default search action
Search dblp for Publications
export results for "toc:db/journals/jisis/jisis8.bht:"
@article{DBLP:journals/jisis/AiSW18, author = {Zheng{-}Yang Ai and Fei Song and Xi Wang}, title = {Combining {SDN} and {ICN} for Network Survivability Improvement}, journal = {J. Internet Serv. Inf. Secur.}, volume = {8}, number = {1}, pages = {18--30}, year = {2018}, url = {https://doi.org/10.22667/JISIS.2018.02.28.018}, doi = {10.22667/JISIS.2018.02.28.018}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/AiSW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/Arena0C18, author = {Fabio Arena and Giovanni Pau and Mario Collotta}, title = {A survey on driverless vehicles: from their diffusion to security features}, journal = {J. Internet Serv. Inf. Secur.}, volume = {8}, number = {3}, pages = {1--19}, year = {2018}, url = {https://doi.org/10.22667/JISIS.2018.08.31.001}, doi = {10.22667/JISIS.2018.08.31.001}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/Arena0C18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/BordelA18, author = {Borja Bordel and Ram{\'{o}}n Alcarria}, title = {Physical Unclonable Functions based on silicon micro-ring resonators for secure signature delegation in Wireless Sensor Networks}, journal = {J. Internet Serv. Inf. Secur.}, volume = {8}, number = {3}, pages = {40--53}, year = {2018}, url = {https://doi.org/10.22667/JISIS.2018.08.31.040}, doi = {10.22667/JISIS.2018.08.31.040}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/BordelA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/BrunettaLM18, author = {Carlo Brunetta and Bei Liang and Aikaterini Mitrokotsa}, title = {Lattice-Based Simulatable VRFs: Challenges and Future Directions}, journal = {J. Internet Serv. Inf. Secur.}, volume = {8}, number = {4}, pages = {57--69}, year = {2018}, url = {https://doi.org/10.22667/JISIS.2018.11.30.057}, doi = {10.22667/JISIS.2018.11.30.057}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/BrunettaLM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/GuptaCS18, author = {Takshi Gupta and Gaurav Choudhary and Vishal Sharma}, title = {A Survey on the Security of Pervasive Online Social Networks (POSNs)}, journal = {J. Internet Serv. Inf. Secur.}, volume = {8}, number = {2}, pages = {48--86}, year = {2018}, url = {https://doi.org/10.22667/JISIS.2018.05.31.048}, doi = {10.22667/JISIS.2018.05.31.048}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/GuptaCS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/KotenkoSB18, author = {Igor V. Kotenko and Igor Saenko and Alexander Branitskiy}, title = {Applying Big Data Processing and Machine Learning Methods for Mobile Internet of Things Security Monitoring}, journal = {J. Internet Serv. Inf. Secur.}, volume = {8}, number = {3}, pages = {54--63}, year = {2018}, url = {https://doi.org/10.22667/JISIS.2018.08.31.054}, doi = {10.22667/JISIS.2018.08.31.054}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisis/KotenkoSB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/OhyanagiI18, author = {Tatsuya Ohyanagi and Tomoyuki Ishida}, title = {Implementation of an Integrated Common Platform for Zoo Operations}, journal = {J. Internet Serv. Inf. Secur.}, volume = {8}, number = {3}, pages = {20--39}, year = {2018}, url = {https://doi.org/10.22667/JISIS.2018.08.31.020}, doi = {10.22667/JISIS.2018.08.31.020}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/OhyanagiI18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/PereraK18, author = {Maharage Nisansala Sevwandi Perera and Takeshi Koshiba}, title = {Achieving Strong Security and Member Registration for Lattice-based Group Signature Scheme with Verifier-local Revocation}, journal = {J. Internet Serv. Inf. Secur.}, volume = {8}, number = {4}, pages = {1--15}, year = {2018}, url = {https://doi.org/10.22667/JISIS.2018.11.30.001}, doi = {10.22667/JISIS.2018.11.30.001}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/PereraK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/ShihCL18, author = {Chi{-}Sheng Shih and Jyun{-}Jhe Chou and Kwei{-}Jay Lin}, title = {WuKong: Secure Run-Time environment and data-driven IoT applications for Smart Cities and Smart Buildings}, journal = {J. Internet Serv. Inf. Secur.}, volume = {8}, number = {2}, pages = {1--17}, year = {2018}, url = {https://doi.org/10.22667/JISIS.2018.05.31.001}, doi = {10.22667/JISIS.2018.05.31.001}, timestamp = {Wed, 22 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/ShihCL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/TsuchidaNO18, author = {Hikaru Tsuchida and Takashi Nishide and Eiji Okamoto}, title = {Expressive Ciphertext-Policy Attribute-Based Encryption with Fast Decryption}, journal = {J. Internet Serv. Inf. Secur.}, volume = {8}, number = {4}, pages = {37--56}, year = {2018}, url = {https://doi.org/10.22667/JISIS.2018.11.30.037}, doi = {10.22667/JISIS.2018.11.30.037}, timestamp = {Mon, 11 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisis/TsuchidaNO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/ValenzaL18, author = {Fulvio Valenza and Antonio Lioy}, title = {User-oriented Network Security Policy Specification}, journal = {J. Internet Serv. Inf. Secur.}, volume = {8}, number = {2}, pages = {33--47}, year = {2018}, url = {https://doi.org/10.22667/JISIS.2018.05.31.033}, doi = {10.22667/JISIS.2018.05.31.033}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/ValenzaL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/VidhyaB18, author = {R. Vidhya and M. Brindha}, title = {A novel Dynamic Key based chaotic image encryption}, journal = {J. Internet Serv. Inf. Secur.}, volume = {8}, number = {1}, pages = {46--55}, year = {2018}, url = {https://doi.org/10.22667/JISIS.2018.02.28.046}, doi = {10.22667/JISIS.2018.02.28.046}, timestamp = {Tue, 21 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisis/VidhyaB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/Vivekanandan18, author = {Paventhan Vivekanandan}, title = {A Type-based Formal Specification for Cryptographic Protocols}, journal = {J. Internet Serv. Inf. Secur.}, volume = {8}, number = {4}, pages = {16--36}, year = {2018}, url = {https://doi.org/10.22667/JISIS.2018.11.30.016}, doi = {10.22667/JISIS.2018.11.30.016}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/Vivekanandan18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/WangZGZYLC18, author = {Chundong Wang and Likun Zhu and Liangyi Gong and Zhentang Zhao and Lei Yang and Zheli Liu and Xiaochun Cheng}, title = {Channel State Information-Based Detection of Sybil Attacks in Wireless Networks}, journal = {J. Internet Serv. Inf. Secur.}, volume = {8}, number = {1}, pages = {2--17}, year = {2018}, url = {https://doi.org/10.22667/JISIS.2018.02.28.002}, doi = {10.22667/JISIS.2018.02.28.002}, timestamp = {Tue, 20 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisis/WangZGZYLC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/YanGNP18, author = {Zhiwei Yan and Guanggang Geng and Hidenori Nakazato and Yong{-}Jin Park}, title = {Secure and Scalable Deployment of Resource Public Key Infrastructure {(RPKI)}}, journal = {J. Internet Serv. Inf. Secur.}, volume = {8}, number = {1}, pages = {31--45}, year = {2018}, url = {https://doi.org/10.22667/JISIS.2018.02.28.031}, doi = {10.22667/JISIS.2018.02.28.031}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/YanGNP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/You18, author = {Ilsun You}, title = {Letter from the Editor-in-Chief}, journal = {J. Internet Serv. Inf. Secur.}, volume = {8}, number = {1}, pages = {1}, year = {2018}, url = {https://doi.org/10.22667/JISIS.2018.02.28.001}, doi = {10.22667/JISIS.2018.02.28.001}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/You18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/ZhiYM18, author = {Qiang Zhi and Shuichiro Yamamoto and Shuji Morisaki}, title = {{IMSA} - Intra Model Security Assurance}, journal = {J. Internet Serv. Inf. Secur.}, volume = {8}, number = {2}, pages = {18--32}, year = {2018}, url = {https://doi.org/10.22667/JISIS.2018.05.31.018}, doi = {10.22667/JISIS.2018.05.31.018}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/ZhiYM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.