Search dblp for Publications

export results for "toc:db/journals/istr/istr62.bht:"

 download as .bib file

@article{DBLP:journals/istr/MondalSHBAA21,
  author       = {Dipankar Kumar Mondal and
                  Bikash Chandra Singh and
                  Haibo Hu and
                  Shivazi Biswas and
                  Md. Zulfikar Alom and
                  Mohammad Abdul Azim},
  title        = {SeizeMaliciousURL: {A} novel learning approach to detect malicious
                  URLs},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {62},
  pages        = {102967},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102967},
  doi          = {10.1016/J.JISA.2021.102967},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/MondalSHBAA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MukherjeeSM21,
  author       = {Subhadip Mukherjee and
                  Sunita Sarkar and
                  Somnath Mukhopadhyay},
  title        = {Pencil shell matrix based image steganography with elevated embedding
                  capacity},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {62},
  pages        = {102955},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102955},
  doi          = {10.1016/J.JISA.2021.102955},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/MukherjeeSM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/NayarTE21,
  author       = {Gayathri R. Nayar and
                  Tony Thomas and
                  Sabu Emmanuel},
  title        = {Graph based secure cancelable palm vein biometrics},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {62},
  pages        = {102991},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102991},
  doi          = {10.1016/J.JISA.2021.102991},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/NayarTE21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Olukoya21,
  author       = {Oluwafemi Olukoya},
  title        = {Distilling blockchain requirements for digital investigation platforms},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {62},
  pages        = {102969},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102969},
  doi          = {10.1016/J.JISA.2021.102969},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Olukoya21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ParishST21,
  author       = {Zach Parish and
                  Amirali Salehi{-}Abari and
                  Julie Thorpe},
  title        = {A study on priming methods for graphical passwords},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {62},
  pages        = {102913},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102913},
  doi          = {10.1016/J.JISA.2021.102913},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/ParishST21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/PaulIS21,
  author       = {Mahit Kumar Paul and
                  Md. Rabiul Islam and
                  A. H. M. Sarowar Sattar},
  title        = {An efficient perturbation approach for multivariate data in sensitive
                  and reliable data mining},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {62},
  pages        = {102954},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102954},
  doi          = {10.1016/J.JISA.2021.102954},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/PaulIS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/RodriguezMBS21,
  author       = {Jes{\'{u}}s Garc{\'{\i}}a Rodr{\'{\i}}guez and
                  Rafael Torres Moreno and
                  Jorge Bernal Bernab{\'{e}} and
                  Antonio F. Skarmeta},
  title        = {Implementation and evaluation of a privacy-preserving distributed
                  {ABC} scheme based on multi-signatures},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {62},
  pages        = {102971},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102971},
  doi          = {10.1016/J.JISA.2021.102971},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/RodriguezMBS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SharmaJM21,
  author       = {Pratima Sharma and
                  Rajni Jindal and
                  Dutta Borah Malaya},
  title        = {Blockchain-based decentralized architecture for cloud storage system},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {62},
  pages        = {102970},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102970},
  doi          = {10.1016/J.JISA.2021.102970},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/SharmaJM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/TaftiMB21,
  author       = {Forough Sadat Mirkarimzade Tafti and
                  Shahriar Mohammadi and
                  Mehdi Babagoli},
  title        = {A new {NFC} mobile payment protocol using improved {GSM} based authentication},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {62},
  pages        = {102997},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102997},
  doi          = {10.1016/J.JISA.2021.102997},
  timestamp    = {Tue, 16 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/TaftiMB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/YangTL21,
  author       = {Ching{-}Nung Yang and
                  Po{-}Yu Tsai and
                  Yanxiao Liu},
  title        = {A (\emph{k, n}) secret document sharing with meaningful shares},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {62},
  pages        = {102973},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102973},
  doi          = {10.1016/J.JISA.2021.102973},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/YangTL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ZhangGGS21,
  author       = {Lei Zhang and
                  Yajun Guo and
                  Xiaowei Guo and
                  Xiaowei Shao},
  title        = {Does the layout of the Android unlock pattern affect the security
                  and usability of the password?},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {62},
  pages        = {103011},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.103011},
  doi          = {10.1016/J.JISA.2021.103011},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ZhangGGS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics