default search action
Search dblp for Publications
export results for "toc:db/journals/ijipsi/ijipsi3.bht:"
@article{DBLP:journals/ijipsi/AbdulsalamOA18, author = {Yunusa Simpa Abdulsalam and Olayemi Mikail Olaniyi and Aliyu Ahmed}, title = {Enhanced tiny encryption algorithm for secure electronic health authentication system}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {3}, number = {3}, pages = {230--252}, year = {2018}, url = {https://doi.org/10.1504/IJIPSI.2018.10013222}, doi = {10.1504/IJIPSI.2018.10013222}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/AbdulsalamOA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/BabyC18, author = {Vadlana Baby and N. Subhash Chandra}, title = {Privacy preserving association rule mining based on homomorphic computations}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {3}, number = {4}, pages = {268--283}, year = {2018}, url = {https://doi.org/10.1504/IJIPSI.2018.096135}, doi = {10.1504/IJIPSI.2018.096135}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/BabyC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/FernandezS18, author = {Alfredo Perez Fernandez and Guttorm Sindre}, title = {The privacy aware transmission highway framework}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {3}, number = {4}, pages = {327--350}, year = {2018}, url = {https://doi.org/10.1504/IJIPSI.2018.096156}, doi = {10.1504/IJIPSI.2018.096156}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/FernandezS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/MichotaK18, author = {Alexandra K. Michota and Sokratis K. Katsikas}, title = {Towards improving existing online social networks' privacy policies}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {3}, number = {3}, pages = {209--229}, year = {2018}, url = {https://doi.org/10.1504/IJIPSI.2018.10013220}, doi = {10.1504/IJIPSI.2018.10013220}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/MichotaK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/PlachkinovaA18, author = {Miloslava Plachkinova and Steven Andr{\'{e}}s}, title = {Towards an intercultural approach to information security}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {3}, number = {3}, pages = {155--186}, year = {2018}, url = {https://doi.org/10.1504/IJIPSI.2018.10013212}, doi = {10.1504/IJIPSI.2018.10013212}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/PlachkinovaA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/SailajaRC18, author = {Rayi Sailaja and Ch. Rupa and A. S. N. Chakravarthy}, title = {A novel integrated approach using Euclid's and fuzzy logic for secure communication}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {3}, number = {4}, pages = {253--267}, year = {2018}, url = {https://doi.org/10.1504/IJIPSI.2018.096131}, doi = {10.1504/IJIPSI.2018.096131}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijipsi/SailajaRC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/StewartD18, author = {James Stewart and Maurice E. Dawson}, title = {How the modification of personality traits leave one vulnerable to manipulation in social engineering}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {3}, number = {3}, pages = {187--208}, year = {2018}, url = {https://doi.org/10.1504/IJIPSI.2018.10013213}, doi = {10.1504/IJIPSI.2018.10013213}, timestamp = {Sun, 09 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/StewartD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/TibiGA18, author = {Moanes H. Tibi and Asmaa Ganayem and Khaled Asad}, title = {The privacy paradox in using Facebook among Arab teens: between declarations and behaviour}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {3}, number = {4}, pages = {310--326}, year = {2018}, url = {https://doi.org/10.1504/IJIPSI.2018.096155}, doi = {10.1504/IJIPSI.2018.096155}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/TibiGA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/WhiteDZ18, author = {Benjamin White and Jun Dai and Cui Zhang}, title = {An early detection tool in Eclipse to support secure coding practices}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {3}, number = {4}, pages = {284--309}, year = {2018}, url = {https://doi.org/10.1504/IJIPSI.2018.096142}, doi = {10.1504/IJIPSI.2018.096142}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/WhiteDZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/AljohaniSR17, author = {Nawaf Aljohani and Joseph Shelton and Kaushik Roy}, title = {A secure one time password protocol schema}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {3}, number = {2}, pages = {75--95}, year = {2017}, url = {https://doi.org/10.1504/IJIPSI.2017.10009577}, doi = {10.1504/IJIPSI.2017.10009577}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/AljohaniSR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/LiL17, author = {J. Jenny Li and Jing{-}Chiou Liou}, title = {An experiment of hit-and-run wireless attacks}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {3}, number = {1}, pages = {58--74}, year = {2017}, url = {https://doi.org/10.1504/IJIPSI.2017.10007837}, doi = {10.1504/IJIPSI.2017.10007837}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/LiL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/LiS17, author = {J. Jenny Li and Tony Savor}, title = {Automatic detection of DDoS attacks to notification services}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {3}, number = {1}, pages = {1--17}, year = {2017}, url = {https://doi.org/10.1504/IJIPSI.2017.10007832}, doi = {10.1504/IJIPSI.2017.10007832}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/LiS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/LockwoodC17, author = {Robert Lockwood and Kevin Curran}, title = {Text based steganography}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {3}, number = {2}, pages = {134--153}, year = {2017}, url = {https://doi.org/10.1504/IJIPSI.2017.10009581}, doi = {10.1504/IJIPSI.2017.10009581}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/LockwoodC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/Olakanmi17, author = {Oladayo Olufemi Olakanmi}, title = {Secure and privacy-oriented obfuscation scheme for smart metering in smart grid via dynamic aggregation and lightweight perturbation}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {3}, number = {1}, pages = {38--57}, year = {2017}, url = {https://doi.org/10.1504/IJIPSI.2017.10007836}, doi = {10.1504/IJIPSI.2017.10007836}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/Olakanmi17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/Patil17, author = {Kailas Patil}, title = {Isolating malicious content scripts of browser extensions}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {3}, number = {1}, pages = {18--37}, year = {2017}, url = {https://doi.org/10.1504/IJIPSI.2017.10007834}, doi = {10.1504/IJIPSI.2017.10007834}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/Patil17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/PonsRVVP17, author = {Alexander Perez{-}Pons and Andrew De La Rosa and Silvia Vidaurre and Luis Vargas and Eugene Pons}, title = {Security and privacy implications of 'do not track'}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {3}, number = {2}, pages = {117--133}, year = {2017}, url = {https://doi.org/10.1504/IJIPSI.2017.10009580}, doi = {10.1504/IJIPSI.2017.10009580}, timestamp = {Fri, 11 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijipsi/PonsRVVP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/SheltonJR17, author = {Joseph Shelton and John Jenkins and Kaushik Roy}, title = {Extending disposable feature templates for mitigating replay attacks}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {3}, number = {2}, pages = {96--116}, year = {2017}, url = {https://doi.org/10.1504/IJIPSI.2017.10009578}, doi = {10.1504/IJIPSI.2017.10009578}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/SheltonJR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.