default search action
Search dblp for Publications
export results for "toc:db/journals/isecure/isecure8.bht:"
@article{DBLP:journals/isecure/AminmansourS16, author = {Farzane Aminmansour and Hamid Reza Shahriari}, title = {Aggrandizing the beast's limbs: patulous code reuse attack on {ARM} architecture}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {8}, number = {1}, pages = {39--52}, year = {2016}, url = {https://doi.org/10.22042/isecure.2016.8.1.6}, doi = {10.22042/ISECURE.2016.8.1.6}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/AminmansourS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/Aref16, author = {Mohammad Reza Aref}, title = {Editorial}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {8}, number = {1}, pages = {1--2}, year = {2016}, url = {https://doi.org/10.22042/isecure.2015.8.1.7}, doi = {10.22042/ISECURE.2015.8.1.7}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/Aref16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/Aref16a, author = {Mohammad Reza Aref}, title = {Editorial}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {8}, number = {2}, pages = {91--92}, year = {2016}, url = {https://doi.org/10.22042/isecure.2016.8.2.7}, doi = {10.22042/ISECURE.2016.8.2.7}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/Aref16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/GhaemMaghamiHM16, author = {Seyed Salman Sajjadi GhaemMaghami and Afrooz Haghbin and Mahtab Mirmohseni}, title = {Traceability improvements of a new {RFID} protocol based on {EPC} {C1} {G2}}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {8}, number = {2}, pages = {105--114}, year = {2016}, url = {https://doi.org/10.22042/isecure.2016.8.2.2}, doi = {10.22042/ISECURE.2016.8.2.2}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/GhaemMaghamiHM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/KamareiPF16, author = {Meisam Kamarei and Ahmad Patooghy and Mahdi Fazeli}, title = {Unauthenticated event detection in wireless sensor networks using sensors co-coverage}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {8}, number = {1}, pages = {61--71}, year = {2016}, url = {https://doi.org/10.22042/isecure.2016.8.1.4}, doi = {10.22042/ISECURE.2016.8.1.4}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/KamareiPF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/KhalesiBM16, author = {Akram Khalesi and Hossein Bahramgiri and Davod Mansuri}, title = {A new method for accelerating impossible differential cryptanalysis and its application on LBlock}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {8}, number = {1}, pages = {73--84}, year = {2016}, url = {https://doi.org/10.22042/isecure.2016.8.1.5}, doi = {10.22042/ISECURE.2016.8.1.5}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/KhalesiBM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/KhorasganiAPEA16, author = {Hamidreza Amini Khorasgani and Saba Asaad and Hossein Pilaram and Taraneh Eghlidos and Mohammad Reza Aref}, title = {On the design and security of a lattice-based threshold secret sharing scheme}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {8}, number = {1}, pages = {25--38}, year = {2016}, url = {https://doi.org/10.22042/isecure.2016.8.1.2}, doi = {10.22042/ISECURE.2016.8.1.2}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/KhorasganiAPEA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/PourpounehR16, author = {Mohsen Pourpouneh and Rasoul Ramezanian}, title = {A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {8}, number = {1}, pages = {3--24}, year = {2016}, url = {https://doi.org/10.22042/isecure.2016.8.1.1}, doi = {10.22042/ISECURE.2016.8.1.1}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/PourpounehR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/RezapourAA16, author = {Taha Yasin Rezapour and Reza Ebrahimi Atani and Meer Soheil Abolghasemi}, title = {A novel key management scheme for heterogeneous sensor networks based on the position of nodes}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {8}, number = {2}, pages = {115--130}, year = {2016}, url = {https://doi.org/10.22042/isecure.2016.8.2.3}, doi = {10.22042/ISECURE.2016.8.2.3}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/RezapourAA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/SafkhaniB16, author = {Masoumeh Safkhani and Nasour Bagheri}, title = {A note on the security of two improved {RFID} protocols}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {8}, number = {2}, pages = {155--160}, year = {2016}, url = {https://doi.org/10.22042/isecure.2016.8.2.6}, doi = {10.22042/ISECURE.2016.8.2.6}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/SafkhaniB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/SedaghatbafA16, author = {Ali Sedaghatbaf and Mohammad Abdollahi Azgomi}, title = {Quantitative evaluation of software security: an approach based on UML/SecAM and evidence theory}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {8}, number = {2}, pages = {141--153}, year = {2016}, url = {https://doi.org/10.22042/isecure.2016.8.2.5}, doi = {10.22042/ISECURE.2016.8.2.5}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/SedaghatbafA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/Zamanzadeh016, author = {Sharareh Zamanzadeh and Ali Jahanian}, title = {Self authentication path insertion in FPGA-based design flow for tamper-resistant purpose}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {8}, number = {1}, pages = {53--60}, year = {2016}, url = {https://doi.org/10.22042/isecure.2016.8.1.3}, doi = {10.22042/ISECURE.2016.8.1.3}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/Zamanzadeh016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/Zamanzadeh016a, author = {Sharareh Zamanzadeh and Ali Jahanian}, title = {{ASIC} design protection against reverse engineering during the fabrication process using automatic netlist obfuscation design flow}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {8}, number = {2}, pages = {93--104}, year = {2016}, url = {https://doi.org/10.22042/isecure.2016.8.2.1}, doi = {10.22042/ISECURE.2016.8.2.1}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/Zamanzadeh016a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/ZarmehiA16, author = {Nematollah Zarmehi and Mohammad Reza Aref}, title = {Optimum decoder for multiplicative spread spectrum image watermarking with Laplacian modeling}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {8}, number = {2}, pages = {131--139}, year = {2016}, url = {https://doi.org/10.22042/isecure.2016.8.2.4}, doi = {10.22042/ISECURE.2016.8.2.4}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/ZarmehiA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.