Search dblp for Publications

export results for "toc:db/journals/isecure/isecure8.bht:"

 download as .bib file

@article{DBLP:journals/isecure/AminmansourS16,
  author       = {Farzane Aminmansour and
                  Hamid Reza Shahriari},
  title        = {Aggrandizing the beast's limbs: patulous code reuse attack on {ARM}
                  architecture},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {8},
  number       = {1},
  pages        = {39--52},
  year         = {2016},
  url          = {https://doi.org/10.22042/isecure.2016.8.1.6},
  doi          = {10.22042/ISECURE.2016.8.1.6},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/AminmansourS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/Aref16,
  author       = {Mohammad Reza Aref},
  title        = {Editorial},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {8},
  number       = {1},
  pages        = {1--2},
  year         = {2016},
  url          = {https://doi.org/10.22042/isecure.2015.8.1.7},
  doi          = {10.22042/ISECURE.2015.8.1.7},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/Aref16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/Aref16a,
  author       = {Mohammad Reza Aref},
  title        = {Editorial},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {8},
  number       = {2},
  pages        = {91--92},
  year         = {2016},
  url          = {https://doi.org/10.22042/isecure.2016.8.2.7},
  doi          = {10.22042/ISECURE.2016.8.2.7},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/Aref16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/GhaemMaghamiHM16,
  author       = {Seyed Salman Sajjadi GhaemMaghami and
                  Afrooz Haghbin and
                  Mahtab Mirmohseni},
  title        = {Traceability improvements of a new {RFID} protocol based on {EPC}
                  {C1} {G2}},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {8},
  number       = {2},
  pages        = {105--114},
  year         = {2016},
  url          = {https://doi.org/10.22042/isecure.2016.8.2.2},
  doi          = {10.22042/ISECURE.2016.8.2.2},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/GhaemMaghamiHM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/KamareiPF16,
  author       = {Meisam Kamarei and
                  Ahmad Patooghy and
                  Mahdi Fazeli},
  title        = {Unauthenticated event detection in wireless sensor networks using
                  sensors co-coverage},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {8},
  number       = {1},
  pages        = {61--71},
  year         = {2016},
  url          = {https://doi.org/10.22042/isecure.2016.8.1.4},
  doi          = {10.22042/ISECURE.2016.8.1.4},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/KamareiPF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/KhalesiBM16,
  author       = {Akram Khalesi and
                  Hossein Bahramgiri and
                  Davod Mansuri},
  title        = {A new method for accelerating impossible differential cryptanalysis
                  and its application on LBlock},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {8},
  number       = {1},
  pages        = {73--84},
  year         = {2016},
  url          = {https://doi.org/10.22042/isecure.2016.8.1.5},
  doi          = {10.22042/ISECURE.2016.8.1.5},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/KhalesiBM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/KhorasganiAPEA16,
  author       = {Hamidreza Amini Khorasgani and
                  Saba Asaad and
                  Hossein Pilaram and
                  Taraneh Eghlidos and
                  Mohammad Reza Aref},
  title        = {On the design and security of a lattice-based threshold secret sharing
                  scheme},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {8},
  number       = {1},
  pages        = {25--38},
  year         = {2016},
  url          = {https://doi.org/10.22042/isecure.2016.8.1.2},
  doi          = {10.22042/ISECURE.2016.8.1.2},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/KhorasganiAPEA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/PourpounehR16,
  author       = {Mohsen Pourpouneh and
                  Rasoul Ramezanian},
  title        = {A short introduction to two approaches in formal verification of security
                  protocols: model checking and theorem proving},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {8},
  number       = {1},
  pages        = {3--24},
  year         = {2016},
  url          = {https://doi.org/10.22042/isecure.2016.8.1.1},
  doi          = {10.22042/ISECURE.2016.8.1.1},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/PourpounehR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/RezapourAA16,
  author       = {Taha Yasin Rezapour and
                  Reza Ebrahimi Atani and
                  Meer Soheil Abolghasemi},
  title        = {A novel key management scheme for heterogeneous sensor networks based
                  on the position of nodes},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {8},
  number       = {2},
  pages        = {115--130},
  year         = {2016},
  url          = {https://doi.org/10.22042/isecure.2016.8.2.3},
  doi          = {10.22042/ISECURE.2016.8.2.3},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/RezapourAA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/SafkhaniB16,
  author       = {Masoumeh Safkhani and
                  Nasour Bagheri},
  title        = {A note on the security of two improved {RFID} protocols},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {8},
  number       = {2},
  pages        = {155--160},
  year         = {2016},
  url          = {https://doi.org/10.22042/isecure.2016.8.2.6},
  doi          = {10.22042/ISECURE.2016.8.2.6},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/SafkhaniB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/SedaghatbafA16,
  author       = {Ali Sedaghatbaf and
                  Mohammad Abdollahi Azgomi},
  title        = {Quantitative evaluation of software security: an approach based on
                  UML/SecAM and evidence theory},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {8},
  number       = {2},
  pages        = {141--153},
  year         = {2016},
  url          = {https://doi.org/10.22042/isecure.2016.8.2.5},
  doi          = {10.22042/ISECURE.2016.8.2.5},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/SedaghatbafA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/Zamanzadeh016,
  author       = {Sharareh Zamanzadeh and
                  Ali Jahanian},
  title        = {Self authentication path insertion in FPGA-based design flow for tamper-resistant
                  purpose},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {8},
  number       = {1},
  pages        = {53--60},
  year         = {2016},
  url          = {https://doi.org/10.22042/isecure.2016.8.1.3},
  doi          = {10.22042/ISECURE.2016.8.1.3},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/Zamanzadeh016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/Zamanzadeh016a,
  author       = {Sharareh Zamanzadeh and
                  Ali Jahanian},
  title        = {{ASIC} design protection against reverse engineering during the fabrication
                  process using automatic netlist obfuscation design flow},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {8},
  number       = {2},
  pages        = {93--104},
  year         = {2016},
  url          = {https://doi.org/10.22042/isecure.2016.8.2.1},
  doi          = {10.22042/ISECURE.2016.8.2.1},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/Zamanzadeh016a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/ZarmehiA16,
  author       = {Nematollah Zarmehi and
                  Mohammad Reza Aref},
  title        = {Optimum decoder for multiplicative spread spectrum image watermarking
                  with Laplacian modeling},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {8},
  number       = {2},
  pages        = {131--139},
  year         = {2016},
  url          = {https://doi.org/10.22042/isecure.2016.8.2.4},
  doi          = {10.22042/ISECURE.2016.8.2.4},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/ZarmehiA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics