Search dblp for Publications

export results for "toc:db/journals/ijipsi/ijipsi3.bht:"

 download as .bib file

@article{DBLP:journals/ijipsi/AbdulsalamOA18,
  author       = {Yunusa Simpa Abdulsalam and
                  Olayemi Mikail Olaniyi and
                  Aliyu Ahmed},
  title        = {Enhanced tiny encryption algorithm for secure electronic health authentication
                  system},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {3},
  number       = {3},
  pages        = {230--252},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJIPSI.2018.10013222},
  doi          = {10.1504/IJIPSI.2018.10013222},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/AbdulsalamOA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/BabyC18,
  author       = {Vadlana Baby and
                  N. Subhash Chandra},
  title        = {Privacy preserving association rule mining based on homomorphic computations},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {3},
  number       = {4},
  pages        = {268--283},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJIPSI.2018.096135},
  doi          = {10.1504/IJIPSI.2018.096135},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/BabyC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/FernandezS18,
  author       = {Alfredo Perez Fernandez and
                  Guttorm Sindre},
  title        = {The privacy aware transmission highway framework},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {3},
  number       = {4},
  pages        = {327--350},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJIPSI.2018.096156},
  doi          = {10.1504/IJIPSI.2018.096156},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/FernandezS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/MichotaK18,
  author       = {Alexandra K. Michota and
                  Sokratis K. Katsikas},
  title        = {Towards improving existing online social networks' privacy policies},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {3},
  number       = {3},
  pages        = {209--229},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJIPSI.2018.10013220},
  doi          = {10.1504/IJIPSI.2018.10013220},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/MichotaK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/PlachkinovaA18,
  author       = {Miloslava Plachkinova and
                  Steven Andr{\'{e}}s},
  title        = {Towards an intercultural approach to information security},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {3},
  number       = {3},
  pages        = {155--186},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJIPSI.2018.10013212},
  doi          = {10.1504/IJIPSI.2018.10013212},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/PlachkinovaA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/SailajaRC18,
  author       = {Rayi Sailaja and
                  Ch. Rupa and
                  A. S. N. Chakravarthy},
  title        = {A novel integrated approach using Euclid's and fuzzy logic for secure
                  communication},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {3},
  number       = {4},
  pages        = {253--267},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJIPSI.2018.096131},
  doi          = {10.1504/IJIPSI.2018.096131},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijipsi/SailajaRC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/StewartD18,
  author       = {James Stewart and
                  Maurice E. Dawson},
  title        = {How the modification of personality traits leave one vulnerable to
                  manipulation in social engineering},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {3},
  number       = {3},
  pages        = {187--208},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJIPSI.2018.10013213},
  doi          = {10.1504/IJIPSI.2018.10013213},
  timestamp    = {Sun, 09 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/StewartD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/TibiGA18,
  author       = {Moanes H. Tibi and
                  Asmaa Ganayem and
                  Khaled Asad},
  title        = {The privacy paradox in using Facebook among Arab teens: between declarations
                  and behaviour},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {3},
  number       = {4},
  pages        = {310--326},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJIPSI.2018.096155},
  doi          = {10.1504/IJIPSI.2018.096155},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/TibiGA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/WhiteDZ18,
  author       = {Benjamin White and
                  Jun Dai and
                  Cui Zhang},
  title        = {An early detection tool in Eclipse to support secure coding practices},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {3},
  number       = {4},
  pages        = {284--309},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJIPSI.2018.096142},
  doi          = {10.1504/IJIPSI.2018.096142},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/WhiteDZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/AljohaniSR17,
  author       = {Nawaf Aljohani and
                  Joseph Shelton and
                  Kaushik Roy},
  title        = {A secure one time password protocol schema},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {3},
  number       = {2},
  pages        = {75--95},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJIPSI.2017.10009577},
  doi          = {10.1504/IJIPSI.2017.10009577},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/AljohaniSR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/LiL17,
  author       = {J. Jenny Li and
                  Jing{-}Chiou Liou},
  title        = {An experiment of hit-and-run wireless attacks},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {3},
  number       = {1},
  pages        = {58--74},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJIPSI.2017.10007837},
  doi          = {10.1504/IJIPSI.2017.10007837},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/LiL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/LiS17,
  author       = {J. Jenny Li and
                  Tony Savor},
  title        = {Automatic detection of DDoS attacks to notification services},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {3},
  number       = {1},
  pages        = {1--17},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJIPSI.2017.10007832},
  doi          = {10.1504/IJIPSI.2017.10007832},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/LiS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/LockwoodC17,
  author       = {Robert Lockwood and
                  Kevin Curran},
  title        = {Text based steganography},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {3},
  number       = {2},
  pages        = {134--153},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJIPSI.2017.10009581},
  doi          = {10.1504/IJIPSI.2017.10009581},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/LockwoodC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/Olakanmi17,
  author       = {Oladayo Olufemi Olakanmi},
  title        = {Secure and privacy-oriented obfuscation scheme for smart metering
                  in smart grid via dynamic aggregation and lightweight perturbation},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {3},
  number       = {1},
  pages        = {38--57},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJIPSI.2017.10007836},
  doi          = {10.1504/IJIPSI.2017.10007836},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/Olakanmi17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/Patil17,
  author       = {Kailas Patil},
  title        = {Isolating malicious content scripts of browser extensions},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {3},
  number       = {1},
  pages        = {18--37},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJIPSI.2017.10007834},
  doi          = {10.1504/IJIPSI.2017.10007834},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/Patil17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/PonsRVVP17,
  author       = {Alexander Perez{-}Pons and
                  Andrew De La Rosa and
                  Silvia Vidaurre and
                  Luis Vargas and
                  Eugene Pons},
  title        = {Security and privacy implications of 'do not track'},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {3},
  number       = {2},
  pages        = {117--133},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJIPSI.2017.10009580},
  doi          = {10.1504/IJIPSI.2017.10009580},
  timestamp    = {Fri, 11 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijipsi/PonsRVVP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/SheltonJR17,
  author       = {Joseph Shelton and
                  John Jenkins and
                  Kaushik Roy},
  title        = {Extending disposable feature templates for mitigating replay attacks},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {3},
  number       = {2},
  pages        = {96--116},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJIPSI.2017.10009578},
  doi          = {10.1504/IJIPSI.2017.10009578},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/SheltonJR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}