Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/ijesdf/ijesdf3.bht:"
@article{DBLP:journals/ijesdf/CaldeiraMS10, author = {Filipe Caldeira and Edmundo Monteiro and Paulo Sim{\~{o}}es}, title = {Trust and reputation management for critical infrastructure protection}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {3}, number = {3}, pages = {187--203}, year = {2010}, url = {https://doi.org/10.1504/IJESDF.2010.038282}, doi = {10.1504/IJESDF.2010.038282}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/CaldeiraMS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/ChenM10, author = {Liqun Chen and Chris J. Mitchell}, title = {Parsing ambiguities in authentication and key establishment protocols}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {3}, number = {1}, pages = {82--94}, year = {2010}, url = {https://doi.org/10.1504/IJESDF.2010.032333}, doi = {10.1504/IJESDF.2010.032333}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/ChenM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/Desoky10, author = {Abdelrahman Desoky}, title = {Headstega: e-mail-headers-based steganography methodology}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {3}, number = {4}, pages = {289--310}, year = {2010}, url = {https://doi.org/10.1504/IJESDF.2010.038611}, doi = {10.1504/IJESDF.2010.038611}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/Desoky10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/Dutta10, author = {Malay Kishore Dutta}, title = {Perceptible watermarking: a promising application}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {3}, number = {4}, pages = {363--375}, year = {2010}, url = {https://doi.org/10.1504/IJESDF.2010.038614}, doi = {10.1504/IJESDF.2010.038614}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/Dutta10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/GarrityW10, author = {Sean Garrity and George R. S. Weir}, title = {Balancing the threat of personal technology in the workplace}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {3}, number = {1}, pages = {73--81}, year = {2010}, url = {https://doi.org/10.1504/IJESDF.2010.032332}, doi = {10.1504/IJESDF.2010.032332}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/GarrityW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/GeorgiadisPK10, author = {Christos K. Georgiadis and Elias Pimenidis and Ioannis Kokkinidis}, title = {A coloured Petri net analysis of the Transaction Internet Protocol}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {3}, number = {3}, pages = {204--222}, year = {2010}, url = {https://doi.org/10.1504/IJESDF.2010.038283}, doi = {10.1504/IJESDF.2010.038283}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/GeorgiadisPK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/HeCZ10, author = {Debiao He and Jianhua Chen and Rui Zhang}, title = {Weaknesses of a dynamic ID-based remote user authentication scheme}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {3}, number = {4}, pages = {355--362}, year = {2010}, url = {https://doi.org/10.1504/IJESDF.2010.038613}, doi = {10.1504/IJESDF.2010.038613}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/HeCZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/IbrahimZ10, author = {Fawzy Ibrahim and M. Zaki}, title = {Design and implementation of a block-based lossless watermarking scheme}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {3}, number = {2}, pages = {164--185}, year = {2010}, url = {https://doi.org/10.1504/IJESDF.2010.033784}, doi = {10.1504/IJESDF.2010.033784}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/IbrahimZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/KarantjiasP10, author = {Athanasios Karantjias and Nineta Polemi}, title = {Assessment of advanced cryptographic antiviral techniques}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {3}, number = {1}, pages = {60--72}, year = {2010}, url = {https://doi.org/10.1504/IJESDF.2010.032331}, doi = {10.1504/IJESDF.2010.032331}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/KarantjiasP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/KarthigaikumarB10, author = {P. Karthigaikumar and K. Baskaran}, title = {Hardware implementation of invisible image watermarking algorithm using secured binary image authentication technique}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {3}, number = {4}, pages = {333--354}, year = {2010}, url = {https://doi.org/10.1504/IJESDF.2010.038615}, doi = {10.1504/IJESDF.2010.038615}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/KarthigaikumarB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/KuzmaPH10, author = {Joanne Kuzma and Colin B. Price and Richard N. Henson}, title = {Flash vulnerabilities analysis of {US} educational websites}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {3}, number = {2}, pages = {95--107}, year = {2010}, url = {https://doi.org/10.1504/IJESDF.2010.033779}, doi = {10.1504/IJESDF.2010.033779}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/KuzmaPH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/MagalhaesSSJ10, author = {S{\'{e}}rgio Tenreiro de Magalh{\~{a}}es and Henrique M. Dinis Santos and Leonel Duarte Dos Santos and Hamid Jahankhani}, title = {Cyberwar and the Russian Federation: the usual suspect}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {3}, number = {2}, pages = {151--163}, year = {2010}, url = {https://doi.org/10.1504/IJESDF.2010.033783}, doi = {10.1504/IJESDF.2010.033783}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/MagalhaesSSJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/MartinsM10, author = {Tiago Martins and S{\'{e}}rgio Tenreiro de Magalh{\~{a}}es}, title = {Baby crying acceptance in Portugal}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {3}, number = {3}, pages = {278--287}, year = {2010}, url = {https://doi.org/10.1504/IJESDF.2010.038289}, doi = {10.1504/IJESDF.2010.038289}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/MartinsM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/MuttooK10, author = {Sunil Kumar Muttoo and Vinay Kumar}, title = {Hamiltonian graph approach to steganography}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {3}, number = {4}, pages = {311--332}, year = {2010}, url = {https://doi.org/10.1504/IJESDF.2010.038612}, doi = {10.1504/IJESDF.2010.038612}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/MuttooK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/PereiraS10, author = {Teresa Susana Mendes Pereira and Henrique M. Dinis Santos}, title = {An audit framework to support information system security management}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {3}, number = {3}, pages = {265--277}, year = {2010}, url = {https://doi.org/10.1504/IJESDF.2010.038288}, doi = {10.1504/IJESDF.2010.038288}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/PereiraS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/PerumalN10, author = {Sundresan Perumal and Norita Md Norwawi}, title = {Integrated computer forensic investigation model based on Malaysian standards}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {3}, number = {2}, pages = {108--119}, year = {2010}, url = {https://doi.org/10.1504/IJESDF.2010.033780}, doi = {10.1504/IJESDF.2010.033780}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/PerumalN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/Pimenta10, author = {Jos{\'{e}} Miguel Pimenta}, title = {The new strategic concept of {NATO:} the Portuguese role}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {3}, number = {3}, pages = {234--239}, year = {2010}, url = {https://doi.org/10.1504/IJESDF.2010.038285}, doi = {10.1504/IJESDF.2010.038285}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/Pimenta10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/RashedS10, author = {Abdullah Abdali Rashed and Henrique M. Dinis Santos}, title = {User acceptance {OTM} machine: in the Arab culture}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {3}, number = {3}, pages = {240--248}, year = {2010}, url = {https://doi.org/10.1504/IJESDF.2010.038286}, doi = {10.1504/IJESDF.2010.038286}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/RashedS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/ReisingTM10, author = {Donald R. Reising and Michael A. Temple and Michael J. Mendenhall}, title = {Improved wireless security for GMSK-based devices using {RF} fingerprinting}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {3}, number = {1}, pages = {41--59}, year = {2010}, url = {https://doi.org/10.1504/IJESDF.2010.032330}, doi = {10.1504/IJESDF.2010.032330}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/ReisingTM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/SaarelainenJ10, author = {Tapio Saarelainen and Jorma Jormakka}, title = {Interfacing collaboration and command tools for crises management military command and control systems}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {3}, number = {3}, pages = {249--264}, year = {2010}, url = {https://doi.org/10.1504/IJESDF.2010.038287}, doi = {10.1504/IJESDF.2010.038287}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/SaarelainenJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/SahooT10, author = {Gadadhar Sahoo and Rajesh Kumar Tiwari}, title = {Some new methodologies for secured data coding and transmission}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {3}, number = {2}, pages = {120--137}, year = {2010}, url = {https://doi.org/10.1504/IJESDF.2010.033781}, doi = {10.1504/IJESDF.2010.033781}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/SahooT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/TaheriniaJ10, author = {Amirhossein Taherinia and Mansour Jamzad}, title = {A new spread spectrum watermarking method using two levels {DCT}}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {3}, number = {1}, pages = {1--26}, year = {2010}, url = {https://doi.org/10.1504/IJESDF.2010.032328}, doi = {10.1504/IJESDF.2010.032328}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/TaheriniaJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/TiwariS10, author = {Rajesh Kumar Tiwari and Gadadhar Sahoo}, title = {A new methodology for data coding and embedding for high-capacity transmitting}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {3}, number = {1}, pages = {27--40}, year = {2010}, url = {https://doi.org/10.1504/IJESDF.2010.032329}, doi = {10.1504/IJESDF.2010.032329}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/TiwariS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/WeirM10, author = {George R. S. Weir and Michael Morran}, title = {Hiding the hidden message: approaches to textual steganography}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {3}, number = {3}, pages = {223--233}, year = {2010}, url = {https://doi.org/10.1504/IJESDF.2010.038284}, doi = {10.1504/IJESDF.2010.038284}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/WeirM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/WuH10, author = {Raymond Wu and Masayuki Hisada}, title = {Static and dynamic analysis for web security in industry applications}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {3}, number = {2}, pages = {138--150}, year = {2010}, url = {https://doi.org/10.1504/IJESDF.2010.033782}, doi = {10.1504/IJESDF.2010.033782}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/WuH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.