Search dblp for Publications

export results for "toc:db/journals/ijics/ijics11.bht:"

 download as .bib file

@article{DBLP:journals/ijics/AgarkarA19,
  author       = {Aarti Amod Agarkar and
                  Himanshu Agrawal},
  title        = {Lightweight R-LWE-based privacy preservation scheme for smart grid
                  network},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {11},
  number       = {3},
  pages        = {233--254},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJICS.2019.099433},
  doi          = {10.1504/IJICS.2019.099433},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/AgarkarA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/AhujaB19,
  author       = {Rakesh Ahuja and
                  Sarabjeet Singh Bedi},
  title        = {Video watermarking scheme based on {IDR} frames using {MPEG-2} structure},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {11},
  number       = {6},
  pages        = {585--603},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJICS.2019.103065},
  doi          = {10.1504/IJICS.2019.103065},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/AhujaB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Al-Saraireh19,
  author       = {Ja'afer Al{-}Saraireh},
  title        = {A novel approach for query over encrypted data in database},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {11},
  number       = {6},
  pages        = {621--636},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJICS.2019.103083},
  doi          = {10.1504/IJICS.2019.103083},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Al-Saraireh19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/BhattacharjyaZW19,
  author       = {Aniruddha Bhattacharjya and
                  Xiaofeng Zhong and
                  Jing Wang and
                  Xing Li},
  title        = {On mapping of address and port using translation},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {11},
  number       = {3},
  pages        = {214--232},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJICS.2019.099419},
  doi          = {10.1504/IJICS.2019.099419},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/BhattacharjyaZW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/BrownA19,
  author       = {Adam J. Brown and
                  Todd R. Andel},
  title        = {What's in your honeypot: a privacy compliance perspective},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {11},
  number       = {3},
  pages        = {289--309},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJICS.2019.099443},
  doi          = {10.1504/IJICS.2019.099443},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/BrownA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/CarterT19,
  author       = {Henry Carter and
                  Patrick Traynor},
  title        = {Outsourcing computation for private function evaluation},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {11},
  number       = {6},
  pages        = {525--561},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJICS.2019.103052},
  doi          = {10.1504/IJICS.2019.103052},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/CarterT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/DeviS19,
  author       = {B. S. Kiruthika Devi and
                  T. Subbulakshmi},
  title        = {Cloud-based DDoS attack detection and defence system using statistical
                  approach},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {11},
  number       = {4/5},
  pages        = {447--475},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJICS.2019.101935},
  doi          = {10.1504/IJICS.2019.101935},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/DeviS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Elngar19,
  author       = {Ahmed A. Elngar},
  title        = {An efficient user authentication model for IOT-based healthcare environment},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {11},
  number       = {4/5},
  pages        = {431--446},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJICS.2019.101932},
  doi          = {10.1504/IJICS.2019.101932},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Elngar19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Faraoun19,
  author       = {Kamel Mohamed Faraoun},
  title        = {A novel verifiable and unconditionally secure (m, t, n)-threshold
                  multi-secret sharing scheme using overdetermined systems of linear
                  equations over finite Galois fields},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {11},
  number       = {1},
  pages        = {61--82},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJICS.2019.096849},
  doi          = {10.1504/IJICS.2019.096849},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Faraoun19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Fredj19,
  author       = {Ouissem Ben Fredj},
  title        = {{SPHERES:} an efficient server-side web application protection system},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {11},
  number       = {1},
  pages        = {33--60},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJICS.2019.096848},
  doi          = {10.1504/IJICS.2019.096848},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Fredj19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/HuXWTY19,
  author       = {Xiaoming Hu and
                  Huajie Xu and
                  Jian Wang and
                  WenAn Tan and
                  Yinchun Yang},
  title        = {A generic construction of identity-based proxy signature scheme in
                  the standard model},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {11},
  number       = {1},
  pages        = {83--100},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJICS.2019.096850},
  doi          = {10.1504/IJICS.2019.096850},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/HuXWTY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/KeerthikaM19,
  author       = {V. Keerthika and
                  Nandagopal Malarvizhi},
  title        = {Mitigate black hole attack using bee optimised weighted trust with
                  {AODV} in {MANET}},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {11},
  number       = {3},
  pages        = {275--288},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJICS.2019.099437},
  doi          = {10.1504/IJICS.2019.099437},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/KeerthikaM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/KhanOAMN19,
  author       = {Burhan Ul Islam Khan and
                  Rashidah Funke Olanrewaju and
                  Farhat Anwar and
                  Roohie Naaz Mir and
                  Athaur Rahman Najeeb},
  title        = {A critical insight into the effectiveness of research methods evolved
                  to secure IoT ecosystem},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {11},
  number       = {4/5},
  pages        = {332--354},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJICS.2019.101908},
  doi          = {10.1504/IJICS.2019.101908},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/KhanOAMN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/KhemissaTB19,
  author       = {Hamza Khemissa and
                  Djamel Tandjaoui and
                  Samia Bouzefrane},
  title        = {An efficient authentication and key agreement scheme for e-health
                  applications in the context of internet of things},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {11},
  number       = {4/5},
  pages        = {355--390},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJICS.2019.101926},
  doi          = {10.1504/IJICS.2019.101926},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/KhemissaTB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/LiZ19,
  author       = {Jiaying Li and
                  Baowen Zhang},
  title        = {An ontology-based approach to improve access policy administration
                  of attribute-based access control},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {11},
  number       = {4/5},
  pages        = {391--412},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJICS.2019.101928},
  doi          = {10.1504/IJICS.2019.101928},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/LiZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/ManikandasaranA19,
  author       = {S. S. Manikandasaran and
                  Lawrence Arockiam and
                  P. D. Sheba Kezia Malarchelvi},
  title        = {MONcrypt: a technique to ensure the confidentiality of outsourced
                  data in cloud storage},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {11},
  number       = {1},
  pages        = {1--16},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJICS.2019.096846},
  doi          = {10.1504/IJICS.2019.096846},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/ManikandasaranA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/MuTL19,
  author       = {Sheng{-}dong Mu and
                  Yixiang Tian and
                  Yiwei Luo},
  title        = {A study of the internet financial interest rate risk evaluation index
                  system in cloud computing},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {11},
  number       = {2},
  pages        = {103--119},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJICS.2019.098198},
  doi          = {10.1504/IJICS.2019.098198},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/MuTL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/NishaP19,
  author       = {T. N. Nisha and
                  Dhanya Pramod},
  title        = {Sequential pattern analysis for event-based intrusion detection},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {11},
  number       = {4/5},
  pages        = {476--492},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJICS.2019.101936},
  doi          = {10.1504/IJICS.2019.101936},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/NishaP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/RasheedNGF19,
  author       = {Mohammad M. Rasheed and
                  Norita Md Norwawi and
                  Osman Ghazali and
                  Munadil K. Faaeq},
  title        = {Detection algorithm for internet worms scanning that used user datagram
                  protocol},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {11},
  number       = {1},
  pages        = {17--32},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJICS.2019.096847},
  doi          = {10.1504/IJICS.2019.096847},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/RasheedNGF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/RevaneshSA19,
  author       = {M. Revanesh and
                  V. Sridhar and
                  John M. Acken},
  title        = {{CB-ALCA:} a cluster-based adaptive lightweight cryptographic algorithm
                  for secure routing in wireless sensor networks},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {11},
  number       = {6},
  pages        = {637--662},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJICS.2019.103108},
  doi          = {10.1504/IJICS.2019.103108},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/RevaneshSA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Sajedi19,
  author       = {Hedieh Sajedi},
  title        = {An ensemble algorithm for discovery of malicious web pages},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {11},
  number       = {3},
  pages        = {203--213},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJICS.2019.099408},
  doi          = {10.1504/IJICS.2019.099408},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Sajedi19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/SharmaB19,
  author       = {Kirti Sharma and
                  Shobha Bhatt},
  title        = {{SQL} injection attacks - a systematic review},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {11},
  number       = {4/5},
  pages        = {493--509},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJICS.2019.101937},
  doi          = {10.1504/IJICS.2019.101937},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/SharmaB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/ShenZ19,
  author       = {Jaryn Shen and
                  Qingkai Zeng},
  title        = {{CSPS:} catchy short passwords making offline and online attacks impossible},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {11},
  number       = {3},
  pages        = {255--274},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJICS.2019.099434},
  doi          = {10.1504/IJICS.2019.099434},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/ShenZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/VenkateswarluK19,
  author       = {Isunuri Bala Venkateswarlu and
                  Jagadeesh Kakarla},
  title        = {Password security by encryption using an extended {ADFGVX} cipher},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {11},
  number       = {4/5},
  pages        = {510--523},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJICS.2019.101938},
  doi          = {10.1504/IJICS.2019.101938},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/VenkateswarluK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/WangXWH19,
  author       = {Haixing Wang and
                  Guiping Xiao and
                  Zhen Wei and
                  Tao Hai},
  title        = {Network optimisation for improving security and safety level of dangerous
                  goods transportation based on cloud computing},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {11},
  number       = {2},
  pages        = {160--177},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJICS.2019.098204},
  doi          = {10.1504/IJICS.2019.098204},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/WangXWH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/WangY19,
  author       = {Xiaolei Wang and
                  Yuexiang Yang},
  title        = {PrivacyContext: identifying malicious mobile privacy leak using program
                  context},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {11},
  number       = {6},
  pages        = {562--584},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJICS.2019.103054},
  doi          = {10.1504/IJICS.2019.103054},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/WangY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/XuSLMWLY19,
  author       = {He Xu and
                  Weiwei Shen and
                  Peng Li and
                  Keith Mayes and
                  Ruchuan Wang and
                  Dashen Li and
                  Shengxiang Yang},
  title        = {Novel implementation of defence strategy of relay attack based on
                  cloud in {RFID} systems},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {11},
  number       = {2},
  pages        = {120--144},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJICS.2019.098199},
  doi          = {10.1504/IJICS.2019.098199},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/XuSLMWLY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/YagoubKB19,
  author       = {Mohammed Amine Yagoub and
                  Okba Kazar and
                  Mounir Beggas},
  title        = {A multi-agent system approach based on cryptographic algorithm for
                  securing communications and protecting stored data in the cloud-computing
                  environment},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {11},
  number       = {4/5},
  pages        = {413--430},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJICS.2019.101931},
  doi          = {10.1504/IJICS.2019.101931},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/YagoubKB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/YangJW19,
  author       = {Su Yang and
                  Shen Junwei and
                  Wang Wei},
  title        = {Reconfigurable design and implementation of nonlinear Boolean function
                  for cloud computing security platform},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {11},
  number       = {2},
  pages        = {145--159},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJICS.2019.098201},
  doi          = {10.1504/IJICS.2019.098201},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/YangJW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/YingyingH19,
  author       = {Mao Yingying and
                  Yuan Hao},
  title        = {Study on data fuzzy breakpoint detection in massive dynamic data flow},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {11},
  number       = {6},
  pages        = {604--620},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJICS.2019.103074},
  doi          = {10.1504/IJICS.2019.103074},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/YingyingH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/YoussefNR19,
  author       = {Ben Charhi Youssef and
                  Mannane Nada and
                  Boubker Regragui},
  title        = {Behavioural analysis approach for {IDS} based on attack pattern and
                  risk assessment in cloud computing},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {11},
  number       = {4/5},
  pages        = {315--331},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJICS.2019.101907},
  doi          = {10.1504/IJICS.2019.101907},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/YoussefNR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/ZhangLH19,
  author       = {Xiao Zhang and
                  Shengli Liu and
                  Shuai Han},
  title        = {Proofs of retrievability from linearly homomorphic structure-preserving
                  signatures},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {11},
  number       = {2},
  pages        = {178--202},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJICS.2019.098205},
  doi          = {10.1504/IJICS.2019.098205},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/ZhangLH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics