default search action
Journal of Information Security and Applications, Volume 29
Volume 29, August 2016
- Stephane Gael Raymond Ekodeck, René Ndoundam:
PDF steganography based on Chinese Remainder Theorem. 1-15 - Andreas Follner, Eric Bodden:
ROPocop - Dynamic mitigation of code-reuse attacks. 16-26 - Kerem Kaynar:
A taxonomy for attack graph generation and usage in network security. 27-56 - Prakash Dey, Raghvendra Singh Rohit, Avishek Adhikari:
Full key recovery of ACORN with a single fault. 57-64 - Celine Mary Stuart, Spandana K., Dhanaraj K. J., Deepthi P. Pattathil:
Design and implementation of hardware-efficient modified Rao-Nam scheme with high security for wireless sensor networks. 65-79 - Vidhi Khanduja, Shampa Chakraverty, Om Prakash Verma:
Enabling information recovery with ownership using robust multiple watermarks. 80-92
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.