Search dblp for Publications

export results for "toc:db/journals/ijisec/ijisec9.bht:"

 download as .bib file

@article{DBLP:journals/ijisec/AlbuquerqueKG10,
  author       = {Jo{\~{a}}o Porto de Albuquerque and
                  Heiko Krumm and
                  Paulo L{\'{\i}}cio de Geus},
  title        = {Formal validation of automated policy refinement in the management
                  of network security systems},
  journal      = {Int. J. Inf. Sec.},
  volume       = {9},
  number       = {2},
  pages        = {99--125},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10207-010-0101-6},
  doi          = {10.1007/S10207-010-0101-6},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/AlbuquerqueKG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/Baek10,
  author       = {Yoo{-}Jin Baek},
  title        = {Regular 2\({}^{\mbox{\emph{w}}}\)-ary right-to-left exponentiation
                  algorithm with very efficient {DPA} and {FA} countermeasures},
  journal      = {Int. J. Inf. Sec.},
  volume       = {9},
  number       = {5},
  pages        = {363--370},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10207-010-0118-x},
  doi          = {10.1007/S10207-010-0118-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/Baek10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/BaylyCAJH10,
  author       = {Duncan Bayly and
                  Maurice Castro and
                  Arathi Arakala and
                  Jason Jeffers and
                  Kathy J. Horadam},
  title        = {Fractional biometrics: safeguarding privacy in biometric applications},
  journal      = {Int. J. Inf. Sec.},
  volume       = {9},
  number       = {1},
  pages        = {69--82},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10207-009-0096-z},
  doi          = {10.1007/S10207-009-0096-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/BaylyCAJH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/Bella10,
  author       = {Giampaolo Bella},
  title        = {The principle of guarantee availability for security protocol analysis},
  journal      = {Int. J. Inf. Sec.},
  volume       = {9},
  number       = {2},
  pages        = {83--97},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10207-009-0097-y},
  doi          = {10.1007/S10207-009-0097-Y},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/Bella10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/Ben-Ghorbel-TalbiCCB10,
  author       = {Meriam Ben{-}Ghorbel{-}Talbi and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Adel Bouhoula},
  title        = {A delegation model for extended {RBAC}},
  journal      = {Int. J. Inf. Sec.},
  volume       = {9},
  number       = {3},
  pages        = {209--236},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10207-010-0104-3},
  doi          = {10.1007/S10207-010-0104-3},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/Ben-Ghorbel-TalbiCCB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/BuhanDHTV10,
  author       = {Ileana Buhan and
                  Jeroen Doumen and
                  Pieter H. Hartel and
                  Qiang Tang and
                  Raymond N. J. Veldhuis},
  title        = {Embedding renewable cryptographic keys into noisy data},
  journal      = {Int. J. Inf. Sec.},
  volume       = {9},
  number       = {3},
  pages        = {193--208},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10207-010-0103-4},
  doi          = {10.1007/S10207-010-0103-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/BuhanDHTV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/ChakrabortyMS10,
  author       = {Anindya Chakraborty and
                  Arun K. Majumdar and
                  Shamik Sural},
  title        = {A column dependency-based approach for static and dynamic recovery
                  of databases from malicious transactions},
  journal      = {Int. J. Inf. Sec.},
  volume       = {9},
  number       = {1},
  pages        = {51--67},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10207-009-0095-0},
  doi          = {10.1007/S10207-009-0095-0},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/ChakrabortyMS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/ChenC10,
  author       = {Haiyong Chen and
                  Hailiang Chen},
  title        = {A hybrid scheme for securing fingerprint templates},
  journal      = {Int. J. Inf. Sec.},
  volume       = {9},
  number       = {5},
  pages        = {353--361},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10207-010-0114-1},
  doi          = {10.1007/S10207-010-0114-1},
  timestamp    = {Tue, 06 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/ChenC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/DamgardJN10,
  author       = {Ivan Damg{\aa}rd and
                  Mads Jurik and
                  Jesper Buus Nielsen},
  title        = {A generalization of Paillier's public-key system with applications
                  to electronic voting},
  journal      = {Int. J. Inf. Sec.},
  volume       = {9},
  number       = {6},
  pages        = {371--385},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10207-010-0119-9},
  doi          = {10.1007/S10207-010-0119-9},
  timestamp    = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/DamgardJN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/DingYDW10,
  author       = {Xuhua Ding and
                  Yanjiang Yang and
                  Robert H. Deng and
                  Shuhong Wang},
  title        = {A new hardware-assisted {PIR} with O(\emph{n}) shuffle cost},
  journal      = {Int. J. Inf. Sec.},
  volume       = {9},
  number       = {4},
  pages        = {237--252},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10207-010-0105-2},
  doi          = {10.1007/S10207-010-0105-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/DingYDW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/DupasquierBMS10,
  author       = {Beno{\^{\i}}t Dupasquier and
                  Stefan Burschka and
                  Kieran McLaughlin and
                  Sakir Sezer},
  title        = {Analysis of information leakage from encrypted Skype conversations},
  journal      = {Int. J. Inf. Sec.},
  volume       = {9},
  number       = {5},
  pages        = {313--325},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10207-010-0111-4},
  doi          = {10.1007/S10207-010-0111-4},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/DupasquierBMS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/GauravaramKKT10,
  author       = {Praveen Gauravaram and
                  John Kelsey and
                  Lars R. Knudsen and
                  S{\o}ren S. Thomsen},
  title        = {On hash functions using checksums},
  journal      = {Int. J. Inf. Sec.},
  volume       = {9},
  number       = {2},
  pages        = {137--151},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10207-009-0100-7},
  doi          = {10.1007/S10207-009-0100-7},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/GauravaramKKT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/GoldschlagSS10,
  author       = {David M. Goldschlag and
                  Stuart G. Stubblebine and
                  Paul F. Syverson},
  title        = {Temporarily hidden bit commitment and lottery applications},
  journal      = {Int. J. Inf. Sec.},
  volume       = {9},
  number       = {1},
  pages        = {33--50},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10207-009-0094-1},
  doi          = {10.1007/S10207-009-0094-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/GoldschlagSS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/HanC10,
  author       = {Shuihua Han and
                  Chao{-}Hsien Chu},
  title        = {Content-based image authentication: current status, issues, and challenges},
  journal      = {Int. J. Inf. Sec.},
  volume       = {9},
  number       = {1},
  pages        = {19--32},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10207-009-0093-2},
  doi          = {10.1007/S10207-009-0093-2},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/HanC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/KnudsenM10,
  author       = {Lars R. Knudsen and
                  Charlotte V. Miolane},
  title        = {Counting equations in algebraic attacks on block ciphers},
  journal      = {Int. J. Inf. Sec.},
  volume       = {9},
  number       = {2},
  pages        = {127--135},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10207-009-0099-9},
  doi          = {10.1007/S10207-009-0099-9},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/KnudsenM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/KunduSM10,
  author       = {Amlan Kundu and
                  Shamik Sural and
                  Arun K. Majumdar},
  title        = {Database intrusion detection using sequence alignment},
  journal      = {Int. J. Inf. Sec.},
  volume       = {9},
  number       = {3},
  pages        = {179--191},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10207-010-0102-5},
  doi          = {10.1007/S10207-010-0102-5},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/KunduSM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/LinRBLL10,
  author       = {Dan Lin and
                  Prathima Rao and
                  Elisa Bertino and
                  Ninghui Li and
                  Jorge Lobo},
  title        = {{EXAM:} a comprehensive environment for the analysis of access control
                  policies},
  journal      = {Int. J. Inf. Sec.},
  volume       = {9},
  number       = {4},
  pages        = {253--273},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10207-010-0106-1},
  doi          = {10.1007/S10207-010-0106-1},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/LinRBLL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/LinV10,
  author       = {Ching Lin and
                  Vijay Varadharajan},
  title        = {MobileTrust: a trust enhanced security architecture for mobile agent
                  systems},
  journal      = {Int. J. Inf. Sec.},
  volume       = {9},
  number       = {3},
  pages        = {153--178},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10207-009-0098-x},
  doi          = {10.1007/S10207-009-0098-X},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/LinV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/LiuBZYW10,
  author       = {Joseph K. Liu and
                  Joonsang Baek and
                  Jianying Zhou and
                  Yanjiang Yang and
                  Jun Wen Wong},
  title        = {Efficient online/offline identity-based signature for wireless sensor
                  network},
  journal      = {Int. J. Inf. Sec.},
  volume       = {9},
  number       = {4},
  pages        = {287--296},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10207-010-0109-y},
  doi          = {10.1007/S10207-010-0109-Y},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/LiuBZYW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/MacKenziePS10,
  author       = {Philip D. MacKenzie and
                  Sarvar Patel and
                  Ram Swaminathan},
  title        = {Password-authenticated key exchange based on {RSA}},
  journal      = {Int. J. Inf. Sec.},
  volume       = {9},
  number       = {6},
  pages        = {387--410},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10207-010-0120-3},
  doi          = {10.1007/S10207-010-0120-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/MacKenziePS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/NaorP10,
  author       = {Moni Naor and
                  Benny Pinkas},
  title        = {Efficient trace and revoke schemes},
  journal      = {Int. J. Inf. Sec.},
  volume       = {9},
  number       = {6},
  pages        = {411--424},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10207-010-0121-2},
  doi          = {10.1007/S10207-010-0121-2},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/NaorP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/PaisJ10,
  author       = {Alwyn Roshan Pais and
                  Shankar Joshi},
  title        = {A new probabilistic rekeying method for secure multicast groups},
  journal      = {Int. J. Inf. Sec.},
  volume       = {9},
  number       = {4},
  pages        = {275--286},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10207-010-0108-z},
  doi          = {10.1007/S10207-010-0108-Z},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/PaisJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/SajediJ10,
  author       = {Hedieh Sajedi and
                  Mansour Jamzad},
  title        = {Using contourlet transform and cover selection for secure steganography},
  journal      = {Int. J. Inf. Sec.},
  volume       = {9},
  number       = {5},
  pages        = {337--352},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10207-010-0112-3},
  doi          = {10.1007/S10207-010-0112-3},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/SajediJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/SkoricM10,
  author       = {Boris Skoric and
                  Marc X. Makkes},
  title        = {Flowchart description of security primitives for controlled physical
                  unclonable functions},
  journal      = {Int. J. Inf. Sec.},
  volume       = {9},
  number       = {5},
  pages        = {327--335},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10207-010-0113-2},
  doi          = {10.1007/S10207-010-0113-2},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/SkoricM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/YuenSM10,
  author       = {Tsz Hon Yuen and
                  Willy Susilo and
                  Yi Mu},
  title        = {How to construct identity-based signatures without the key escrow
                  problem},
  journal      = {Int. J. Inf. Sec.},
  volume       = {9},
  number       = {4},
  pages        = {297--311},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10207-010-0110-5},
  doi          = {10.1007/S10207-010-0110-5},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/YuenSM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/ZhengZWSP10,
  author       = {Ruijuan Zheng and
                  Mingchuan Zhang and
                  Qingtao Wu and
                  Shibao Sun and
                  Jiexin Pu},
  title        = {Analysis and application of Bio-Inspired Multi-Net Security Model},
  journal      = {Int. J. Inf. Sec.},
  volume       = {9},
  number       = {1},
  pages        = {1--17},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10207-009-0091-4},
  doi          = {10.1007/S10207-009-0091-4},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/ZhengZWSP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics