![](https://dblp.dagstuhl.de/img/logo.320x120.png)
![search dblp search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
![search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
default search action
Journal of Information Security and Applications, Volume 32
Volume 32, February 2017
- Susmita Mahato
, Dilip Kumar Yadav
, Danish Ali Khan
:
A minesweeper game-based steganography scheme. 1-14 - Ankita Chaturvedi, Dheerendra Mishra
, Srinivas Jangirala
, Sourav Mukhopadhyay:
A privacy preserving biometric-based three-factor remote user authenticated key agreement scheme. 15-26 - Elisa Costante, Jerry den Hartog, Milan Petkovic, Sandro Etalle, Mykola Pechenizkiy
:
A white-box anomaly-based framework for database leakage detection. 27-46 - Manish Kumar, Sunil Kumar
, Rajat Budhiraja, Mrinal Kanti Das, Sanjeev Singh:
A cryptographic model based on logistic map and a 3-D matrix. 47-58 - A. H. M. Kamal
, Mohammad Mahfuzul Islam:
Enhancing embedding capacity and stego image quality by employing multi predictors. 59-74
![](https://dblp.dagstuhl.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.