default search action
Journal of Information Security and Applications, Volume 32
Volume 32, February 2017
- Susmita Mahato, Dilip Kumar Yadav, Danish Ali Khan:
A minesweeper game-based steganography scheme. 1-14 - Ankita Chaturvedi, Dheerendra Mishra, Srinivas Jangirala, Sourav Mukhopadhyay:
A privacy preserving biometric-based three-factor remote user authenticated key agreement scheme. 15-26 - Elisa Costante, Jerry den Hartog, Milan Petkovic, Sandro Etalle, Mykola Pechenizkiy:
A white-box anomaly-based framework for database leakage detection. 27-46 - Manish Kumar, Sunil Kumar, Rajat Budhiraja, Mrinal Kanti Das, Sanjeev Singh:
A cryptographic model based on logistic map and a 3-D matrix. 47-58 - A. H. M. Kamal, Mohammad Mahfuzul Islam:
Enhancing embedding capacity and stego image quality by employing multi predictors. 59-74
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.