Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/ijisec/ijisec9.bht:"
@article{DBLP:journals/ijisec/AlbuquerqueKG10, author = {Jo{\~{a}}o Porto de Albuquerque and Heiko Krumm and Paulo L{\'{\i}}cio de Geus}, title = {Formal validation of automated policy refinement in the management of network security systems}, journal = {Int. J. Inf. Sec.}, volume = {9}, number = {2}, pages = {99--125}, year = {2010}, url = {https://doi.org/10.1007/s10207-010-0101-6}, doi = {10.1007/S10207-010-0101-6}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/AlbuquerqueKG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/Baek10, author = {Yoo{-}Jin Baek}, title = {Regular 2\({}^{\mbox{\emph{w}}}\)-ary right-to-left exponentiation algorithm with very efficient {DPA} and {FA} countermeasures}, journal = {Int. J. Inf. Sec.}, volume = {9}, number = {5}, pages = {363--370}, year = {2010}, url = {https://doi.org/10.1007/s10207-010-0118-x}, doi = {10.1007/S10207-010-0118-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/Baek10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/BaylyCAJH10, author = {Duncan Bayly and Maurice Castro and Arathi Arakala and Jason Jeffers and Kathy J. Horadam}, title = {Fractional biometrics: safeguarding privacy in biometric applications}, journal = {Int. J. Inf. Sec.}, volume = {9}, number = {1}, pages = {69--82}, year = {2010}, url = {https://doi.org/10.1007/s10207-009-0096-z}, doi = {10.1007/S10207-009-0096-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/BaylyCAJH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/Bella10, author = {Giampaolo Bella}, title = {The principle of guarantee availability for security protocol analysis}, journal = {Int. J. Inf. Sec.}, volume = {9}, number = {2}, pages = {83--97}, year = {2010}, url = {https://doi.org/10.1007/s10207-009-0097-y}, doi = {10.1007/S10207-009-0097-Y}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/Bella10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/Ben-Ghorbel-TalbiCCB10, author = {Meriam Ben{-}Ghorbel{-}Talbi and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Adel Bouhoula}, title = {A delegation model for extended {RBAC}}, journal = {Int. J. Inf. Sec.}, volume = {9}, number = {3}, pages = {209--236}, year = {2010}, url = {https://doi.org/10.1007/s10207-010-0104-3}, doi = {10.1007/S10207-010-0104-3}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/Ben-Ghorbel-TalbiCCB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/BuhanDHTV10, author = {Ileana Buhan and Jeroen Doumen and Pieter H. Hartel and Qiang Tang and Raymond N. J. Veldhuis}, title = {Embedding renewable cryptographic keys into noisy data}, journal = {Int. J. Inf. Sec.}, volume = {9}, number = {3}, pages = {193--208}, year = {2010}, url = {https://doi.org/10.1007/s10207-010-0103-4}, doi = {10.1007/S10207-010-0103-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/BuhanDHTV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/ChakrabortyMS10, author = {Anindya Chakraborty and Arun K. Majumdar and Shamik Sural}, title = {A column dependency-based approach for static and dynamic recovery of databases from malicious transactions}, journal = {Int. J. Inf. Sec.}, volume = {9}, number = {1}, pages = {51--67}, year = {2010}, url = {https://doi.org/10.1007/s10207-009-0095-0}, doi = {10.1007/S10207-009-0095-0}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/ChakrabortyMS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/ChenC10, author = {Haiyong Chen and Hailiang Chen}, title = {A hybrid scheme for securing fingerprint templates}, journal = {Int. J. Inf. Sec.}, volume = {9}, number = {5}, pages = {353--361}, year = {2010}, url = {https://doi.org/10.1007/s10207-010-0114-1}, doi = {10.1007/S10207-010-0114-1}, timestamp = {Tue, 06 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/ChenC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/DamgardJN10, author = {Ivan Damg{\aa}rd and Mads Jurik and Jesper Buus Nielsen}, title = {A generalization of Paillier's public-key system with applications to electronic voting}, journal = {Int. J. Inf. Sec.}, volume = {9}, number = {6}, pages = {371--385}, year = {2010}, url = {https://doi.org/10.1007/s10207-010-0119-9}, doi = {10.1007/S10207-010-0119-9}, timestamp = {Mon, 06 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/DamgardJN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/DingYDW10, author = {Xuhua Ding and Yanjiang Yang and Robert H. Deng and Shuhong Wang}, title = {A new hardware-assisted {PIR} with O(\emph{n}) shuffle cost}, journal = {Int. J. Inf. Sec.}, volume = {9}, number = {4}, pages = {237--252}, year = {2010}, url = {https://doi.org/10.1007/s10207-010-0105-2}, doi = {10.1007/S10207-010-0105-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/DingYDW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/DupasquierBMS10, author = {Beno{\^{\i}}t Dupasquier and Stefan Burschka and Kieran McLaughlin and Sakir Sezer}, title = {Analysis of information leakage from encrypted Skype conversations}, journal = {Int. J. Inf. Sec.}, volume = {9}, number = {5}, pages = {313--325}, year = {2010}, url = {https://doi.org/10.1007/s10207-010-0111-4}, doi = {10.1007/S10207-010-0111-4}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/DupasquierBMS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/GauravaramKKT10, author = {Praveen Gauravaram and John Kelsey and Lars R. Knudsen and S{\o}ren S. Thomsen}, title = {On hash functions using checksums}, journal = {Int. J. Inf. Sec.}, volume = {9}, number = {2}, pages = {137--151}, year = {2010}, url = {https://doi.org/10.1007/s10207-009-0100-7}, doi = {10.1007/S10207-009-0100-7}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/GauravaramKKT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/GoldschlagSS10, author = {David M. Goldschlag and Stuart G. Stubblebine and Paul F. Syverson}, title = {Temporarily hidden bit commitment and lottery applications}, journal = {Int. J. Inf. Sec.}, volume = {9}, number = {1}, pages = {33--50}, year = {2010}, url = {https://doi.org/10.1007/s10207-009-0094-1}, doi = {10.1007/S10207-009-0094-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/GoldschlagSS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/HanC10, author = {Shuihua Han and Chao{-}Hsien Chu}, title = {Content-based image authentication: current status, issues, and challenges}, journal = {Int. J. Inf. Sec.}, volume = {9}, number = {1}, pages = {19--32}, year = {2010}, url = {https://doi.org/10.1007/s10207-009-0093-2}, doi = {10.1007/S10207-009-0093-2}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/HanC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/KnudsenM10, author = {Lars R. Knudsen and Charlotte V. Miolane}, title = {Counting equations in algebraic attacks on block ciphers}, journal = {Int. J. Inf. Sec.}, volume = {9}, number = {2}, pages = {127--135}, year = {2010}, url = {https://doi.org/10.1007/s10207-009-0099-9}, doi = {10.1007/S10207-009-0099-9}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/KnudsenM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/KunduSM10, author = {Amlan Kundu and Shamik Sural and Arun K. Majumdar}, title = {Database intrusion detection using sequence alignment}, journal = {Int. J. Inf. Sec.}, volume = {9}, number = {3}, pages = {179--191}, year = {2010}, url = {https://doi.org/10.1007/s10207-010-0102-5}, doi = {10.1007/S10207-010-0102-5}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/KunduSM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/LinRBLL10, author = {Dan Lin and Prathima Rao and Elisa Bertino and Ninghui Li and Jorge Lobo}, title = {{EXAM:} a comprehensive environment for the analysis of access control policies}, journal = {Int. J. Inf. Sec.}, volume = {9}, number = {4}, pages = {253--273}, year = {2010}, url = {https://doi.org/10.1007/s10207-010-0106-1}, doi = {10.1007/S10207-010-0106-1}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/LinRBLL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/LinV10, author = {Ching Lin and Vijay Varadharajan}, title = {MobileTrust: a trust enhanced security architecture for mobile agent systems}, journal = {Int. J. Inf. Sec.}, volume = {9}, number = {3}, pages = {153--178}, year = {2010}, url = {https://doi.org/10.1007/s10207-009-0098-x}, doi = {10.1007/S10207-009-0098-X}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/LinV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/LiuBZYW10, author = {Joseph K. Liu and Joonsang Baek and Jianying Zhou and Yanjiang Yang and Jun Wen Wong}, title = {Efficient online/offline identity-based signature for wireless sensor network}, journal = {Int. J. Inf. Sec.}, volume = {9}, number = {4}, pages = {287--296}, year = {2010}, url = {https://doi.org/10.1007/s10207-010-0109-y}, doi = {10.1007/S10207-010-0109-Y}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/LiuBZYW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/MacKenziePS10, author = {Philip D. MacKenzie and Sarvar Patel and Ram Swaminathan}, title = {Password-authenticated key exchange based on {RSA}}, journal = {Int. J. Inf. Sec.}, volume = {9}, number = {6}, pages = {387--410}, year = {2010}, url = {https://doi.org/10.1007/s10207-010-0120-3}, doi = {10.1007/S10207-010-0120-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/MacKenziePS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/NaorP10, author = {Moni Naor and Benny Pinkas}, title = {Efficient trace and revoke schemes}, journal = {Int. J. Inf. Sec.}, volume = {9}, number = {6}, pages = {411--424}, year = {2010}, url = {https://doi.org/10.1007/s10207-010-0121-2}, doi = {10.1007/S10207-010-0121-2}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/NaorP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/PaisJ10, author = {Alwyn Roshan Pais and Shankar Joshi}, title = {A new probabilistic rekeying method for secure multicast groups}, journal = {Int. J. Inf. Sec.}, volume = {9}, number = {4}, pages = {275--286}, year = {2010}, url = {https://doi.org/10.1007/s10207-010-0108-z}, doi = {10.1007/S10207-010-0108-Z}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/PaisJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/SajediJ10, author = {Hedieh Sajedi and Mansour Jamzad}, title = {Using contourlet transform and cover selection for secure steganography}, journal = {Int. J. Inf. Sec.}, volume = {9}, number = {5}, pages = {337--352}, year = {2010}, url = {https://doi.org/10.1007/s10207-010-0112-3}, doi = {10.1007/S10207-010-0112-3}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/SajediJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/SkoricM10, author = {Boris Skoric and Marc X. Makkes}, title = {Flowchart description of security primitives for controlled physical unclonable functions}, journal = {Int. J. Inf. Sec.}, volume = {9}, number = {5}, pages = {327--335}, year = {2010}, url = {https://doi.org/10.1007/s10207-010-0113-2}, doi = {10.1007/S10207-010-0113-2}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/SkoricM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/YuenSM10, author = {Tsz Hon Yuen and Willy Susilo and Yi Mu}, title = {How to construct identity-based signatures without the key escrow problem}, journal = {Int. J. Inf. Sec.}, volume = {9}, number = {4}, pages = {297--311}, year = {2010}, url = {https://doi.org/10.1007/s10207-010-0110-5}, doi = {10.1007/S10207-010-0110-5}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/YuenSM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/ZhengZWSP10, author = {Ruijuan Zheng and Mingchuan Zhang and Qingtao Wu and Shibao Sun and Jiexin Pu}, title = {Analysis and application of Bio-Inspired Multi-Net Security Model}, journal = {Int. J. Inf. Sec.}, volume = {9}, number = {1}, pages = {1--17}, year = {2010}, url = {https://doi.org/10.1007/s10207-009-0091-4}, doi = {10.1007/S10207-009-0091-4}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/ZhengZWSP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.