Search dblp for Publications

export results for "toc:db/journals/ijesdf/ijesdf3.bht:"

 download as .bib file

@article{DBLP:journals/ijesdf/CaldeiraMS10,
  author       = {Filipe Caldeira and
                  Edmundo Monteiro and
                  Paulo Sim{\~{o}}es},
  title        = {Trust and reputation management for critical infrastructure protection},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {3},
  number       = {3},
  pages        = {187--203},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJESDF.2010.038282},
  doi          = {10.1504/IJESDF.2010.038282},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/CaldeiraMS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/ChenM10,
  author       = {Liqun Chen and
                  Chris J. Mitchell},
  title        = {Parsing ambiguities in authentication and key establishment protocols},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {3},
  number       = {1},
  pages        = {82--94},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJESDF.2010.032333},
  doi          = {10.1504/IJESDF.2010.032333},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/ChenM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/Desoky10,
  author       = {Abdelrahman Desoky},
  title        = {Headstega: e-mail-headers-based steganography methodology},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {3},
  number       = {4},
  pages        = {289--310},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJESDF.2010.038611},
  doi          = {10.1504/IJESDF.2010.038611},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/Desoky10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/Dutta10,
  author       = {Malay Kishore Dutta},
  title        = {Perceptible watermarking: a promising application},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {3},
  number       = {4},
  pages        = {363--375},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJESDF.2010.038614},
  doi          = {10.1504/IJESDF.2010.038614},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/Dutta10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/GarrityW10,
  author       = {Sean Garrity and
                  George R. S. Weir},
  title        = {Balancing the threat of personal technology in the workplace},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {3},
  number       = {1},
  pages        = {73--81},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJESDF.2010.032332},
  doi          = {10.1504/IJESDF.2010.032332},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/GarrityW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/GeorgiadisPK10,
  author       = {Christos K. Georgiadis and
                  Elias Pimenidis and
                  Ioannis Kokkinidis},
  title        = {A coloured Petri net analysis of the Transaction Internet Protocol},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {3},
  number       = {3},
  pages        = {204--222},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJESDF.2010.038283},
  doi          = {10.1504/IJESDF.2010.038283},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/GeorgiadisPK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/HeCZ10,
  author       = {Debiao He and
                  Jianhua Chen and
                  Rui Zhang},
  title        = {Weaknesses of a dynamic ID-based remote user authentication scheme},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {3},
  number       = {4},
  pages        = {355--362},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJESDF.2010.038613},
  doi          = {10.1504/IJESDF.2010.038613},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/HeCZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/IbrahimZ10,
  author       = {Fawzy Ibrahim and
                  M. Zaki},
  title        = {Design and implementation of a block-based lossless watermarking scheme},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {3},
  number       = {2},
  pages        = {164--185},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJESDF.2010.033784},
  doi          = {10.1504/IJESDF.2010.033784},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/IbrahimZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/KarantjiasP10,
  author       = {Athanasios Karantjias and
                  Nineta Polemi},
  title        = {Assessment of advanced cryptographic antiviral techniques},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {3},
  number       = {1},
  pages        = {60--72},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJESDF.2010.032331},
  doi          = {10.1504/IJESDF.2010.032331},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/KarantjiasP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/KarthigaikumarB10,
  author       = {P. Karthigaikumar and
                  K. Baskaran},
  title        = {Hardware implementation of invisible image watermarking algorithm
                  using secured binary image authentication technique},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {3},
  number       = {4},
  pages        = {333--354},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJESDF.2010.038615},
  doi          = {10.1504/IJESDF.2010.038615},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/KarthigaikumarB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/KuzmaPH10,
  author       = {Joanne Kuzma and
                  Colin B. Price and
                  Richard N. Henson},
  title        = {Flash vulnerabilities analysis of {US} educational websites},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {3},
  number       = {2},
  pages        = {95--107},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJESDF.2010.033779},
  doi          = {10.1504/IJESDF.2010.033779},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/KuzmaPH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/MagalhaesSSJ10,
  author       = {S{\'{e}}rgio Tenreiro de Magalh{\~{a}}es and
                  Henrique M. Dinis Santos and
                  Leonel Duarte Dos Santos and
                  Hamid Jahankhani},
  title        = {Cyberwar and the Russian Federation: the usual suspect},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {3},
  number       = {2},
  pages        = {151--163},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJESDF.2010.033783},
  doi          = {10.1504/IJESDF.2010.033783},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/MagalhaesSSJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/MartinsM10,
  author       = {Tiago Martins and
                  S{\'{e}}rgio Tenreiro de Magalh{\~{a}}es},
  title        = {Baby crying acceptance in Portugal},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {3},
  number       = {3},
  pages        = {278--287},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJESDF.2010.038289},
  doi          = {10.1504/IJESDF.2010.038289},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/MartinsM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/MuttooK10,
  author       = {Sunil Kumar Muttoo and
                  Vinay Kumar},
  title        = {Hamiltonian graph approach to steganography},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {3},
  number       = {4},
  pages        = {311--332},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJESDF.2010.038612},
  doi          = {10.1504/IJESDF.2010.038612},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/MuttooK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/PereiraS10,
  author       = {Teresa Susana Mendes Pereira and
                  Henrique M. Dinis Santos},
  title        = {An audit framework to support information system security management},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {3},
  number       = {3},
  pages        = {265--277},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJESDF.2010.038288},
  doi          = {10.1504/IJESDF.2010.038288},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/PereiraS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/PerumalN10,
  author       = {Sundresan Perumal and
                  Norita Md Norwawi},
  title        = {Integrated computer forensic investigation model based on Malaysian
                  standards},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {3},
  number       = {2},
  pages        = {108--119},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJESDF.2010.033780},
  doi          = {10.1504/IJESDF.2010.033780},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/PerumalN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/Pimenta10,
  author       = {Jos{\'{e}} Miguel Pimenta},
  title        = {The new strategic concept of {NATO:} the Portuguese role},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {3},
  number       = {3},
  pages        = {234--239},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJESDF.2010.038285},
  doi          = {10.1504/IJESDF.2010.038285},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/Pimenta10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/RashedS10,
  author       = {Abdullah Abdali Rashed and
                  Henrique M. Dinis Santos},
  title        = {User acceptance {OTM} machine: in the Arab culture},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {3},
  number       = {3},
  pages        = {240--248},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJESDF.2010.038286},
  doi          = {10.1504/IJESDF.2010.038286},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/RashedS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/ReisingTM10,
  author       = {Donald R. Reising and
                  Michael A. Temple and
                  Michael J. Mendenhall},
  title        = {Improved wireless security for GMSK-based devices using {RF} fingerprinting},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {3},
  number       = {1},
  pages        = {41--59},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJESDF.2010.032330},
  doi          = {10.1504/IJESDF.2010.032330},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/ReisingTM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/SaarelainenJ10,
  author       = {Tapio Saarelainen and
                  Jorma Jormakka},
  title        = {Interfacing collaboration and command tools for crises management
                  military command and control systems},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {3},
  number       = {3},
  pages        = {249--264},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJESDF.2010.038287},
  doi          = {10.1504/IJESDF.2010.038287},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/SaarelainenJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/SahooT10,
  author       = {Gadadhar Sahoo and
                  Rajesh Kumar Tiwari},
  title        = {Some new methodologies for secured data coding and transmission},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {3},
  number       = {2},
  pages        = {120--137},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJESDF.2010.033781},
  doi          = {10.1504/IJESDF.2010.033781},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/SahooT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/TaheriniaJ10,
  author       = {Amirhossein Taherinia and
                  Mansour Jamzad},
  title        = {A new spread spectrum watermarking method using two levels {DCT}},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {3},
  number       = {1},
  pages        = {1--26},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJESDF.2010.032328},
  doi          = {10.1504/IJESDF.2010.032328},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/TaheriniaJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/TiwariS10,
  author       = {Rajesh Kumar Tiwari and
                  Gadadhar Sahoo},
  title        = {A new methodology for data coding and embedding for high-capacity
                  transmitting},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {3},
  number       = {1},
  pages        = {27--40},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJESDF.2010.032329},
  doi          = {10.1504/IJESDF.2010.032329},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/TiwariS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/WeirM10,
  author       = {George R. S. Weir and
                  Michael Morran},
  title        = {Hiding the hidden message: approaches to textual steganography},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {3},
  number       = {3},
  pages        = {223--233},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJESDF.2010.038284},
  doi          = {10.1504/IJESDF.2010.038284},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/WeirM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/WuH10,
  author       = {Raymond Wu and
                  Masayuki Hisada},
  title        = {Static and dynamic analysis for web security in industry applications},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {3},
  number       = {2},
  pages        = {138--150},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJESDF.2010.033782},
  doi          = {10.1504/IJESDF.2010.033782},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/WuH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics