Search dblp for Publications

export results for "toc:db/journals/istr/istr57.bht:"

 download as .bib file

@article{DBLP:journals/istr/ChaSKP21,
  author       = {Jeonghun Cha and
                  Sushil Kumar Singh and
                  Tae Woo Kim and
                  Jong Hyuk Park},
  title        = {Blockchain-empowered cloud architecture based on secret sharing for
                  smart city},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {57},
  pages        = {102686},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102686},
  doi          = {10.1016/J.JISA.2020.102686},
  timestamp    = {Mon, 16 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ChaSKP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/CherifiOA21,
  author       = {Feriel Cherifi and
                  Mawloud Omar and
                  Kamal Amroun},
  title        = {An efficient biometric-based continuous authentication scheme with
                  {HMM} prehensile movements modeling},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {57},
  pages        = {102739},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102739},
  doi          = {10.1016/J.JISA.2020.102739},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/CherifiOA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HaberfeldHL21,
  author       = {Carl Haberfeld and
                  Md. Shafaeat Hossain and
                  Lisa Lancor},
  title        = {Open code biometric tap pad for smartphones},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {57},
  pages        = {102688},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102688},
  doi          = {10.1016/J.JISA.2020.102688},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/HaberfeldHL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HongF21,
  author       = {Yuxiang Hong and
                  Steven Furnell},
  title        = {Understanding cybersecurity behavioral habits: Insights from situational
                  support},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {57},
  pages        = {102710},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102710},
  doi          = {10.1016/J.JISA.2020.102710},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/HongF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Mitchell21,
  author       = {Chris J. Mitchell},
  title        = {Yet another insecure group key distribution scheme using secret sharing},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {57},
  pages        = {102713},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102713},
  doi          = {10.1016/J.JISA.2020.102713},
  timestamp    = {Fri, 29 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/Mitchell21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Trujillo-Rasua21,
  author       = {Rolando Trujillo{-}Rasua},
  title        = {Secure memory erasure in the presence of man-in-the-middle attackers},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {57},
  pages        = {102730},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102730},
  doi          = {10.1016/J.JISA.2020.102730},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Trujillo-Rasua21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/XueYHWL21,
  author       = {Mingfu Xue and
                  Chengxiang Yuan and
                  Can He and
                  Jian Wang and
                  Weiqiang Liu},
  title        = {NaturalAE: Natural and robust physical adversarial examples for object
                  detectors},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {57},
  pages        = {102694},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102694},
  doi          = {10.1016/J.JISA.2020.102694},
  timestamp    = {Wed, 22 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/XueYHWL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/YaminUUK21,
  author       = {Muhammad Mudassar Yamin and
                  Mohib Ullah and
                  Habib Ullah and
                  Basel Katt},
  title        = {Weaponized {AI} for cyber attacks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {57},
  pages        = {102722},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2020.102722},
  doi          = {10.1016/J.JISA.2020.102722},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/YaminUUK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}