default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 23 matches
- 2018
- Amita, Amandeep Kaur, Marut Kumar:
Reversible data hiding in absolute moment block truncation coding compressed images using adaptive multilevel histogram shifting technique. Int. J. Inf. Comput. Secur. 10(2/3): 261-275 (2018) - Muhammad Azeem, Yongquan Cai, Allah Ditta, Khurram Gulzar Rana, Faheem Akhtar Rajpoot:
Information hiding: a novel algorithm for enhancement of cover text capacity by using unicode characters. Int. J. Inf. Comput. Secur. 10(4): 437-453 (2018) - Aniruddha Bhattacharjya, Xiaofeng Zhong, Jing Wang:
An end-to-end user two-way authenticated double encrypted messaging scheme based on hybrid RSA for the future internet architectures. Int. J. Inf. Comput. Secur. 10(1): 63-79 (2018) - Aniruddha Bhattacharjya, Xiaofeng Zhong, Jing Wang, Xing Li:
Hybrid RSA-based highly efficient, reliable and strong personal full mesh networked messaging scheme. Int. J. Inf. Comput. Secur. 10(4): 418-436 (2018) - Ross Gore, Saikou Y. Diallo, Jose J. Padilla, Barry Ezell:
Assessing cyber-incidents using machine learning. Int. J. Inf. Comput. Secur. 10(4): 341-360 (2018) - Shashank Gupta, Brij Bhooshan Gupta:
Robust injection point-based framework for modern applications against XSS vulnerabilities in online social networks. Int. J. Inf. Comput. Secur. 10(2/3): 170-200 (2018) - H. S. Hota, Dinesh K. Sharma, Akhilesh Kumar Shrivas:
Development of an efficient classifier using proposed sensitivity-based feature selection technique for intrusion detection system. Int. J. Inf. Comput. Secur. 10(1): 80-101 (2018) - Ankit Kumar Jain, Brij B. Gupta:
Detection of phishing attacks in financial and e-banking websites using link and visual similarity relation. Int. J. Inf. Comput. Secur. 10(4): 398-417 (2018) - Dulal C. Kar, Anusha Madhuri Nakka, Ajay K. Katangur:
A new statistical attack resilient steganography scheme for hiding messages in audio files. Int. J. Inf. Comput. Secur. 10(2/3): 276-302 (2018) - C. Pavan Kumar, R. Selvakumar, Raghunadh K. Bhattar:
Reliable and secure communication using fundamental cut-sets and fundamental circuits. Int. J. Inf. Comput. Secur. 10(1): 41-62 (2018) - Shaojing Li, Wanli Su:
The research of reputation incentive mechanism of P2P network file sharing system. Int. J. Inf. Comput. Secur. 10(2/3): 149-169 (2018) - Vandana Mohindru, Yashwant Singh:
Node authentication algorithm for securing static wireless sensor networks from node clone attack. Int. J. Inf. Comput. Secur. 10(2/3): 129-148 (2018) - Sunil K. Moon, Rajeshree D. Raut:
Innovative data security model using forensic audio video steganography for improving hidden data security and robustness. Int. J. Inf. Comput. Secur. 10(4): 374-397 (2018) - Soufiane El Moumni, Mohamed Fettach, Abderrahim Tragha:
High frequency implementation of cryptographic hash function Keccak-512 on FPGA devices. Int. J. Inf. Comput. Secur. 10(4): 361-373 (2018) - Arup Kumar Pal, Soumitra Roy:
A robust and blind image watermarking scheme in DCT domain. Int. J. Inf. Comput. Secur. 10(4): 321-340 (2018) - Sanchita Pathak, Ratnakirti Roy, Suvamoy Changder:
Performance analysis of image steganalysis techniques and future research directives. Int. J. Inf. Comput. Secur. 10(1): 1-24 (2018) - Rohit Raja, Tilendra Shishir Sinha, Raj Kumar Patra, Shrikant Tiwari:
Physiological trait-based biometrical authentication of human-face using LGXP and ANN techniques. Int. J. Inf. Comput. Secur. 10(2/3): 303-320 (2018) - Sujarani Rajendran, Manivannan Doraipandian:
A nonlinear two dimensional logistic-tent map for secure image communication. Int. J. Inf. Comput. Secur. 10(2/3): 201-215 (2018) - Soumitra Roy, Arup Kumar Pal:
A robust reversible image watermarking scheme in DCT domain using Arnold scrambling and histogram modification. Int. J. Inf. Comput. Secur. 10(2/3): 216-236 (2018) - Muhammad Shafiq, Xiangzhan Yu, Asif Ali Laghari:
WeChat traffic classification using machine learning algorithms and comparative analysis of datasets. Int. J. Inf. Comput. Secur. 10(2/3): 109-128 (2018) - Lihua Song, Xiaofeng Zhang:
Improved pixel relevance based on Mahalanobis distance for image segmentation. Int. J. Inf. Comput. Secur. 10(2/3): 237-247 (2018) - M. Sumana, K. S. Hareesha:
Modelling a secure support vector machine classifier for private data. Int. J. Inf. Comput. Secur. 10(1): 25-40 (2018) - Yujuan Sun, Xiaofeng Zhang, Muwei Jian:
3D reconstruction of human face from an input image under random lighting condition. Int. J. Inf. Comput. Secur. 10(2/3): 248-260 (2018)
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-10-05 18:56 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint