default search action
Search dblp for Publications
export results for "toc:db/journals/ijisec/ijisec12.bht:"
@article{DBLP:journals/ijisec/Abbadi13, author = {Imad M. Abbadi}, title = {A framework for establishing trust in Cloud provenance}, journal = {Int. J. Inf. Sec.}, volume = {12}, number = {2}, pages = {111--128}, year = {2013}, url = {https://doi.org/10.1007/s10207-012-0179-0}, doi = {10.1007/S10207-012-0179-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/Abbadi13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/AbeCHO13, author = {Masayuki Abe and Sherman S. M. Chow and Kristiyan Haralambiev and Miyako Ohkubo}, title = {Double-trapdoor anonymous tags for traceable signatures}, journal = {Int. J. Inf. Sec.}, volume = {12}, number = {1}, pages = {19--31}, year = {2013}, url = {https://doi.org/10.1007/s10207-012-0184-3}, doi = {10.1007/S10207-012-0184-3}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/AbeCHO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/AlsalehO13, author = {Mansour Alsaleh and Paul C. van Oorschot}, title = {Evaluation in the absence of absolute ground truth: toward reliable evaluation methodology for scan detectors}, journal = {Int. J. Inf. Sec.}, volume = {12}, number = {2}, pages = {97--110}, year = {2013}, url = {https://doi.org/10.1007/s10207-012-0178-1}, doi = {10.1007/S10207-012-0178-1}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/AlsalehO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/AsgharLPW13, author = {Hassan Jameel Asghar and Shujun Li and Josef Pieprzyk and Huaxiong Wang}, title = {Cryptanalysis of the convex hull click human identification protocol}, journal = {Int. J. Inf. Sec.}, volume = {12}, number = {2}, pages = {83--96}, year = {2013}, url = {https://doi.org/10.1007/s10207-012-0161-x}, doi = {10.1007/S10207-012-0161-X}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/AsgharLPW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/BeauquierCL13, author = {Dani{\`{e}}le Beauquier and Jo{\"{e}}lle Cohen and Ruggero Lanotte}, title = {Security policies enforcement using finite and pushdown edit automata}, journal = {Int. J. Inf. Sec.}, volume = {12}, number = {4}, pages = {319--336}, year = {2013}, url = {https://doi.org/10.1007/s10207-013-0195-8}, doi = {10.1007/S10207-013-0195-8}, timestamp = {Tue, 06 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/BeauquierCL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/BernhardFGSW13, author = {David Bernhard and Georg Fuchsbauer and Essam Ghadafi and Nigel P. Smart and Bogdan Warinschi}, title = {Anonymous attestation with user-controlled linkability}, journal = {Int. J. Inf. Sec.}, volume = {12}, number = {3}, pages = {219--249}, year = {2013}, url = {https://doi.org/10.1007/s10207-013-0191-z}, doi = {10.1007/S10207-013-0191-Z}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/BernhardFGSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/BoteanuF13, author = {Daniel Boteanu and Jos{\'{e}} M. Fernandez}, title = {A comprehensive study of queue management as a DoS counter-measure}, journal = {Int. J. Inf. Sec.}, volume = {12}, number = {5}, pages = {347--382}, year = {2013}, url = {https://doi.org/10.1007/s10207-013-0197-6}, doi = {10.1007/S10207-013-0197-6}, timestamp = {Thu, 21 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/BoteanuF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/BressonCRFG13, author = {Emmanuel Bresson and Dario Catalano and Mario Di Raimondo and Dario Fiore and Rosario Gennaro}, title = {Off-line/on-line signatures revisited: a general unifying paradigm, efficient threshold variants and experimental results}, journal = {Int. J. Inf. Sec.}, volume = {12}, number = {6}, pages = {439--465}, year = {2013}, url = {https://doi.org/10.1007/s10207-013-0200-2}, doi = {10.1007/S10207-013-0200-2}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/BressonCRFG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/BrzuskaFSWW13, author = {Christina Brzuska and Marc Fischlin and Nigel P. Smart and Bogdan Warinschi and Stephen C. Williams}, title = {Less is more: relaxed yet composable security notions for key exchange}, journal = {Int. J. Inf. Sec.}, volume = {12}, number = {4}, pages = {267--297}, year = {2013}, url = {https://doi.org/10.1007/s10207-013-0192-y}, doi = {10.1007/S10207-013-0192-Y}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/BrzuskaFSWW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/CatalanoRFGP13, author = {Dario Catalano and Mario Di Raimondo and Dario Fiore and Rosario Gennaro and Orazio Puglisi}, title = {Fully non-interactive onion routing with forward secrecy}, journal = {Int. J. Inf. Sec.}, volume = {12}, number = {1}, pages = {33--47}, year = {2013}, url = {https://doi.org/10.1007/s10207-012-0185-2}, doi = {10.1007/S10207-012-0185-2}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/CatalanoRFGP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/ChenL13, author = {Yu{-}Shian Chen and Chin{-}Laung Lei}, title = {Aggregate message authentication codes (AMACs) with on-the-fly verification}, journal = {Int. J. Inf. Sec.}, volume = {12}, number = {6}, pages = {495--504}, year = {2013}, url = {https://doi.org/10.1007/s10207-013-0202-0}, doi = {10.1007/S10207-013-0202-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/ChenL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/CristofaroMP13, author = {Emiliano De Cristofaro and Mark Manulis and Bertram Poettering}, title = {Private discovery of common social contacts}, journal = {Int. J. Inf. Sec.}, volume = {12}, number = {1}, pages = {49--65}, year = {2013}, url = {https://doi.org/10.1007/s10207-012-0183-4}, doi = {10.1007/S10207-012-0183-4}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/CristofaroMP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/DArcoP13, author = {Paolo D'Arco and Angel L. P{\'{e}}rez del Pozo}, title = {Toward tracing and revoking schemes secure against collusion and any form of secret information leakage}, journal = {Int. J. Inf. Sec.}, volume = {12}, number = {1}, pages = {1--17}, year = {2013}, url = {https://doi.org/10.1007/s10207-012-0186-1}, doi = {10.1007/S10207-012-0186-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/DArcoP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/Draper-GilZFH13, author = {Gerard Draper{-}Gil and Jianying Zhou and Josep Llu{\'{\i}}s Ferrer{-}Gomila and M. Francisca Hinarejos}, title = {An optimistic fair exchange protocol with active intermediaries}, journal = {Int. J. Inf. Sec.}, volume = {12}, number = {4}, pages = {299--318}, year = {2013}, url = {https://doi.org/10.1007/s10207-013-0194-9}, doi = {10.1007/S10207-013-0194-9}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/Draper-GilZFH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/KunduB13, author = {Ashish Kundu and Elisa Bertino}, title = {Privacy-preserving authentication of trees and graphs}, journal = {Int. J. Inf. Sec.}, volume = {12}, number = {6}, pages = {467--494}, year = {2013}, url = {https://doi.org/10.1007/s10207-013-0198-5}, doi = {10.1007/S10207-013-0198-5}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/KunduB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/MarmolSPUWP13, author = {F{\'{e}}lix G{\'{o}}mez M{\'{a}}rmol and Christoph Sorge and Ronald Petrlic and Osman Ugus and Dirk Westhoff and Gregorio Mart{\'{\i}}nez P{\'{e}}rez}, title = {Privacy-enhanced architecture for smart metering}, journal = {Int. J. Inf. Sec.}, volume = {12}, number = {2}, pages = {67--82}, year = {2013}, url = {https://doi.org/10.1007/s10207-012-0181-6}, doi = {10.1007/S10207-012-0181-6}, timestamp = {Tue, 06 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/MarmolSPUWP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/Peng13, author = {Kun Peng}, title = {A shuffle to achieve high efficiency through pre-computation and batch verification}, journal = {Int. J. Inf. Sec.}, volume = {12}, number = {4}, pages = {337--345}, year = {2013}, url = {https://doi.org/10.1007/s10207-013-0193-x}, doi = {10.1007/S10207-013-0193-X}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/Peng13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/Pereniguez-GarciaLKRGG13, author = {Fernando Pere{\~{n}}{\'{\i}}guez{-}Garcia and Rafael Mar{\'{\i}}n L{\'{o}}pez and Georgios Kambourakis and Antonio Ruiz{-}Mart{\'{\i}}nez and Stefanos Gritzalis and Antonio Fernandez G{\'{o}}mez{-}Skarmeta}, title = {{KAMU:} providing advanced user privacy in Kerberos multi-domain scenarios}, journal = {Int. J. Inf. Sec.}, volume = {12}, number = {6}, pages = {505--525}, year = {2013}, url = {https://doi.org/10.1007/s10207-013-0201-1}, doi = {10.1007/S10207-013-0201-1}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/Pereniguez-GarciaLKRGG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/PhanPSS13, author = {Duong Hieu Phan and David Pointcheval and Siamak Fayyaz Shahandashti and Mario Strefler}, title = {Adaptive {CCA} broadcast encryption with constant-size secret keys and ciphertexts}, journal = {Int. J. Inf. Sec.}, volume = {12}, number = {4}, pages = {251--265}, year = {2013}, url = {https://doi.org/10.1007/s10207-013-0190-0}, doi = {10.1007/S10207-013-0190-0}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/PhanPSS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/Rebollo-MonederoPDF13, author = {David Rebollo{-}Monedero and Javier Parra{-}Arnau and Claudia D{\'{\i}}az and Jordi Forn{\'{e}}}, title = {On the measurement of privacy as an attacker's estimation error}, journal = {Int. J. Inf. Sec.}, volume = {12}, number = {2}, pages = {129--149}, year = {2013}, url = {https://doi.org/10.1007/s10207-012-0182-5}, doi = {10.1007/S10207-012-0182-5}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/Rebollo-MonederoPDF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/RizomiliotisG13, author = {Panagiotis Rizomiliotis and Stefanos Gritzalis}, title = {On the security of AUTH, a provably secure authentication protocol based on the subspace {LPN} problem}, journal = {Int. J. Inf. Sec.}, volume = {12}, number = {2}, pages = {151--154}, year = {2013}, url = {https://doi.org/10.1007/s10207-012-0188-z}, doi = {10.1007/S10207-012-0188-Z}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/RizomiliotisG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/SchreudersPM13, author = {Z. Cliffe Schreuders and Christian Payne and Tanya Jane McGill}, title = {The functionality-based application confinement model}, journal = {Int. J. Inf. Sec.}, volume = {12}, number = {5}, pages = {393--422}, year = {2013}, url = {https://doi.org/10.1007/s10207-013-0199-4}, doi = {10.1007/S10207-013-0199-4}, timestamp = {Mon, 05 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/SchreudersPM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/TormoMP13, author = {Gin{\'{e}}s D{\'{o}}lera Tormo and Gabriel L{\'{o}}pez Mill{\'{a}}n and Gregorio Mart{\'{\i}}nez P{\'{e}}rez}, title = {Definition of an advanced identity management infrastructure}, journal = {Int. J. Inf. Sec.}, volume = {12}, number = {3}, pages = {173--200}, year = {2013}, url = {https://doi.org/10.1007/s10207-012-0189-y}, doi = {10.1007/S10207-012-0189-Y}, timestamp = {Tue, 06 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/TormoMP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/VrakasL13, author = {Nikos Vrakas and Costas Lambrinoudakis}, title = {An intrusion detection and prevention system for {IMS} and VoIP services}, journal = {Int. J. Inf. Sec.}, volume = {12}, number = {3}, pages = {201--217}, year = {2013}, url = {https://doi.org/10.1007/s10207-012-0187-0}, doi = {10.1007/S10207-012-0187-0}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/VrakasL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/WangGMB13, author = {Pu Wang and Marta C. Gonz{\'{a}}lez and Ronaldo Menezes and Albert{-}L{\'{a}}szl{\'{o}} Barab{\'{a}}si}, title = {Understanding the spread of malicious mobile-phone programs and their damage potential}, journal = {Int. J. Inf. Sec.}, volume = {12}, number = {5}, pages = {383--392}, year = {2013}, url = {https://doi.org/10.1007/s10207-013-0203-z}, doi = {10.1007/S10207-013-0203-Z}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/WangGMB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/XuSA13, author = {Wenjuan Xu and Mohamed Shehab and Gail{-}Joon Ahn}, title = {Visualization-based policy analysis for SELinux: framework and user study}, journal = {Int. J. Inf. Sec.}, volume = {12}, number = {3}, pages = {155--171}, year = {2013}, url = {https://doi.org/10.1007/s10207-012-0180-7}, doi = {10.1007/S10207-012-0180-7}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/XuSA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/ZakerzadehO13, author = {Hessam Zakerzadeh and Sylvia L. Osborn}, title = {Delay-sensitive approaches for anonymizing numerical streaming data}, journal = {Int. J. Inf. Sec.}, volume = {12}, number = {5}, pages = {423--437}, year = {2013}, url = {https://doi.org/10.1007/s10207-013-0196-7}, doi = {10.1007/S10207-013-0196-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/ZakerzadehO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.