default search action
Search dblp for Publications
export results for "toc:db/journals/ijesdf/ijesdf4.bht:"
@article{DBLP:journals/ijesdf/DamascenoTC12, author = {Marcelo Damasceno and Jerffeson Teixeira and Gustavo A. L. de Campos}, title = {A prediction model for criminal levels using socio-criminal data}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {4}, number = {2/3}, pages = {201--214}, year = {2012}, url = {https://doi.org/10.1504/IJESDF.2012.048414}, doi = {10.1504/IJESDF.2012.048414}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/DamascenoTC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/GranadilloMHD12, author = {Gustavo {Gonzalez Granadillo} and Yosra Ben Mustapha and Nabil Hachem and Herv{\'{e}} Debar}, title = {An ontology-driven approach to model {SIEM} information and operations using the {SWRL} formalism}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {4}, number = {2/3}, pages = {104--123}, year = {2012}, url = {https://doi.org/10.1504/IJESDF.2012.048412}, doi = {10.1504/IJESDF.2012.048412}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/GranadilloMHD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/HeC12, author = {Debiao He and Jianhua Chen}, title = {Cryptanalysis of a three-party password-based authenticated key exchange protocol using Weil pairing}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {4}, number = {4}, pages = {244--251}, year = {2012}, url = {https://doi.org/10.1504/IJESDF.2012.049754}, doi = {10.1504/IJESDF.2012.049754}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/HeC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/HeH12, author = {Debiao He and Yin Huang}, title = {Weaknesses in a dynamic ID-based remote user authentication scheme for multi-server environment}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {4}, number = {1}, pages = {43--53}, year = {2012}, url = {https://doi.org/10.1504/IJESDF.2012.045389}, doi = {10.1504/IJESDF.2012.045389}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/HeH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/JannatiF12, author = {Hoda Jannati and Abolfazl Falahati}, title = {Security enhanced user authentication scheme for wireless sensor network}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {4}, number = {4}, pages = {215--228}, year = {2012}, url = {https://doi.org/10.1504/IJESDF.2012.049735}, doi = {10.1504/IJESDF.2012.049735}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/JannatiF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/JolfaeiVM12, author = {Alireza Jolfaei and Ahmadreza Vizandan and Abdolrasoul Mirghadri}, title = {Image encryption using {HC-128} and {HC-256} stream ciphers}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {4}, number = {1}, pages = {19--42}, year = {2012}, url = {https://doi.org/10.1504/IJESDF.2012.045388}, doi = {10.1504/IJESDF.2012.045388}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/JolfaeiVM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/KarayianniKG12, author = {Stavroula Karayianni and Vasilios Katos and Christos K. Georgiadis}, title = {A framework for password harvesting from volatile memory}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {4}, number = {2/3}, pages = {154--163}, year = {2012}, url = {https://doi.org/10.1504/IJESDF.2012.048411}, doi = {10.1504/IJESDF.2012.048411}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/KarayianniKG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/KoukiouA12, author = {Georgia Koukiou and Vassilis Anastassopoulos}, title = {Drunk person identification using thermal infrared images}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {4}, number = {4}, pages = {229--243}, year = {2012}, url = {https://doi.org/10.1504/IJESDF.2012.049747}, doi = {10.1504/IJESDF.2012.049747}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/KoukiouA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/Kuzma12, author = {Joanne Kuzma}, title = {Children and geotagged images: quantitative analysis for security risk assessment}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {4}, number = {1}, pages = {54--64}, year = {2012}, url = {https://doi.org/10.1504/IJESDF.2012.045390}, doi = {10.1504/IJESDF.2012.045390}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/Kuzma12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/MavridouZDP12, author = {Anastasia Mavridou and Victor Zhou and Jerald Dawkins and Mauricio Papa}, title = {A situational awareness framework for securing the smart grid using monitoring sensors and threat models}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {4}, number = {2/3}, pages = {138--153}, year = {2012}, url = {https://doi.org/10.1504/IJESDF.2012.048417}, doi = {10.1504/IJESDF.2012.048417}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/MavridouZDP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/MukhtarAAVJ12, author = {Rabiu Mukhtar and Ameer Al{-}Nemrat and Mamoun Alazab and Sitalakshmi Venkatraman and Hamid Jahankhani}, title = {Analysis of firewall log-based detection scenarios for evidence in digital forensics}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {4}, number = {4}, pages = {261--279}, year = {2012}, url = {https://doi.org/10.1504/IJESDF.2012.049761}, doi = {10.1504/IJESDF.2012.049761}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/MukhtarAAVJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/NtouskasPP12, author = {Theodoros Ntouskas and Dimitrios Papanikas and Nineta Polemi}, title = {Trusted collaborative services for the {IT} security management of SMEs/mEs}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {4}, number = {2/3}, pages = {124--137}, year = {2012}, url = {https://doi.org/10.1504/IJESDF.2012.048413}, doi = {10.1504/IJESDF.2012.048413}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/NtouskasPP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/SaBMS12, author = {V{\'{\i}}tor J. S{\'{a}} and Daniela Borges and S{\'{e}}rgio Tenreiro de Magalh{\~{a}}es and Henrique M. Dinis Santos}, title = {Biometric technologies and their perception by the common citizen}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {4}, number = {2/3}, pages = {187--200}, year = {2012}, url = {https://doi.org/10.1504/IJESDF.2012.048418}, doi = {10.1504/IJESDF.2012.048418}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/SaBMS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/ShankarSN12, author = {T. N. Shankar and Gadadhar Sahoo and S. Niranjan}, title = {Steganographic manipulations with elliptic curve cryptography}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {4}, number = {4}, pages = {280--297}, year = {2012}, url = {https://doi.org/10.1504/IJESDF.2012.049762}, doi = {10.1504/IJESDF.2012.049762}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/ShankarSN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/SridharP12, author = {Laavanya Sridhar and V. Lakshmi Prabha}, title = {{RF} authenticated protection scheme for SRAM-based {FPGA} {IP} cores}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {4}, number = {1}, pages = {82--100}, year = {2012}, url = {https://doi.org/10.1504/IJESDF.2012.045392}, doi = {10.1504/IJESDF.2012.045392}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/SridharP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/Tait12, author = {Bobby L. Tait}, title = {Applied Fletcher-Munson curve algorithm for improved voice recognition}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {4}, number = {2/3}, pages = {178--186}, year = {2012}, url = {https://doi.org/10.1504/IJESDF.2012.048421}, doi = {10.1504/IJESDF.2012.048421}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/Tait12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/Tiwari12, author = {Rajesh Kumar Tiwari}, title = {High capacity and secured methodologies for steganography}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {4}, number = {1}, pages = {1--18}, year = {2012}, url = {https://doi.org/10.1504/IJESDF.2012.045387}, doi = {10.1504/IJESDF.2012.045387}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/Tiwari12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/TsiakisKG12, author = {Theodosios Tsiakis and Panagiotis Katsaros and Dimitris Gritzalis}, title = {Economic assessment of externalities for interactive audio media anti-SPIT protection of internet services}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {4}, number = {2/3}, pages = {164--177}, year = {2012}, url = {https://doi.org/10.1504/IJESDF.2012.048416}, doi = {10.1504/IJESDF.2012.048416}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/TsiakisKG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/VigilaM12, author = {S. Maria Celestin Vigila and K. Muneeswaran}, title = {Key generation based on elliptic curve over finite prime field}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {4}, number = {1}, pages = {65--81}, year = {2012}, url = {https://doi.org/10.1504/IJESDF.2012.045391}, doi = {10.1504/IJESDF.2012.045391}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/VigilaM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/WangPW12, author = {Yichen Wang and Qiong Pu and Shuhua Wu}, title = {Cryptanalysis and enhancements of delegation-based authentication protocol for secure roaming service}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {4}, number = {4}, pages = {252--260}, year = {2012}, url = {https://doi.org/10.1504/IJESDF.2012.049755}, doi = {10.1504/IJESDF.2012.049755}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/WangPW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.