default search action
Search dblp for Publications
export results for "toc:db/journals/isecure/isecure6.bht:"
@article{DBLP:journals/isecure/AlizadehAB14, author = {Javad Alizadeh and Mohammad Reza Aref and Nasour Bagheri}, title = {Artemia: a family of provably secure authenticated encryption schemes}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {6}, number = {2}, pages = {125--139}, year = {2014}, url = {https://doi.org/10.22042/isecure.2015.6.2.3}, doi = {10.22042/ISECURE.2015.6.2.3}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/AlizadehAB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/DamianiCG14, author = {Ernesto Damiani and Stelvio Cimato and Gabriele Gianini}, title = {A risk model for cloud processes}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {6}, number = {2}, pages = {99--123}, year = {2014}, url = {https://doi.org/10.22042/isecure.2015.6.2.2}, doi = {10.22042/ISECURE.2015.6.2.2}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/DamianiCG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/DoroudianS14, author = {Mostafa Doroudian and Hamid Reza Shahriari}, title = {A hybrid approach for database intrusion detection at transaction and inter-transaction levels}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {6}, number = {2}, pages = {155--167}, year = {2014}, url = {https://doi.org/10.22042/isecure.2015.6.2.5}, doi = {10.22042/ISECURE.2015.6.2.5}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/DoroudianS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/FanianAB14, author = {Ali Fanian and Fariba Alamifar and Mehdi Berenjkoub}, title = {An efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {6}, number = {2}, pages = {141--153}, year = {2014}, url = {https://doi.org/10.22042/isecure.2015.6.2.4}, doi = {10.22042/ISECURE.2015.6.2.4}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/FanianAB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/GhasemzadehPA14, author = {Hamzeh Ghasemzadeh and Ali Payandeh and Mohammad Reza Aref}, title = {Toward an energy efficient PKC-based key management system for wireless sensor networks}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {6}, number = {1}, pages = {53--66}, year = {2014}, url = {https://doi.org/10.22042/isecure.2014.6.1.5}, doi = {10.22042/ISECURE.2014.6.1.5}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/GhasemzadehPA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/Jalili14, author = {Rasool Jalili}, title = {Editorial}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {6}, number = {1}, pages = {1--2}, year = {2014}, url = {https://doi.org/10.22042/isecure.2014.6.1.1}, doi = {10.22042/ISECURE.2014.6.1.1}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/Jalili14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/Jalili14a, author = {Rasool Jalili}, title = {Editorial}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {6}, number = {2}, pages = {97--98}, year = {2014}, url = {https://doi.org/10.22042/isecure.2015.6.2.1}, doi = {10.22042/ISECURE.2015.6.2.1}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/Jalili14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/RajiMJ14, author = {Fatemeh Raji and Ali Miri and Mohammad Davarpanah Jazi}, title = {A centralized privacy-preserving framework for online social networks}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {6}, number = {1}, pages = {35--52}, year = {2014}, url = {https://doi.org/10.22042/isecure.2014.6.1.4}, doi = {10.22042/ISECURE.2014.6.1.4}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/RajiMJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/RasoolzadehASA14, author = {Shahram Rasoolzadeh and Zahra Ahmadian and Mahmoud Salmasizadeh and Mohammad Reza Aref}, title = {Total break of Zorro using linear and differential attacks}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {6}, number = {1}, pages = {23--34}, year = {2014}, url = {https://doi.org/10.22042/isecure.2014.6.1.3}, doi = {10.22042/ISECURE.2014.6.1.3}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/RasoolzadehASA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/ShakeriG14, author = {Ehsan Shakeri and Shahrokh Ghaemmaghami}, title = {An extended feature set for blind image steganalysis in contourlet domain}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {6}, number = {2}, pages = {169--181}, year = {2014}, url = {https://doi.org/10.22042/isecure.2014.6.2.6}, doi = {10.22042/ISECURE.2014.6.2.6}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/ShakeriG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/ShamaeiM14, author = {Shiva Shamaei and Ali Movaghar}, title = {A two-phase wormhole attack detection scheme in MANETs}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {6}, number = {2}, pages = {183--191}, year = {2014}, url = {https://doi.org/10.22042/isecure.2015.6.2.7}, doi = {10.22042/ISECURE.2015.6.2.7}, timestamp = {Wed, 12 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/ShamaeiM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/ShokrollahiSE14, author = {Saeed Shokrollahi and Fereidoon Shams and Javad Esmaeili}, title = {Access control in ultra-large-scale systems using a data-centric middleware}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {6}, number = {1}, pages = {3--22}, year = {2014}, url = {https://doi.org/10.22042/isecure.2014.6.1.2}, doi = {10.22042/ISECURE.2014.6.1.2}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/ShokrollahiSE14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/TavakolyA14, author = {Asghar Tavakoly and Reza Ebrahimi Atani}, title = {Improving Tor security against timing and traffic analysis attacks with fair randomization}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {6}, number = {1}, pages = {67--76}, year = {2014}, url = {https://doi.org/10.22042/isecure.2014.6.1.6}, doi = {10.22042/ISECURE.2014.6.1.6}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/TavakolyA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/ZabihiJH14, author = {Mahdieh Zabihi and Majid Vafaei Jahan and Javad Hamidzadeh}, title = {A density based clustering approach to distinguish between web robot and human requests to a web server}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {6}, number = {1}, pages = {77--89}, year = {2014}, url = {https://doi.org/10.22042/isecure.2014.6.1.7}, doi = {10.22042/ISECURE.2014.6.1.7}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/ZabihiJH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.