Search dblp for Publications

export results for "toc:db/journals/jisis/jisis8.bht:"

 download as .bib file

@article{DBLP:journals/jisis/AiSW18,
  author       = {Zheng{-}Yang Ai and
                  Fei Song and
                  Xi Wang},
  title        = {Combining {SDN} and {ICN} for Network Survivability Improvement},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {8},
  number       = {1},
  pages        = {18--30},
  year         = {2018},
  url          = {https://doi.org/10.22667/JISIS.2018.02.28.018},
  doi          = {10.22667/JISIS.2018.02.28.018},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/AiSW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/Arena0C18,
  author       = {Fabio Arena and
                  Giovanni Pau and
                  Mario Collotta},
  title        = {A survey on driverless vehicles: from their diffusion to security
                  features},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {8},
  number       = {3},
  pages        = {1--19},
  year         = {2018},
  url          = {https://doi.org/10.22667/JISIS.2018.08.31.001},
  doi          = {10.22667/JISIS.2018.08.31.001},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/Arena0C18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/BordelA18,
  author       = {Borja Bordel and
                  Ram{\'{o}}n Alcarria},
  title        = {Physical Unclonable Functions based on silicon micro-ring resonators
                  for secure signature delegation in Wireless Sensor Networks},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {8},
  number       = {3},
  pages        = {40--53},
  year         = {2018},
  url          = {https://doi.org/10.22667/JISIS.2018.08.31.040},
  doi          = {10.22667/JISIS.2018.08.31.040},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/BordelA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/BrunettaLM18,
  author       = {Carlo Brunetta and
                  Bei Liang and
                  Aikaterini Mitrokotsa},
  title        = {Lattice-Based Simulatable VRFs: Challenges and Future Directions},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {8},
  number       = {4},
  pages        = {57--69},
  year         = {2018},
  url          = {https://doi.org/10.22667/JISIS.2018.11.30.057},
  doi          = {10.22667/JISIS.2018.11.30.057},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/BrunettaLM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/GuptaCS18,
  author       = {Takshi Gupta and
                  Gaurav Choudhary and
                  Vishal Sharma},
  title        = {A Survey on the Security of Pervasive Online Social Networks (POSNs)},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {8},
  number       = {2},
  pages        = {48--86},
  year         = {2018},
  url          = {https://doi.org/10.22667/JISIS.2018.05.31.048},
  doi          = {10.22667/JISIS.2018.05.31.048},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/GuptaCS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/KotenkoSB18,
  author       = {Igor V. Kotenko and
                  Igor Saenko and
                  Alexander Branitskiy},
  title        = {Applying Big Data Processing and Machine Learning Methods for Mobile
                  Internet of Things Security Monitoring},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {8},
  number       = {3},
  pages        = {54--63},
  year         = {2018},
  url          = {https://doi.org/10.22667/JISIS.2018.08.31.054},
  doi          = {10.22667/JISIS.2018.08.31.054},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisis/KotenkoSB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/OhyanagiI18,
  author       = {Tatsuya Ohyanagi and
                  Tomoyuki Ishida},
  title        = {Implementation of an Integrated Common Platform for Zoo Operations},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {8},
  number       = {3},
  pages        = {20--39},
  year         = {2018},
  url          = {https://doi.org/10.22667/JISIS.2018.08.31.020},
  doi          = {10.22667/JISIS.2018.08.31.020},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/OhyanagiI18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/PereraK18,
  author       = {Maharage Nisansala Sevwandi Perera and
                  Takeshi Koshiba},
  title        = {Achieving Strong Security and Member Registration for Lattice-based
                  Group Signature Scheme with Verifier-local Revocation},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {8},
  number       = {4},
  pages        = {1--15},
  year         = {2018},
  url          = {https://doi.org/10.22667/JISIS.2018.11.30.001},
  doi          = {10.22667/JISIS.2018.11.30.001},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/PereraK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/ShihCL18,
  author       = {Chi{-}Sheng Shih and
                  Jyun{-}Jhe Chou and
                  Kwei{-}Jay Lin},
  title        = {WuKong: Secure Run-Time environment and data-driven IoT applications
                  for Smart Cities and Smart Buildings},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {8},
  number       = {2},
  pages        = {1--17},
  year         = {2018},
  url          = {https://doi.org/10.22667/JISIS.2018.05.31.001},
  doi          = {10.22667/JISIS.2018.05.31.001},
  timestamp    = {Wed, 22 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/ShihCL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/TsuchidaNO18,
  author       = {Hikaru Tsuchida and
                  Takashi Nishide and
                  Eiji Okamoto},
  title        = {Expressive Ciphertext-Policy Attribute-Based Encryption with Fast
                  Decryption},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {8},
  number       = {4},
  pages        = {37--56},
  year         = {2018},
  url          = {https://doi.org/10.22667/JISIS.2018.11.30.037},
  doi          = {10.22667/JISIS.2018.11.30.037},
  timestamp    = {Mon, 11 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisis/TsuchidaNO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/ValenzaL18,
  author       = {Fulvio Valenza and
                  Antonio Lioy},
  title        = {User-oriented Network Security Policy Specification},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {8},
  number       = {2},
  pages        = {33--47},
  year         = {2018},
  url          = {https://doi.org/10.22667/JISIS.2018.05.31.033},
  doi          = {10.22667/JISIS.2018.05.31.033},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/ValenzaL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/VidhyaB18,
  author       = {R. Vidhya and
                  M. Brindha},
  title        = {A novel Dynamic Key based chaotic image encryption},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {8},
  number       = {1},
  pages        = {46--55},
  year         = {2018},
  url          = {https://doi.org/10.22667/JISIS.2018.02.28.046},
  doi          = {10.22667/JISIS.2018.02.28.046},
  timestamp    = {Tue, 21 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisis/VidhyaB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/Vivekanandan18,
  author       = {Paventhan Vivekanandan},
  title        = {A Type-based Formal Specification for Cryptographic Protocols},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {8},
  number       = {4},
  pages        = {16--36},
  year         = {2018},
  url          = {https://doi.org/10.22667/JISIS.2018.11.30.016},
  doi          = {10.22667/JISIS.2018.11.30.016},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/Vivekanandan18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/WangZGZYLC18,
  author       = {Chundong Wang and
                  Likun Zhu and
                  Liangyi Gong and
                  Zhentang Zhao and
                  Lei Yang and
                  Zheli Liu and
                  Xiaochun Cheng},
  title        = {Channel State Information-Based Detection of Sybil Attacks in Wireless
                  Networks},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {8},
  number       = {1},
  pages        = {2--17},
  year         = {2018},
  url          = {https://doi.org/10.22667/JISIS.2018.02.28.002},
  doi          = {10.22667/JISIS.2018.02.28.002},
  timestamp    = {Tue, 20 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisis/WangZGZYLC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/YanGNP18,
  author       = {Zhiwei Yan and
                  Guanggang Geng and
                  Hidenori Nakazato and
                  Yong{-}Jin Park},
  title        = {Secure and Scalable Deployment of Resource Public Key Infrastructure
                  {(RPKI)}},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {8},
  number       = {1},
  pages        = {31--45},
  year         = {2018},
  url          = {https://doi.org/10.22667/JISIS.2018.02.28.031},
  doi          = {10.22667/JISIS.2018.02.28.031},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/YanGNP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/You18,
  author       = {Ilsun You},
  title        = {Letter from the Editor-in-Chief},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {8},
  number       = {1},
  pages        = {1},
  year         = {2018},
  url          = {https://doi.org/10.22667/JISIS.2018.02.28.001},
  doi          = {10.22667/JISIS.2018.02.28.001},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/You18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/ZhiYM18,
  author       = {Qiang Zhi and
                  Shuichiro Yamamoto and
                  Shuji Morisaki},
  title        = {{IMSA} - Intra Model Security Assurance},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {8},
  number       = {2},
  pages        = {18--32},
  year         = {2018},
  url          = {https://doi.org/10.22667/JISIS.2018.05.31.018},
  doi          = {10.22667/JISIS.2018.05.31.018},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/ZhiYM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}