Search dblp for Publications

export results for "toc:db/journals/ijesdf/ijesdf4.bht:"

 download as .bib file

@article{DBLP:journals/ijesdf/DamascenoTC12,
  author       = {Marcelo Damasceno and
                  Jerffeson Teixeira and
                  Gustavo A. L. de Campos},
  title        = {A prediction model for criminal levels using socio-criminal data},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {4},
  number       = {2/3},
  pages        = {201--214},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJESDF.2012.048414},
  doi          = {10.1504/IJESDF.2012.048414},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/DamascenoTC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/GranadilloMHD12,
  author       = {Gustavo {Gonzalez Granadillo} and
                  Yosra Ben Mustapha and
                  Nabil Hachem and
                  Herv{\'{e}} Debar},
  title        = {An ontology-driven approach to model {SIEM} information and operations
                  using the {SWRL} formalism},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {4},
  number       = {2/3},
  pages        = {104--123},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJESDF.2012.048412},
  doi          = {10.1504/IJESDF.2012.048412},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/GranadilloMHD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/HeC12,
  author       = {Debiao He and
                  Jianhua Chen},
  title        = {Cryptanalysis of a three-party password-based authenticated key exchange
                  protocol using Weil pairing},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {4},
  number       = {4},
  pages        = {244--251},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJESDF.2012.049754},
  doi          = {10.1504/IJESDF.2012.049754},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/HeC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/HeH12,
  author       = {Debiao He and
                  Yin Huang},
  title        = {Weaknesses in a dynamic ID-based remote user authentication scheme
                  for multi-server environment},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {4},
  number       = {1},
  pages        = {43--53},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJESDF.2012.045389},
  doi          = {10.1504/IJESDF.2012.045389},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/HeH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/JannatiF12,
  author       = {Hoda Jannati and
                  Abolfazl Falahati},
  title        = {Security enhanced user authentication scheme for wireless sensor network},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {4},
  number       = {4},
  pages        = {215--228},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJESDF.2012.049735},
  doi          = {10.1504/IJESDF.2012.049735},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/JannatiF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/JolfaeiVM12,
  author       = {Alireza Jolfaei and
                  Ahmadreza Vizandan and
                  Abdolrasoul Mirghadri},
  title        = {Image encryption using {HC-128} and {HC-256} stream ciphers},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {4},
  number       = {1},
  pages        = {19--42},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJESDF.2012.045388},
  doi          = {10.1504/IJESDF.2012.045388},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/JolfaeiVM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/KarayianniKG12,
  author       = {Stavroula Karayianni and
                  Vasilios Katos and
                  Christos K. Georgiadis},
  title        = {A framework for password harvesting from volatile memory},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {4},
  number       = {2/3},
  pages        = {154--163},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJESDF.2012.048411},
  doi          = {10.1504/IJESDF.2012.048411},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/KarayianniKG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/KoukiouA12,
  author       = {Georgia Koukiou and
                  Vassilis Anastassopoulos},
  title        = {Drunk person identification using thermal infrared images},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {4},
  number       = {4},
  pages        = {229--243},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJESDF.2012.049747},
  doi          = {10.1504/IJESDF.2012.049747},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/KoukiouA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/Kuzma12,
  author       = {Joanne Kuzma},
  title        = {Children and geotagged images: quantitative analysis for security
                  risk assessment},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {4},
  number       = {1},
  pages        = {54--64},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJESDF.2012.045390},
  doi          = {10.1504/IJESDF.2012.045390},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/Kuzma12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/MavridouZDP12,
  author       = {Anastasia Mavridou and
                  Victor Zhou and
                  Jerald Dawkins and
                  Mauricio Papa},
  title        = {A situational awareness framework for securing the smart grid using
                  monitoring sensors and threat models},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {4},
  number       = {2/3},
  pages        = {138--153},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJESDF.2012.048417},
  doi          = {10.1504/IJESDF.2012.048417},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/MavridouZDP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/MukhtarAAVJ12,
  author       = {Rabiu Mukhtar and
                  Ameer Al{-}Nemrat and
                  Mamoun Alazab and
                  Sitalakshmi Venkatraman and
                  Hamid Jahankhani},
  title        = {Analysis of firewall log-based detection scenarios for evidence in
                  digital forensics},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {4},
  number       = {4},
  pages        = {261--279},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJESDF.2012.049761},
  doi          = {10.1504/IJESDF.2012.049761},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/MukhtarAAVJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/NtouskasPP12,
  author       = {Theodoros Ntouskas and
                  Dimitrios Papanikas and
                  Nineta Polemi},
  title        = {Trusted collaborative services for the {IT} security management of
                  SMEs/mEs},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {4},
  number       = {2/3},
  pages        = {124--137},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJESDF.2012.048413},
  doi          = {10.1504/IJESDF.2012.048413},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/NtouskasPP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/SaBMS12,
  author       = {V{\'{\i}}tor J. S{\'{a}} and
                  Daniela Borges and
                  S{\'{e}}rgio Tenreiro de Magalh{\~{a}}es and
                  Henrique M. Dinis Santos},
  title        = {Biometric technologies and their perception by the common citizen},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {4},
  number       = {2/3},
  pages        = {187--200},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJESDF.2012.048418},
  doi          = {10.1504/IJESDF.2012.048418},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/SaBMS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/ShankarSN12,
  author       = {T. N. Shankar and
                  Gadadhar Sahoo and
                  S. Niranjan},
  title        = {Steganographic manipulations with elliptic curve cryptography},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {4},
  number       = {4},
  pages        = {280--297},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJESDF.2012.049762},
  doi          = {10.1504/IJESDF.2012.049762},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/ShankarSN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/SridharP12,
  author       = {Laavanya Sridhar and
                  V. Lakshmi Prabha},
  title        = {{RF} authenticated protection scheme for SRAM-based {FPGA} {IP} cores},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {4},
  number       = {1},
  pages        = {82--100},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJESDF.2012.045392},
  doi          = {10.1504/IJESDF.2012.045392},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/SridharP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/Tait12,
  author       = {Bobby L. Tait},
  title        = {Applied Fletcher-Munson curve algorithm for improved voice recognition},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {4},
  number       = {2/3},
  pages        = {178--186},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJESDF.2012.048421},
  doi          = {10.1504/IJESDF.2012.048421},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/Tait12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/Tiwari12,
  author       = {Rajesh Kumar Tiwari},
  title        = {High capacity and secured methodologies for steganography},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {4},
  number       = {1},
  pages        = {1--18},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJESDF.2012.045387},
  doi          = {10.1504/IJESDF.2012.045387},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/Tiwari12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/TsiakisKG12,
  author       = {Theodosios Tsiakis and
                  Panagiotis Katsaros and
                  Dimitris Gritzalis},
  title        = {Economic assessment of externalities for interactive audio media anti-SPIT
                  protection of internet services},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {4},
  number       = {2/3},
  pages        = {164--177},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJESDF.2012.048416},
  doi          = {10.1504/IJESDF.2012.048416},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/TsiakisKG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/VigilaM12,
  author       = {S. Maria Celestin Vigila and
                  K. Muneeswaran},
  title        = {Key generation based on elliptic curve over finite prime field},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {4},
  number       = {1},
  pages        = {65--81},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJESDF.2012.045391},
  doi          = {10.1504/IJESDF.2012.045391},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/VigilaM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/WangPW12,
  author       = {Yichen Wang and
                  Qiong Pu and
                  Shuhua Wu},
  title        = {Cryptanalysis and enhancements of delegation-based authentication
                  protocol for secure roaming service},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {4},
  number       = {4},
  pages        = {252--260},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJESDF.2012.049755},
  doi          = {10.1504/IJESDF.2012.049755},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/WangPW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}