Search dblp for Publications

export results for "toc:db/journals/ijics/ijics8.bht:"

 download as .bib file

@article{DBLP:journals/ijics/Ammayappan16,
  author       = {Kavitha Ammayappan},
  title        = {Formally verified {TSM} centric privacy preserving {NFC} mobile payment
                  framework and protocol},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {8},
  number       = {2},
  pages        = {181--204},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJICS.2016.078126},
  doi          = {10.1504/IJICS.2016.078126},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Ammayappan16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/BabuIRSN16,
  author       = {M. Swagath Babu and
                  G. Idayachandran and
                  A. Rajesh and
                  T. Shankar and
                  Rangaswamy Nakkeeran},
  title        = {Investigation on defected ground-plane structures to improve isolation
                  and correlation in multi-band {MIMO} antenna},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {8},
  number       = {3},
  pages        = {258--271},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJICS.2016.079186},
  doi          = {10.1504/IJICS.2016.079186},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/BabuIRSN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/BeloucifNN16,
  author       = {Assia Beloucif and
                  Oussama Noui and
                  Lemnouar Noui},
  title        = {Design of a tweakable image encryption algorithm using chaos-based
                  schema},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {8},
  number       = {3},
  pages        = {205--220},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJICS.2016.079183},
  doi          = {10.1504/IJICS.2016.079183},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/BeloucifNN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/CS16,
  author       = {Pramod T. C and
                  N. R. Sunitha},
  title        = {Key pre-distribution schemes to support various architectural deployment
                  models in {WSN}},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {8},
  number       = {2},
  pages        = {139--157},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJICS.2016.078124},
  doi          = {10.1504/IJICS.2016.078124},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/CS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/DhavaleDPP16,
  author       = {Sunita Vikrant Dhavale and
                  Rajendra S. Deodhar and
                  Debasish Pradhan and
                  L. M. Patnaik},
  title        = {A robust zero watermarking algorithm for stereo audio signals},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {8},
  number       = {4},
  pages        = {330--346},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJICS.2016.10001268},
  doi          = {10.1504/IJICS.2016.10001268},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/DhavaleDPP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/GayathriS16,
  author       = {J. Gayathri and
                  S. Subashini},
  title        = {A survey on security and efficiency issues in chaotic image encryption},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {8},
  number       = {4},
  pages        = {347--381},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJICS.2016.10001271},
  doi          = {10.1504/IJICS.2016.10001271},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/GayathriS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/GhalebZR16,
  author       = {Fuad A. Ghaleb and
                  Anazida Zainal and
                  Murad A. Rassam},
  title        = {Mobility information estimation algorithm using Kalman-filter for
                  vehicular ad hoc networks},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {8},
  number       = {3},
  pages        = {221--240},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJICS.2016.079184},
  doi          = {10.1504/IJICS.2016.079184},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/GhalebZR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/GhebghoubOB16,
  author       = {Yasmina Ghebghoub and
                  Saliha Oukid and
                  Omar Boussaid},
  title        = {An {MDA} approach to secure access to data on cloud using implicit
                  security},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {8},
  number       = {2},
  pages        = {107--120},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJICS.2016.078120},
  doi          = {10.1504/IJICS.2016.078120},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/GhebghoubOB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/GnanambigaiR16,
  author       = {J. Gnanambigai and
                  N. Rengarajan},
  title        = {A novel approach to enhance the network lifetime for hybrid routing
                  protocol},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {8},
  number       = {2},
  pages        = {95--106},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJICS.2016.078117},
  doi          = {10.1504/IJICS.2016.078117},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/GnanambigaiR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Kisore16,
  author       = {N. Raghu Kisore},
  title        = {A qualitative framework for evaluating buffer overflow protection
                  mechanisms},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {8},
  number       = {3},
  pages        = {272--307},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJICS.2016.079187},
  doi          = {10.1504/IJICS.2016.079187},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Kisore16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/OuadaOBT16,
  author       = {Farah{-}Sarah Ouada and
                  Mawloud Omar and
                  Abdelmadjid Bouabdallah and
                  Abdelkamel Tari},
  title        = {Lightweight identity-based authentication protocol for wireless sensor
                  networks},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {8},
  number       = {2},
  pages        = {121--138},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJICS.2016.078123},
  doi          = {10.1504/IJICS.2016.078123},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/OuadaOBT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/PhadikarJPM16,
  author       = {Amit Phadikar and
                  Poulami Jana and
                  Baisakhi Sur Phadikar and
                  Goutam Kumar Maity},
  title        = {Reversible watermarking using channel coding and lifting for cultural
                  heritage and medical image},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {8},
  number       = {1},
  pages        = {34--54},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJICS.2016.075308},
  doi          = {10.1504/IJICS.2016.075308},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/PhadikarJPM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/PraherS16,
  author       = {Christian Praher and
                  Michael Sonntag},
  title        = {Applicability of keystroke dynamics as a biometric security feature
                  for mobile touchscreen devices with virtualised keyboards},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {8},
  number       = {1},
  pages        = {72--91},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJICS.2016.075311},
  doi          = {10.1504/IJICS.2016.075311},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/PraherS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/RajaboinaRKV16,
  author       = {RajaSekhar Rajaboina and
                  P. Chenna Reddy and
                  Raja Ashok Kumar and
                  Nangil Venkatramana},
  title        = {Performance comparison of TCP, {UDP} and {TFRC} in static wireless
                  environment},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {8},
  number       = {2},
  pages        = {158--180},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJICS.2016.078125},
  doi          = {10.1504/IJICS.2016.078125},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/RajaboinaRKV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/SahayiniM16,
  author       = {T. Sahayini and
                  M. S. K. Manikandan},
  title        = {Enhancing the security of modern {ICT} systems with multimodal biometric
                  cryptosystem and continuous user authentication},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {8},
  number       = {1},
  pages        = {55--71},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJICS.2016.075310},
  doi          = {10.1504/IJICS.2016.075310},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/SahayiniM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/SahooT16,
  author       = {Anoop Jyoti Sahoo and
                  Rajesh Kumar Tiwari},
  title        = {A novel approach for hiding secret data in program files},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {8},
  number       = {1},
  pages        = {1--10},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJICS.2016.075305},
  doi          = {10.1504/IJICS.2016.075305},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/SahooT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Sood16,
  author       = {Sandeep K. Sood},
  title        = {Advanced dynamic identity-based authentication protocol using smart
                  card},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {8},
  number       = {1},
  pages        = {11--33},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJICS.2016.075307},
  doi          = {10.1504/IJICS.2016.075307},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Sood16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/TripathiS16,
  author       = {Anshu Tripathi and
                  Umesh Kumar Singh},
  title        = {Application of quantitative security measurement model for prioritisation
                  of vulnerability mitigation: a real case study},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {8},
  number       = {4},
  pages        = {309--329},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJICS.2016.10001267},
  doi          = {10.1504/IJICS.2016.10001267},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/TripathiS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/VeeramreddyV16,
  author       = {Jyothsna Veeramreddy and
                  Rama Prasad V. Vaddella},
  title        = {Anomaly-based network intrusion detection through assessing feature
                  association impact scale},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {8},
  number       = {3},
  pages        = {241--257},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJICS.2016.079185},
  doi          = {10.1504/IJICS.2016.079185},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/VeeramreddyV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/ZhangJL16,
  author       = {Shengzhi Zhang and
                  Xiaoqi Jia and
                  Peng Liu},
  title        = {Towards service continuity for transactional applications via diverse
                  device drivers},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {8},
  number       = {4},
  pages        = {382--400},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJICS.2016.10001273},
  doi          = {10.1504/IJICS.2016.10001273},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/ZhangJL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics