Search dblp for Publications

export results for "toc:db/journals/ijisec/ijisec12.bht:"

 download as .bib file

@article{DBLP:journals/ijisec/Abbadi13,
  author       = {Imad M. Abbadi},
  title        = {A framework for establishing trust in Cloud provenance},
  journal      = {Int. J. Inf. Sec.},
  volume       = {12},
  number       = {2},
  pages        = {111--128},
  year         = {2013},
  url          = {https://doi.org/10.1007/s10207-012-0179-0},
  doi          = {10.1007/S10207-012-0179-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/Abbadi13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/AbeCHO13,
  author       = {Masayuki Abe and
                  Sherman S. M. Chow and
                  Kristiyan Haralambiev and
                  Miyako Ohkubo},
  title        = {Double-trapdoor anonymous tags for traceable signatures},
  journal      = {Int. J. Inf. Sec.},
  volume       = {12},
  number       = {1},
  pages        = {19--31},
  year         = {2013},
  url          = {https://doi.org/10.1007/s10207-012-0184-3},
  doi          = {10.1007/S10207-012-0184-3},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/AbeCHO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/AlsalehO13,
  author       = {Mansour Alsaleh and
                  Paul C. van Oorschot},
  title        = {Evaluation in the absence of absolute ground truth: toward reliable
                  evaluation methodology for scan detectors},
  journal      = {Int. J. Inf. Sec.},
  volume       = {12},
  number       = {2},
  pages        = {97--110},
  year         = {2013},
  url          = {https://doi.org/10.1007/s10207-012-0178-1},
  doi          = {10.1007/S10207-012-0178-1},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/AlsalehO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/AsgharLPW13,
  author       = {Hassan Jameel Asghar and
                  Shujun Li and
                  Josef Pieprzyk and
                  Huaxiong Wang},
  title        = {Cryptanalysis of the convex hull click human identification protocol},
  journal      = {Int. J. Inf. Sec.},
  volume       = {12},
  number       = {2},
  pages        = {83--96},
  year         = {2013},
  url          = {https://doi.org/10.1007/s10207-012-0161-x},
  doi          = {10.1007/S10207-012-0161-X},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/AsgharLPW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/BeauquierCL13,
  author       = {Dani{\`{e}}le Beauquier and
                  Jo{\"{e}}lle Cohen and
                  Ruggero Lanotte},
  title        = {Security policies enforcement using finite and pushdown edit automata},
  journal      = {Int. J. Inf. Sec.},
  volume       = {12},
  number       = {4},
  pages        = {319--336},
  year         = {2013},
  url          = {https://doi.org/10.1007/s10207-013-0195-8},
  doi          = {10.1007/S10207-013-0195-8},
  timestamp    = {Tue, 06 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/BeauquierCL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/BernhardFGSW13,
  author       = {David Bernhard and
                  Georg Fuchsbauer and
                  Essam Ghadafi and
                  Nigel P. Smart and
                  Bogdan Warinschi},
  title        = {Anonymous attestation with user-controlled linkability},
  journal      = {Int. J. Inf. Sec.},
  volume       = {12},
  number       = {3},
  pages        = {219--249},
  year         = {2013},
  url          = {https://doi.org/10.1007/s10207-013-0191-z},
  doi          = {10.1007/S10207-013-0191-Z},
  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/BernhardFGSW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/BoteanuF13,
  author       = {Daniel Boteanu and
                  Jos{\'{e}} M. Fernandez},
  title        = {A comprehensive study of queue management as a DoS counter-measure},
  journal      = {Int. J. Inf. Sec.},
  volume       = {12},
  number       = {5},
  pages        = {347--382},
  year         = {2013},
  url          = {https://doi.org/10.1007/s10207-013-0197-6},
  doi          = {10.1007/S10207-013-0197-6},
  timestamp    = {Thu, 21 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/BoteanuF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/BressonCRFG13,
  author       = {Emmanuel Bresson and
                  Dario Catalano and
                  Mario Di Raimondo and
                  Dario Fiore and
                  Rosario Gennaro},
  title        = {Off-line/on-line signatures revisited: a general unifying paradigm,
                  efficient threshold variants and experimental results},
  journal      = {Int. J. Inf. Sec.},
  volume       = {12},
  number       = {6},
  pages        = {439--465},
  year         = {2013},
  url          = {https://doi.org/10.1007/s10207-013-0200-2},
  doi          = {10.1007/S10207-013-0200-2},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/BressonCRFG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/BrzuskaFSWW13,
  author       = {Christina Brzuska and
                  Marc Fischlin and
                  Nigel P. Smart and
                  Bogdan Warinschi and
                  Stephen C. Williams},
  title        = {Less is more: relaxed yet composable security notions for key exchange},
  journal      = {Int. J. Inf. Sec.},
  volume       = {12},
  number       = {4},
  pages        = {267--297},
  year         = {2013},
  url          = {https://doi.org/10.1007/s10207-013-0192-y},
  doi          = {10.1007/S10207-013-0192-Y},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/BrzuskaFSWW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/CatalanoRFGP13,
  author       = {Dario Catalano and
                  Mario Di Raimondo and
                  Dario Fiore and
                  Rosario Gennaro and
                  Orazio Puglisi},
  title        = {Fully non-interactive onion routing with forward secrecy},
  journal      = {Int. J. Inf. Sec.},
  volume       = {12},
  number       = {1},
  pages        = {33--47},
  year         = {2013},
  url          = {https://doi.org/10.1007/s10207-012-0185-2},
  doi          = {10.1007/S10207-012-0185-2},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/CatalanoRFGP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/ChenL13,
  author       = {Yu{-}Shian Chen and
                  Chin{-}Laung Lei},
  title        = {Aggregate message authentication codes (AMACs) with on-the-fly verification},
  journal      = {Int. J. Inf. Sec.},
  volume       = {12},
  number       = {6},
  pages        = {495--504},
  year         = {2013},
  url          = {https://doi.org/10.1007/s10207-013-0202-0},
  doi          = {10.1007/S10207-013-0202-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/ChenL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/CristofaroMP13,
  author       = {Emiliano De Cristofaro and
                  Mark Manulis and
                  Bertram Poettering},
  title        = {Private discovery of common social contacts},
  journal      = {Int. J. Inf. Sec.},
  volume       = {12},
  number       = {1},
  pages        = {49--65},
  year         = {2013},
  url          = {https://doi.org/10.1007/s10207-012-0183-4},
  doi          = {10.1007/S10207-012-0183-4},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/CristofaroMP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/DArcoP13,
  author       = {Paolo D'Arco and
                  Angel L. P{\'{e}}rez del Pozo},
  title        = {Toward tracing and revoking schemes secure against collusion and any
                  form of secret information leakage},
  journal      = {Int. J. Inf. Sec.},
  volume       = {12},
  number       = {1},
  pages        = {1--17},
  year         = {2013},
  url          = {https://doi.org/10.1007/s10207-012-0186-1},
  doi          = {10.1007/S10207-012-0186-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/DArcoP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/Draper-GilZFH13,
  author       = {Gerard Draper{-}Gil and
                  Jianying Zhou and
                  Josep Llu{\'{\i}}s Ferrer{-}Gomila and
                  M. Francisca Hinarejos},
  title        = {An optimistic fair exchange protocol with active intermediaries},
  journal      = {Int. J. Inf. Sec.},
  volume       = {12},
  number       = {4},
  pages        = {299--318},
  year         = {2013},
  url          = {https://doi.org/10.1007/s10207-013-0194-9},
  doi          = {10.1007/S10207-013-0194-9},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/Draper-GilZFH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/KunduB13,
  author       = {Ashish Kundu and
                  Elisa Bertino},
  title        = {Privacy-preserving authentication of trees and graphs},
  journal      = {Int. J. Inf. Sec.},
  volume       = {12},
  number       = {6},
  pages        = {467--494},
  year         = {2013},
  url          = {https://doi.org/10.1007/s10207-013-0198-5},
  doi          = {10.1007/S10207-013-0198-5},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/KunduB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/MarmolSPUWP13,
  author       = {F{\'{e}}lix G{\'{o}}mez M{\'{a}}rmol and
                  Christoph Sorge and
                  Ronald Petrlic and
                  Osman Ugus and
                  Dirk Westhoff and
                  Gregorio Mart{\'{\i}}nez P{\'{e}}rez},
  title        = {Privacy-enhanced architecture for smart metering},
  journal      = {Int. J. Inf. Sec.},
  volume       = {12},
  number       = {2},
  pages        = {67--82},
  year         = {2013},
  url          = {https://doi.org/10.1007/s10207-012-0181-6},
  doi          = {10.1007/S10207-012-0181-6},
  timestamp    = {Tue, 06 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/MarmolSPUWP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/Peng13,
  author       = {Kun Peng},
  title        = {A shuffle to achieve high efficiency through pre-computation and batch
                  verification},
  journal      = {Int. J. Inf. Sec.},
  volume       = {12},
  number       = {4},
  pages        = {337--345},
  year         = {2013},
  url          = {https://doi.org/10.1007/s10207-013-0193-x},
  doi          = {10.1007/S10207-013-0193-X},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/Peng13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/Pereniguez-GarciaLKRGG13,
  author       = {Fernando Pere{\~{n}}{\'{\i}}guez{-}Garcia and
                  Rafael Mar{\'{\i}}n L{\'{o}}pez and
                  Georgios Kambourakis and
                  Antonio Ruiz{-}Mart{\'{\i}}nez and
                  Stefanos Gritzalis and
                  Antonio Fernandez G{\'{o}}mez{-}Skarmeta},
  title        = {{KAMU:} providing advanced user privacy in Kerberos multi-domain scenarios},
  journal      = {Int. J. Inf. Sec.},
  volume       = {12},
  number       = {6},
  pages        = {505--525},
  year         = {2013},
  url          = {https://doi.org/10.1007/s10207-013-0201-1},
  doi          = {10.1007/S10207-013-0201-1},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/Pereniguez-GarciaLKRGG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/PhanPSS13,
  author       = {Duong Hieu Phan and
                  David Pointcheval and
                  Siamak Fayyaz Shahandashti and
                  Mario Strefler},
  title        = {Adaptive {CCA} broadcast encryption with constant-size secret keys
                  and ciphertexts},
  journal      = {Int. J. Inf. Sec.},
  volume       = {12},
  number       = {4},
  pages        = {251--265},
  year         = {2013},
  url          = {https://doi.org/10.1007/s10207-013-0190-0},
  doi          = {10.1007/S10207-013-0190-0},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/PhanPSS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/Rebollo-MonederoPDF13,
  author       = {David Rebollo{-}Monedero and
                  Javier Parra{-}Arnau and
                  Claudia D{\'{\i}}az and
                  Jordi Forn{\'{e}}},
  title        = {On the measurement of privacy as an attacker's estimation error},
  journal      = {Int. J. Inf. Sec.},
  volume       = {12},
  number       = {2},
  pages        = {129--149},
  year         = {2013},
  url          = {https://doi.org/10.1007/s10207-012-0182-5},
  doi          = {10.1007/S10207-012-0182-5},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/Rebollo-MonederoPDF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/RizomiliotisG13,
  author       = {Panagiotis Rizomiliotis and
                  Stefanos Gritzalis},
  title        = {On the security of AUTH, a provably secure authentication protocol
                  based on the subspace {LPN} problem},
  journal      = {Int. J. Inf. Sec.},
  volume       = {12},
  number       = {2},
  pages        = {151--154},
  year         = {2013},
  url          = {https://doi.org/10.1007/s10207-012-0188-z},
  doi          = {10.1007/S10207-012-0188-Z},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/RizomiliotisG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/SchreudersPM13,
  author       = {Z. Cliffe Schreuders and
                  Christian Payne and
                  Tanya Jane McGill},
  title        = {The functionality-based application confinement model},
  journal      = {Int. J. Inf. Sec.},
  volume       = {12},
  number       = {5},
  pages        = {393--422},
  year         = {2013},
  url          = {https://doi.org/10.1007/s10207-013-0199-4},
  doi          = {10.1007/S10207-013-0199-4},
  timestamp    = {Mon, 05 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/SchreudersPM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/TormoMP13,
  author       = {Gin{\'{e}}s D{\'{o}}lera Tormo and
                  Gabriel L{\'{o}}pez Mill{\'{a}}n and
                  Gregorio Mart{\'{\i}}nez P{\'{e}}rez},
  title        = {Definition of an advanced identity management infrastructure},
  journal      = {Int. J. Inf. Sec.},
  volume       = {12},
  number       = {3},
  pages        = {173--200},
  year         = {2013},
  url          = {https://doi.org/10.1007/s10207-012-0189-y},
  doi          = {10.1007/S10207-012-0189-Y},
  timestamp    = {Tue, 06 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/TormoMP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/VrakasL13,
  author       = {Nikos Vrakas and
                  Costas Lambrinoudakis},
  title        = {An intrusion detection and prevention system for {IMS} and VoIP services},
  journal      = {Int. J. Inf. Sec.},
  volume       = {12},
  number       = {3},
  pages        = {201--217},
  year         = {2013},
  url          = {https://doi.org/10.1007/s10207-012-0187-0},
  doi          = {10.1007/S10207-012-0187-0},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/VrakasL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/WangGMB13,
  author       = {Pu Wang and
                  Marta C. Gonz{\'{a}}lez and
                  Ronaldo Menezes and
                  Albert{-}L{\'{a}}szl{\'{o}} Barab{\'{a}}si},
  title        = {Understanding the spread of malicious mobile-phone programs and their
                  damage potential},
  journal      = {Int. J. Inf. Sec.},
  volume       = {12},
  number       = {5},
  pages        = {383--392},
  year         = {2013},
  url          = {https://doi.org/10.1007/s10207-013-0203-z},
  doi          = {10.1007/S10207-013-0203-Z},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/WangGMB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/XuSA13,
  author       = {Wenjuan Xu and
                  Mohamed Shehab and
                  Gail{-}Joon Ahn},
  title        = {Visualization-based policy analysis for SELinux: framework and user
                  study},
  journal      = {Int. J. Inf. Sec.},
  volume       = {12},
  number       = {3},
  pages        = {155--171},
  year         = {2013},
  url          = {https://doi.org/10.1007/s10207-012-0180-7},
  doi          = {10.1007/S10207-012-0180-7},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/XuSA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/ZakerzadehO13,
  author       = {Hessam Zakerzadeh and
                  Sylvia L. Osborn},
  title        = {Delay-sensitive approaches for anonymizing numerical streaming data},
  journal      = {Int. J. Inf. Sec.},
  volume       = {12},
  number       = {5},
  pages        = {423--437},
  year         = {2013},
  url          = {https://doi.org/10.1007/s10207-013-0196-7},
  doi          = {10.1007/S10207-013-0196-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/ZakerzadehO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}