Works matching IS 16874161 AND DT 2016 AND VI 2016
Results: 26
Fuzzing binaries with Lévy flight swarms.
- Published in:
- EURASIP Journal on Information Security, 2016, v. 2016, n. 1, p. 1, doi. 10.1186/s13635-016-0052-1
- By:
- Publication type:
- Article
Guest editorial special issues on security trends in mobile cloud computing, web, and social networking.
- Published in:
- 2016
- By:
- Publication type:
- Editorial
Unlinkable improved multi-biometric iris fuzzy vault.
- Published in:
- EURASIP Journal on Information Security, 2016, v. 2016, n. 1, p. 1, doi. 10.1186/s13635-016-0049-9
- By:
- Publication type:
- Article
Identification performance of evidential value estimation for ridge-based biometrics.
- Published in:
- EURASIP Journal on Information Security, 2016, v. 2016, n. 1, p. 1, doi. 10.1186/s13635-016-0050-3
- By:
- Publication type:
- Article
Quality-based iris segmentation-level fusion.
- Published in:
- EURASIP Journal on Information Security, 2016, v. 2016, n. 1, p. 1, doi. 10.1186/s13635-016-0048-x
- By:
- Publication type:
- Article
Double JPEG compression forensics based on a convolutional neural network.
- Published in:
- EURASIP Journal on Information Security, 2016, v. 2016, n. 1, p. 1, doi. 10.1186/s13635-016-0047-y
- By:
- Publication type:
- Article
DST approach to enhance audio quality on lost audio packet steganography.
- Published in:
- EURASIP Journal on Information Security, 2016, v. 2016, n. 1, p. 1, doi. 10.1186/s13635-016-0046-z
- By:
- Publication type:
- Article
Adaptive identity and access management-contextual data based policies.
- Published in:
- EURASIP Journal on Information Security, 2016, v. 2016, n. 1, p. 1, doi. 10.1186/s13635-016-0043-2
- By:
- Publication type:
- Article
The role and security of firewalls in cyber-physical cloud computing.
- Published in:
- EURASIP Journal on Information Security, 2016, v. 2016, n. 1, p. 1, doi. 10.1186/s13635-016-0042-3
- By:
- Publication type:
- Article
A flexible framework for mobile device forensics based on cold boot attacks.
- Published in:
- EURASIP Journal on Information Security, 2016, v. 2016, n. 1, p. 1, doi. 10.1186/s13635-016-0041-4
- By:
- Publication type:
- Article
DB-SECaaS: a cloud-based protection system for document-oriented NoSQL databases.
- Published in:
- EURASIP Journal on Information Security, 2016, v. 2016, n. 1, p. 1, doi. 10.1186/s13635-016-0040-5
- By:
- Publication type:
- Article
Experimental comparison of simulation tools for efficient cloud and mobile cloud computing applications.
- Published in:
- EURASIP Journal on Information Security, 2016, v. 2016, n. 1, p. 1, doi. 10.1186/s13635-016-0039-y
- By:
- Publication type:
- Article
An adaptive approach for Linux memory analysis based on kernel code reconstruction.
- Published in:
- EURASIP Journal on Information Security, 2016, v. 2016, n. 1, p. 1, doi. 10.1186/s13635-016-0038-z
- By:
- Publication type:
- Article
A secure cloud storage system combining time-based one-time password and automatic blocker protocol.
- Published in:
- EURASIP Journal on Information Security, 2016, v. 2016, n. 1, p. 1, doi. 10.1186/s13635-016-0037-0
- By:
- Publication type:
- Article
Generalized weighted tree similarity algorithms for taxonomy trees.
- Published in:
- EURASIP Journal on Information Security, 2016, v. 2016, n. 1, p. 1, doi. 10.1186/s13635-016-0035-2
- By:
- Publication type:
- Article
An efficient privacy-preserving comparison protocol in smart metering systems.
- Published in:
- EURASIP Journal on Information Security, 2016, v. 2016, n. 1, p. 1, doi. 10.1186/s13635-016-0033-4
- By:
- Publication type:
- Article
ASIC implementation of random number generators using SR latches and its evaluation.
- Published in:
- EURASIP Journal on Information Security, 2016, v. 2016, n. 1, p. 1, doi. 10.1186/s13635-016-0036-1
- By:
- Publication type:
- Article
A novel approach to protect against phishing attacks at client side using auto-updated white-list.
- Published in:
- EURASIP Journal on Information Security, 2016, v. 2016, n. 1, p. 1, doi. 10.1186/s13635-016-0034-3
- By:
- Publication type:
- Article
Software control and intellectual property protection in cyber-physical systems.
- Published in:
- EURASIP Journal on Information Security, 2016, v. 2016, p. 1, doi. 10.1186/s13635-016-0032-5
- By:
- Publication type:
- Article
A new usage control protocol for data protection of cloud environment.
- Published in:
- EURASIP Journal on Information Security, 2016, v. 2016, p. 1, doi. 10.1186/s13635-016-0031-6
- By:
- Publication type:
- Article
HTTPS traffic analysis and client identification using passive SSL/TLS fingerprinting.
- Published in:
- EURASIP Journal on Information Security, 2016, v. 2016, p. 1, doi. 10.1186/s13635-016-0030-7
- By:
- Publication type:
- Article
Secured ECG signal transmission for human emotional stress classification in wireless body area networks.
- Published in:
- EURASIP Journal on Information Security, 2016, v. 2016, p. 1, doi. 10.1186/s13635-015-0024-x
- By:
- Publication type:
- Article
A landmark calibration-based IP geolocation approach.
- Published in:
- EURASIP Journal on Information Security, 2016, v. 2016, p. 1, doi. 10.1186/s13635-015-0029-5
- By:
- Publication type:
- Article
Combating online fraud attacks in mobile-based advertising.
- Published in:
- EURASIP Journal on Information Security, 2016, v. 2016, p. 1, doi. 10.1186/s13635-015-0027-7
- By:
- Publication type:
- Article
Markov process-based retrieval for encrypted JPEG images.
- Published in:
- EURASIP Journal on Information Security, 2016, v. 2016, p. 1, doi. 10.1186/s13635-015-0028-6
- By:
- Publication type:
- Article
Asymptotics of fingerprinting and group testing: capacity-achieving log-likelihood decoders.
- Published in:
- EURASIP Journal on Information Security, 2016, v. 2016, p. 1, doi. 10.1186/s13635-015-0026-8
- By:
- Publication type:
- Article