Search dblp for Publications

export results for "toc:db/journals/ijipsi/ijipsi4.bht:"

 download as .bib file

@article{DBLP:journals/ijipsi/AlmobaideenJS20,
  author       = {Wesam Almobaideen and
                  Hebatullah Jarboua and
                  Khair Eddin Sabri},
  title        = {Searchable encryption architectures: survey of the literature and
                  proposing a unified architecture},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {4},
  number       = {4},
  pages        = {237--260},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJIPSI.2020.115508},
  doi          = {10.1504/IJIPSI.2020.115508},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/AlmobaideenJS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/BenarousK20,
  author       = {Leila Benarous and
                  Benamar Kadri},
  title        = {Hybrid pseudonym change strategy for location privacy in {VANET:}
                  protecting location privacy in {VANET}},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {4},
  number       = {3},
  pages        = {153--169},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJIPSI.2020.111455},
  doi          = {10.1504/IJIPSI.2020.111455},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/BenarousK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/Bose20,
  author       = {Subrata Bose},
  title        = {Commutative encryption: an answer to privacy protected query processing
                  of multi data sources},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {4},
  number       = {3},
  pages        = {170--202},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJIPSI.2020.111457},
  doi          = {10.1504/IJIPSI.2020.111457},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/Bose20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/LambaV20,
  author       = {Jyoti Lamba and
                  V. Ch. Venkaiah},
  title        = {Privacy-preserving frequent itemset mining in vertically partitioned
                  database using symmetric homomorphic encryption scheme},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {4},
  number       = {3},
  pages        = {203--225},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJIPSI.2020.111464},
  doi          = {10.1504/IJIPSI.2020.111464},
  timestamp    = {Fri, 18 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijipsi/LambaV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/Larson20,
  author       = {Ronald B. Larson},
  title        = {Privacy concerns and actions to reduce privacy risks},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {4},
  number       = {4},
  pages        = {314--333},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJIPSI.2020.115524},
  doi          = {10.1504/IJIPSI.2020.115524},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijipsi/Larson20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/MitropoulosGG20,
  author       = {Sarandis Mitropoulos and
                  Antonios Gouglidis and
                  Vasileios Giotsas},
  title        = {A categorisation of policy conflicts in distributed systems and network
                  management},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {4},
  number       = {4},
  pages        = {276--295},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJIPSI.2020.115520},
  doi          = {10.1504/IJIPSI.2020.115520},
  timestamp    = {Mon, 12 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/MitropoulosGG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/NgalamouS20,
  author       = {Lucien Ngalamou and
                  Harmony L. Schmidbauer},
  title        = {Combating and perpetuating bias: the relationship between bias and
                  computer science},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {4},
  number       = {4},
  pages        = {296--313},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJIPSI.2020.115523},
  doi          = {10.1504/IJIPSI.2020.115523},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/NgalamouS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/PawlaszczykWZH20,
  author       = {Dirk Pawlaszczyk and
                  Jannik Weber and
                  Ralf Zimmermann and
                  Christian Hummert},
  title        = {Android apps and advertising networks - a survey on data privacy},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {4},
  number       = {4},
  pages        = {261--275},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJIPSI.2020.115509},
  doi          = {10.1504/IJIPSI.2020.115509},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/PawlaszczykWZH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/Yen20,
  author       = {Chia{-}Sung Yen},
  title        = {The influence of product placement on {TV} news and journalists self-evaluation
                  of professionalism and private policy},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {4},
  number       = {3},
  pages        = {226--236},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJIPSI.2020.111466},
  doi          = {10.1504/IJIPSI.2020.111466},
  timestamp    = {Fri, 18 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijipsi/Yen20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/AlaouiM19,
  author       = {El Arbi Abdellaoui Alaoui and
                  Mustapha El Moudden},
  title        = {Security analysis for intelligent urban freight transport},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {4},
  number       = {1},
  pages        = {49--64},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJIPSI.2019.103552},
  doi          = {10.1504/IJIPSI.2019.103552},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/AlaouiM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/AnsahAA19,
  author       = {Albert Kofi Kwansah Ansah and
                  Daniel Adu{-}Gyamfi and
                  Stephen Anokye},
  title        = {BiSign: pairing-based anonymity in bitcoin cryptocurrency},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {4},
  number       = {2},
  pages        = {115--133},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJIPSI.2019.106598},
  doi          = {10.1504/IJIPSI.2019.106598},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/AnsahAA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/Aswakan19,
  author       = {Chonlathip Aswakan},
  title        = {Live event creation and management: case of King Bhumibol Adulyadej
                  mourning event},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {4},
  number       = {2},
  pages        = {94--101},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJIPSI.2019.106583},
  doi          = {10.1504/IJIPSI.2019.106583},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/Aswakan19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/BerdighOY19,
  author       = {Asmaa Berdigh and
                  Kenza Oufaska and
                  Khalid {El Yassini}},
  title        = {Connected car and CO\({}_{\mbox{2}}\) emission overview: solutions,
                  challenges and opportunities},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {4},
  number       = {1},
  pages        = {65--78},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJIPSI.2019.103553},
  doi          = {10.1504/IJIPSI.2019.103553},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/BerdighOY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/Kwakye19,
  author       = {Michael Mireku Kwakye},
  title        = {Privacy-preservation in data pre-processing for web usage mining},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {4},
  number       = {2},
  pages        = {134--152},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJIPSI.2019.106605},
  doi          = {10.1504/IJIPSI.2019.106605},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/Kwakye19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/MonjagapateR19,
  author       = {Jirayut Monjagapate and
                  Nakorn Rungkittanasan},
  title        = {The study of acceptance Thai LGBTQs in Bangkok: analysis of attitudes
                  from Gen-Z people},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {4},
  number       = {2},
  pages        = {102--114},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJIPSI.2019.106582},
  doi          = {10.1504/IJIPSI.2019.106582},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/MonjagapateR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/RimaniHA19,
  author       = {Rachid Rimani and
                  Naima Hadj{-}Said and
                  Adda Ali{-}Pacha},
  title        = {Proposition of a dynamic steganography system based on the chaos properties
                  and image registration for distributing an encryption key},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {4},
  number       = {2},
  pages        = {79--93},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJIPSI.2019.106573},
  doi          = {10.1504/IJIPSI.2019.106573},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/RimaniHA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/SaidiGA19,
  author       = {Hanane Saidi and
                  Driss Gretete and
                  Adnane Addaim},
  title        = {Survey: secure opportunistic routing protocols in wireless networks},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {4},
  number       = {1},
  pages        = {30--48},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJIPSI.2019.103550},
  doi          = {10.1504/IJIPSI.2019.103550},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/SaidiGA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/TiwariST19,
  author       = {Vikas Tiwari and
                  Ajeet Singh and
                  Appala Naidu Tentu},
  title        = {Differential cryptanalysis on {DES} cryptosystem up to eight rounds},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {4},
  number       = {1},
  pages        = {1--29},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJIPSI.2019.103560},
  doi          = {10.1504/IJIPSI.2019.103560},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/TiwariST19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}