default search action
Search dblp for Publications
export results for "toc:db/journals/ijipsi/ijipsi4.bht:"
@article{DBLP:journals/ijipsi/AlmobaideenJS20, author = {Wesam Almobaideen and Hebatullah Jarboua and Khair Eddin Sabri}, title = {Searchable encryption architectures: survey of the literature and proposing a unified architecture}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {4}, number = {4}, pages = {237--260}, year = {2020}, url = {https://doi.org/10.1504/IJIPSI.2020.115508}, doi = {10.1504/IJIPSI.2020.115508}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/AlmobaideenJS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/BenarousK20, author = {Leila Benarous and Benamar Kadri}, title = {Hybrid pseudonym change strategy for location privacy in {VANET:} protecting location privacy in {VANET}}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {4}, number = {3}, pages = {153--169}, year = {2020}, url = {https://doi.org/10.1504/IJIPSI.2020.111455}, doi = {10.1504/IJIPSI.2020.111455}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/BenarousK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/Bose20, author = {Subrata Bose}, title = {Commutative encryption: an answer to privacy protected query processing of multi data sources}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {4}, number = {3}, pages = {170--202}, year = {2020}, url = {https://doi.org/10.1504/IJIPSI.2020.111457}, doi = {10.1504/IJIPSI.2020.111457}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/Bose20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/LambaV20, author = {Jyoti Lamba and V. Ch. Venkaiah}, title = {Privacy-preserving frequent itemset mining in vertically partitioned database using symmetric homomorphic encryption scheme}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {4}, number = {3}, pages = {203--225}, year = {2020}, url = {https://doi.org/10.1504/IJIPSI.2020.111464}, doi = {10.1504/IJIPSI.2020.111464}, timestamp = {Fri, 18 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijipsi/LambaV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/Larson20, author = {Ronald B. Larson}, title = {Privacy concerns and actions to reduce privacy risks}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {4}, number = {4}, pages = {314--333}, year = {2020}, url = {https://doi.org/10.1504/IJIPSI.2020.115524}, doi = {10.1504/IJIPSI.2020.115524}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijipsi/Larson20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/MitropoulosGG20, author = {Sarandis Mitropoulos and Antonios Gouglidis and Vasileios Giotsas}, title = {A categorisation of policy conflicts in distributed systems and network management}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {4}, number = {4}, pages = {276--295}, year = {2020}, url = {https://doi.org/10.1504/IJIPSI.2020.115520}, doi = {10.1504/IJIPSI.2020.115520}, timestamp = {Mon, 12 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/MitropoulosGG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/NgalamouS20, author = {Lucien Ngalamou and Harmony L. Schmidbauer}, title = {Combating and perpetuating bias: the relationship between bias and computer science}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {4}, number = {4}, pages = {296--313}, year = {2020}, url = {https://doi.org/10.1504/IJIPSI.2020.115523}, doi = {10.1504/IJIPSI.2020.115523}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/NgalamouS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/PawlaszczykWZH20, author = {Dirk Pawlaszczyk and Jannik Weber and Ralf Zimmermann and Christian Hummert}, title = {Android apps and advertising networks - a survey on data privacy}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {4}, number = {4}, pages = {261--275}, year = {2020}, url = {https://doi.org/10.1504/IJIPSI.2020.115509}, doi = {10.1504/IJIPSI.2020.115509}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/PawlaszczykWZH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/Yen20, author = {Chia{-}Sung Yen}, title = {The influence of product placement on {TV} news and journalists self-evaluation of professionalism and private policy}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {4}, number = {3}, pages = {226--236}, year = {2020}, url = {https://doi.org/10.1504/IJIPSI.2020.111466}, doi = {10.1504/IJIPSI.2020.111466}, timestamp = {Fri, 18 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijipsi/Yen20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/AlaouiM19, author = {El Arbi Abdellaoui Alaoui and Mustapha El Moudden}, title = {Security analysis for intelligent urban freight transport}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {4}, number = {1}, pages = {49--64}, year = {2019}, url = {https://doi.org/10.1504/IJIPSI.2019.103552}, doi = {10.1504/IJIPSI.2019.103552}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/AlaouiM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/AnsahAA19, author = {Albert Kofi Kwansah Ansah and Daniel Adu{-}Gyamfi and Stephen Anokye}, title = {BiSign: pairing-based anonymity in bitcoin cryptocurrency}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {4}, number = {2}, pages = {115--133}, year = {2019}, url = {https://doi.org/10.1504/IJIPSI.2019.106598}, doi = {10.1504/IJIPSI.2019.106598}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/AnsahAA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/Aswakan19, author = {Chonlathip Aswakan}, title = {Live event creation and management: case of King Bhumibol Adulyadej mourning event}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {4}, number = {2}, pages = {94--101}, year = {2019}, url = {https://doi.org/10.1504/IJIPSI.2019.106583}, doi = {10.1504/IJIPSI.2019.106583}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/Aswakan19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/BerdighOY19, author = {Asmaa Berdigh and Kenza Oufaska and Khalid {El Yassini}}, title = {Connected car and CO\({}_{\mbox{2}}\) emission overview: solutions, challenges and opportunities}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {4}, number = {1}, pages = {65--78}, year = {2019}, url = {https://doi.org/10.1504/IJIPSI.2019.103553}, doi = {10.1504/IJIPSI.2019.103553}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/BerdighOY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/Kwakye19, author = {Michael Mireku Kwakye}, title = {Privacy-preservation in data pre-processing for web usage mining}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {4}, number = {2}, pages = {134--152}, year = {2019}, url = {https://doi.org/10.1504/IJIPSI.2019.106605}, doi = {10.1504/IJIPSI.2019.106605}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/Kwakye19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/MonjagapateR19, author = {Jirayut Monjagapate and Nakorn Rungkittanasan}, title = {The study of acceptance Thai LGBTQs in Bangkok: analysis of attitudes from Gen-Z people}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {4}, number = {2}, pages = {102--114}, year = {2019}, url = {https://doi.org/10.1504/IJIPSI.2019.106582}, doi = {10.1504/IJIPSI.2019.106582}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/MonjagapateR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/RimaniHA19, author = {Rachid Rimani and Naima Hadj{-}Said and Adda Ali{-}Pacha}, title = {Proposition of a dynamic steganography system based on the chaos properties and image registration for distributing an encryption key}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {4}, number = {2}, pages = {79--93}, year = {2019}, url = {https://doi.org/10.1504/IJIPSI.2019.106573}, doi = {10.1504/IJIPSI.2019.106573}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/RimaniHA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/SaidiGA19, author = {Hanane Saidi and Driss Gretete and Adnane Addaim}, title = {Survey: secure opportunistic routing protocols in wireless networks}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {4}, number = {1}, pages = {30--48}, year = {2019}, url = {https://doi.org/10.1504/IJIPSI.2019.103550}, doi = {10.1504/IJIPSI.2019.103550}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/SaidiGA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/TiwariST19, author = {Vikas Tiwari and Ajeet Singh and Appala Naidu Tentu}, title = {Differential cryptanalysis on {DES} cryptosystem up to eight rounds}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {4}, number = {1}, pages = {1--29}, year = {2019}, url = {https://doi.org/10.1504/IJIPSI.2019.103560}, doi = {10.1504/IJIPSI.2019.103560}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/TiwariST19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.