Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/istr/istr17.bht:"
@article{DBLP:journals/istr/AskoxylakisMP13, author = {Ioannis G. Askoxylakis and Mark Manulis and Joachim Posegga}, title = {Security and privacy for digital ecosystems}, journal = {Inf. Secur. Tech. Rep.}, volume = {17}, number = {3}, pages = {45}, year = {2013}, url = {https://doi.org/10.1016/j.istr.2013.02.001}, doi = {10.1016/J.ISTR.2013.02.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/AskoxylakisMP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/BaumgrassS13, author = {Anne Baumgrass and Mark Strembeck}, title = {Bridging the gap between role mining and role engineering via migration guides}, journal = {Inf. Secur. Tech. Rep.}, volume = {17}, number = {4}, pages = {148--172}, year = {2013}, url = {https://doi.org/10.1016/j.istr.2013.03.003}, doi = {10.1016/J.ISTR.2013.03.003}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/BaumgrassS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/CatuognoGMV13, author = {Luigi Catuogno and Roberto Gassir{\`{a}} and Michele Masullo and Ivan Visconti}, title = {SmartK: Smart cards in operating systems at kernel level}, journal = {Inf. Secur. Tech. Rep.}, volume = {17}, number = {3}, pages = {93--104}, year = {2013}, url = {https://doi.org/10.1016/j.istr.2012.10.003}, doi = {10.1016/J.ISTR.2012.10.003}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/CatuognoGMV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChowAS13, author = {Sherman S. M. Chow and Man Ho Au and Willy Susilo}, title = {Server-aided signatures verification secure against collusion attack}, journal = {Inf. Secur. Tech. Rep.}, volume = {17}, number = {3}, pages = {46--57}, year = {2013}, url = {https://doi.org/10.1016/j.istr.2012.10.007}, doi = {10.1016/J.ISTR.2012.10.007}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ChowAS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChristinLRHK13, author = {Delphine Christin and Pablo S{\'{a}}nchez L{\'{o}}pez and Andreas Reinhardt and Matthias Hollick and Michaela Kauer}, title = {Share with strangers: Privacy bubbles as user-centered privacy control for mobile content sharing applications}, journal = {Inf. Secur. Tech. Rep.}, volume = {17}, number = {3}, pages = {105--116}, year = {2013}, url = {https://doi.org/10.1016/j.istr.2012.10.004}, doi = {10.1016/J.ISTR.2012.10.004}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ChristinLRHK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/DellAmicoSIOR13, author = {Matteo Dell'Amico and Gabriel Serme and Muhammad Sabir Idrees and Anderson Santana de Oliveira and Yves Roudier}, title = {HiPoLDS: {A} Hierarchical Security Policy Language for Distributed Systems}, journal = {Inf. Secur. Tech. Rep.}, volume = {17}, number = {3}, pages = {81--92}, year = {2013}, url = {https://doi.org/10.1016/j.istr.2012.10.002}, doi = {10.1016/J.ISTR.2012.10.002}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/DellAmicoSIOR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/FelediFL13, author = {Daniel Feledi and Stefan Fenz and Lukas Lechner}, title = {Toward web-based information security knowledge sharing}, journal = {Inf. Secur. Tech. Rep.}, volume = {17}, number = {4}, pages = {199--209}, year = {2013}, url = {https://doi.org/10.1016/j.istr.2013.03.004}, doi = {10.1016/J.ISTR.2013.03.004}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/FelediFL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/FranzDHJKS13, author = {Martin Franz and Bj{\"{o}}rn Deiseroth and Kay Hamacher and Somesh Jha and Stefan Katzenbeisser and Heike Schr{\"{o}}der}, title = {Secure computations on non-integer values with applications to privacy-preserving sequence analysis}, journal = {Inf. Secur. Tech. Rep.}, volume = {17}, number = {3}, pages = {117--128}, year = {2013}, url = {https://doi.org/10.1016/j.istr.2012.10.001}, doi = {10.1016/J.ISTR.2012.10.001}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/FranzDHJKS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/FruhwirtKSHW13, author = {Peter Fr{\"{u}}hwirt and Peter Kieseberg and Sebastian Schrittwieser and Markus Huber and Edgar R. Weippl}, title = {InnoDB database forensics: Enhanced reconstruction of data manipulation queries from redo logs}, journal = {Inf. Secur. Tech. Rep.}, volume = {17}, number = {4}, pages = {227--238}, year = {2013}, url = {https://doi.org/10.1016/j.istr.2013.02.003}, doi = {10.1016/J.ISTR.2013.02.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/FruhwirtKSHW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HachanaCCG13, author = {Safa{\`{a}} Hachana and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Semantic analysis of role mining results and shadowed roles detection}, journal = {Inf. Secur. Tech. Rep.}, volume = {17}, number = {4}, pages = {131--147}, year = {2013}, url = {https://doi.org/10.1016/j.istr.2013.03.001}, doi = {10.1016/J.ISTR.2013.03.001}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/HachanaCCG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HerzbergS13, author = {Amir Herzberg and Haya Schulmann}, title = {Oblivious and fair server-aided two-party computation}, journal = {Inf. Secur. Tech. Rep.}, volume = {17}, number = {4}, pages = {210--226}, year = {2013}, url = {https://doi.org/10.1016/j.istr.2013.03.002}, doi = {10.1016/J.ISTR.2013.03.002}, timestamp = {Tue, 17 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/HerzbergS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/PetroulakisTFS13, author = {Nikolaos E. Petroulakis and Elias Z. Tragos and Alexandros G. Fragkiadakis and George Spanoudakis}, title = {A lightweight framework for secure life-logging in smart environments}, journal = {Inf. Secur. Tech. Rep.}, volume = {17}, number = {3}, pages = {58--70}, year = {2013}, url = {https://doi.org/10.1016/j.istr.2012.10.005}, doi = {10.1016/J.ISTR.2012.10.005}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/PetroulakisTFS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/PlosM13, author = {Thomas Plos and Christian Maierhofer}, title = {On measuring the parasitic backscatter of sensor-enabled {UHF} {RFID} tags}, journal = {Inf. Secur. Tech. Rep.}, volume = {17}, number = {4}, pages = {239--252}, year = {2013}, url = {https://doi.org/10.1016/j.istr.2013.02.004}, doi = {10.1016/J.ISTR.2013.02.004}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/PlosM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/RiesnerNP13, author = {Moritz Riesner and Michael Netter and G{\"{u}}nther Pernul}, title = {Analyzing settings for social identity management on Social Networking Sites: Classification, current state, and proposed developments}, journal = {Inf. Secur. Tech. Rep.}, volume = {17}, number = {4}, pages = {185--198}, year = {2013}, url = {https://doi.org/10.1016/j.istr.2013.02.005}, doi = {10.1016/J.ISTR.2013.02.005}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/RiesnerNP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SchrecklingKS13, author = {Daniel Schreckling and Johannes K{\"{o}}stler and Matthias Schaff}, title = {Kynoid: Real-time enforcement of fine-grained, user-defined, and data-centric security policies for Android}, journal = {Inf. Secur. Tech. Rep.}, volume = {17}, number = {3}, pages = {71--80}, year = {2013}, url = {https://doi.org/10.1016/j.istr.2012.10.006}, doi = {10.1016/J.ISTR.2012.10.006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/SchrecklingKS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/WrightMW13, author = {Jason L. Wright and Miles McQueen and Lawrence Wellman}, title = {Analyses of two end-user software vulnerability exposure metrics (extended version)}, journal = {Inf. Secur. Tech. Rep.}, volume = {17}, number = {4}, pages = {173--184}, year = {2013}, url = {https://doi.org/10.1016/j.istr.2013.02.002}, doi = {10.1016/J.ISTR.2013.02.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/WrightMW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Bours12, author = {Patrick Bours}, title = {Continuous keystroke dynamics: {A} different perspective towards biometric evaluation}, journal = {Inf. Secur. Tech. Rep.}, volume = {17}, number = {1-2}, pages = {36--43}, year = {2012}, url = {https://doi.org/10.1016/j.istr.2012.02.001}, doi = {10.1016/J.ISTR.2012.02.001}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Bours12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Bunker12, author = {Guy Bunker}, title = {Technology is not enough: Taking a holistic view for information assurance}, journal = {Inf. Secur. Tech. Rep.}, volume = {17}, number = {1-2}, pages = {19--25}, year = {2012}, url = {https://doi.org/10.1016/j.istr.2011.12.002}, doi = {10.1016/J.ISTR.2011.12.002}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Bunker12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Jirasek12, author = {Vladimir Jirasek}, title = {Practical application of information security models}, journal = {Inf. Secur. Tech. Rep.}, volume = {17}, number = {1-2}, pages = {1--8}, year = {2012}, url = {https://doi.org/10.1016/j.istr.2011.12.004}, doi = {10.1016/J.ISTR.2011.12.004}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Jirasek12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/PflugHB12, author = {Anika Pflug and Daniel Hartung and Christoph Busch}, title = {Feature extraction from vein images using spatial information and chain codes}, journal = {Inf. Secur. Tech. Rep.}, volume = {17}, number = {1-2}, pages = {26--35}, year = {2012}, url = {https://doi.org/10.1016/j.istr.2012.02.003}, doi = {10.1016/J.ISTR.2012.02.003}, timestamp = {Wed, 06 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/PflugHB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/QuayleT12, author = {Ethel Quayle and Max Taylor}, title = {Corrigendum to "Social networking as a nexus for engagement and exploitation of young people" [Inform Secur Tech Rep 16 {(2)} {(2011)} 44-50]}, journal = {Inf. Secur. Tech. Rep.}, volume = {17}, number = {1-2}, pages = {44}, year = {2012}, url = {https://doi.org/10.1016/j.istr.2012.02.002}, doi = {10.1016/J.ISTR.2012.02.002}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/QuayleT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Walker12, author = {Simon Walker}, title = {Economics and the cyber challenge}, journal = {Inf. Secur. Tech. Rep.}, volume = {17}, number = {1-2}, pages = {9--18}, year = {2012}, url = {https://doi.org/10.1016/j.istr.2011.12.003}, doi = {10.1016/J.ISTR.2011.12.003}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Walker12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.