016/J.JISA.2013.10.001},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/ChengW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/CuppensCBME13,
  author       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Meriam Ben{-}Ghorbel{-}Talbi and
                  Stephane Morucci and
                  Nada Essaouini},
  title        = {Smatch: Formal dynamic session management model for {RBAC}},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {18},
  number       = {1},
  pages        = {30--44},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jisa.2013.07.001},
  doi          = {10.1016/J.JISA.2013.07.001},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/CuppensCBME13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/CuppensCDSGT13,
  author       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Ernesto Damiani and
                  Radu State and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Nadia Tawbi},
  title        = {Editorial},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {18},
  number       = {1},
  pages        = {1},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jisa.2013.08.004},
  doi          = {10.1016/J.JISA.2013.08.004},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/CuppensCDSGT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/FitzgeraldNF13,
  author       = {William M. Fitzgerald and
                  Ultan Neville and
                  Simon N. Foley},
  title        = {{MASON:} Mobile autonomic security for network access controls},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {18},
  number       = {1},
  pages        = {14--29},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jisa.2013.08.001},
  doi          = {10.1016/J.JISA.2013.08.001},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/FitzgeraldNF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/GadyatskayaM0C13,
  author       = {Olga Gadyatskaya and
                  Fabio Massacci and
                  Quang Huy Nguyen and
                  Boutheina Chetali},
  title        = {Load time code validation for mobile phone Java Cards},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {18},
  number       = {2-3},
  pages        = {108--129},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jisa.2013.07.004},
  doi          = {10.1016/J.JISA.2013.07.004},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/GadyatskayaM0C13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/GujjunooriA13,
  author       = {Sagar Gujjunoori and
                  B. B. Amberker},
  title        = {{DCT} based reversible data embedding for {MPEG-4} video using {HVS}
                  characteristics},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {18},
  number       = {4},
  pages        = {157--166},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.istr.2013.01.002},
  doi          = {10.1016/J.ISTR.2013.01.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/GujjunooriA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HamadoucheL13,
  author       = {Samiya Hamadouche and
                  Jean{-}Louis Lanet},
  title        = {Virus in a smart card: Myth or reality?},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {18},
  number       = {2-3},
  pages        = {130--137},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jisa.2013.08.005},
  doi          = {10.1016/J.JISA.2013.08.005},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/HamadoucheL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KalraS13,
  author       = {Sheetal Kalra and
                  Sandeep K. Sood},
  title        = {Advanced remote user authentication protocol for multi-server architecture
                  based on {ECC}},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {18},
  number       = {2-3},
  pages        = {98--107},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jisa.2013.07.005},
  doi          = {10.1016/J.JISA.2013.07.005},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/KalraS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KamelL13,
  author       = {Nassima Kamel and
                  Jean{-}Louis Lanet},
  title        = {Risks induced by Web applications on smart cards},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {18},
  number       = {2-3},
  pages        = {148--156},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jisa.2013.09.002},
  doi          = {10.1016/J.JISA.2013.09.002},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/KamelL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Kheir13,
  author       = {Nizar Kheir},
  title        = {Behavioral classification and detection of malware through {HTTP}
                  user agent anomalies},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {18},
  number       = {1},
  pages        = {2--13},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jisa.2013.07.006},
  doi          = {10.1016/J.JISA.2013.07.006},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/Kheir13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KriegGSWBGH13,
  author       = {Armin Krieg and
                  Johannes Grinschgl and
                  Christian Steger and
                  Reinhold Weiss and
                  Holger Bock and
                  Andreas Genser and
                  Josef Haid},
  title        = {Hardware accelerated smart-card software evaluation supported by information
                  leakage and activity sensors},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {18},
  number       = {2-3},
  pages        = {138--147},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jisa.2013.09.001},
  doi          = {10.1016/J.JISA.2013.09.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/KriegGSWBGH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LeeLH13,
  author       = {Cheng{-}Chi Lee and
                  Yan{-}Ming Lai and
                  Chin{-}Sung Hsiao},
  title        = {Cryptanalysis of a simple key assignment for access control based
                  on polynomial},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {18},
  number       = {4},
  pages        = {215--218},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jisa.2013.12.001},
  doi          = {10.1016/J.JISA.2013.12.001},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/LeeLH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/NguyenWL13,
  author       = {Thi Hanh Nguyen and
                  Yi Wang and
                  Renfa Li},
  title        = {An improved ridge features extraction algorithm for distorted fingerprints
                  matching},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {18},
  number       = {4},
  pages        = {206--214},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jisa.2013.11.001},
  doi          = {10.1016/J.JISA.2013.11.001},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/NguyenWL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/RezaB13,
  author       = {Tahsin Arafat Reza and
                  Michel Barbeau},
  title        = {QaASs: QoS aware adaptive security scheme for video streaming in MANETs},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {18},
  number       = {1},
  pages        = {68--82},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jisa.2013.08.003},
  doi          = {10.1016/J.JISA.2013.08.003},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/RezaB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SaadT13,
  author       = {Sherif Saad and
                  Issa Traor{\'{e}}},
  title        = {Semantic aware attack scenarios reconstruction},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {18},
  number       = {1},
  pages        = {53--67},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jisa.2013.08.002},
  doi          = {10.1016/J.JISA.2013.08.002},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/SaadT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SanthiA13,
  author       = {V. Santhi and
                  Pachiyappan Arulmozhivarman},
  title        = {Hadamard transform based adaptive visible/invisible watermarking scheme
                  for digital images},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {18},
  number       = {4},
  pages        = {167--179},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.istr.2013.01.001},
  doi          = {10.1016/J.ISTR.2013.01.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/SanthiA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ShamalaAY13,
  author       = {Palaniappan Shamala and
                  Rabiah Ahmad and
                  Mariana Yusoff},
  title        = {A conceptual framework of info structure for information security
                  risk assessment {(ISRA)}},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {18},
  number       = {1},
  pages        = {45--52},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jisa.2013.07.002},
  doi          = {10.1016/J.JISA.2013.07.002},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ShamalaAY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/TurkanovicP13,
  author       = {Muhamed Turkanovic and
                  Gregor Polancic},
  title        = {On the security of certain e-communication types: Risks, user awareness
                  and recommendations},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {18},
  number       = {4},
  pages        = {193--205},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jisa.2013.07.003},
  doi          = {10.1016/J.JISA.2013.07.003},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/TurkanovicP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics