Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/ijisec/ijisec17.bht:"
@article{DBLP:journals/ijisec/0001YASMG18, author = {Daiki Chiba and Takeshi Yagi and Mitsuaki Akiyama and Toshiki Shibahara and Tatsuya Mori and Shigeki Goto}, title = {DomainProfiler: toward accurate and early discovery of domain names abused in future}, journal = {Int. J. Inf. Sec.}, volume = {17}, number = {6}, pages = {661--680}, year = {2018}, url = {https://doi.org/10.1007/s10207-017-0396-7}, doi = {10.1007/S10207-017-0396-7}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/0001YASMG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/AkiyamaYHK18, author = {Mitsuaki Akiyama and Takeshi Yagi and Takeo Hariu and Youki Kadobayashi}, title = {HoneyCirculator: distributing credential honeytoken for introspection of web-based attack cycle}, journal = {Int. J. Inf. Sec.}, volume = {17}, number = {2}, pages = {135--151}, year = {2018}, url = {https://doi.org/10.1007/s10207-017-0361-5}, doi = {10.1007/S10207-017-0361-5}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/AkiyamaYHK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/AliMLH18, author = {Syed Taha Ali and Patrick McCorry and Peter Hyun{-}Jeen Lee and Feng Hao}, title = {ZombieCoin 2.0: managing next-generation botnets using Bitcoin}, journal = {Int. J. Inf. Sec.}, volume = {17}, number = {4}, pages = {411--422}, year = {2018}, url = {https://doi.org/10.1007/s10207-017-0379-8}, doi = {10.1007/S10207-017-0379-8}, timestamp = {Mon, 12 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/AliMLH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/AyedICC18, author = {Samiha Ayed and Muhammad Sabir Idrees and Nora Cuppens and Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {Achieving dynamicity in security policies enforcement using aspects}, journal = {Int. J. Inf. Sec.}, volume = {17}, number = {1}, pages = {83--103}, year = {2018}, url = {https://doi.org/10.1007/s10207-016-0357-6}, doi = {10.1007/S10207-016-0357-6}, timestamp = {Tue, 23 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/AyedICC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/BernardiniR18, author = {Riccardo Bernardini and Roberto Rinaldo}, title = {Generalized Elias schemes for efficient harvesting of truly random bits}, journal = {Int. J. Inf. Sec.}, volume = {17}, number = {1}, pages = {67--81}, year = {2018}, url = {https://doi.org/10.1007/s10207-016-0358-5}, doi = {10.1007/S10207-016-0358-5}, timestamp = {Thu, 25 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/BernardiniR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/Bindel0R18, author = {Nina Bindel and Johannes Buchmann and Susanne Rie{\ss}}, title = {Comparing apples with apples: performance analysis of lattice-based authenticated key exchange protocols}, journal = {Int. J. Inf. Sec.}, volume = {17}, number = {6}, pages = {701--718}, year = {2018}, url = {https://doi.org/10.1007/s10207-017-0397-6}, doi = {10.1007/S10207-017-0397-6}, timestamp = {Wed, 03 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/Bindel0R18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/ChenHM18, author = {Liqun Chen and Jinguang Han and Chris J. Mitchell}, title = {Message from the Guest Editors}, journal = {Int. J. Inf. Sec.}, volume = {17}, number = {5}, pages = {491--492}, year = {2018}, url = {https://doi.org/10.1007/s10207-018-0416-2}, doi = {10.1007/S10207-018-0416-2}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/ChenHM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/CimitileMNSV18, author = {Aniello Cimitile and Francesco Mercaldo and Vittoria Nardone and Antonella Santone and Corrado Aaron Visaggio}, title = {Talos: no more ransomware victims with formal methods}, journal = {Int. J. Inf. Sec.}, volume = {17}, number = {6}, pages = {719--738}, year = {2018}, url = {https://doi.org/10.1007/s10207-017-0398-5}, doi = {10.1007/S10207-017-0398-5}, timestamp = {Fri, 21 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/CimitileMNSV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/DeepaTKPPP18, author = {G. Deepa and P. Santhi Thilagam and Furqan Ahmed Khan and Amit Praseed and Alwyn R. Pais and Nushafreen Palsetia}, title = {Black-box detection of XQuery injection and parameter tampering vulnerabilities in web applications}, journal = {Int. J. Inf. Sec.}, volume = {17}, number = {1}, pages = {105--120}, year = {2018}, url = {https://doi.org/10.1007/s10207-016-0359-4}, doi = {10.1007/S10207-016-0359-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/DeepaTKPPP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/DengZWQL18, author = {Hua Deng and Yunya Zhou and Qianhong Wu and Bo Qin and Jianwei Liu}, title = {Secure pay-TV for chained hotels}, journal = {Int. J. Inf. Sec.}, volume = {17}, number = {1}, pages = {33--42}, year = {2018}, url = {https://doi.org/10.1007/s10207-016-0354-9}, doi = {10.1007/S10207-016-0354-9}, timestamp = {Tue, 03 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/DengZWQL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/Domingo-FerrerB18, author = {Josep Domingo{-}Ferrer and Alberto Blanco{-}Justicia and Carla R{\`{a}}fols}, title = {Dynamic group size accreditation and group discounts preserving anonymity}, journal = {Int. J. Inf. Sec.}, volume = {17}, number = {3}, pages = {243--260}, year = {2018}, url = {https://doi.org/10.1007/s10207-017-0368-y}, doi = {10.1007/S10207-017-0368-Y}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/Domingo-FerrerB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/ElSalamounyG18, author = {Ehab ElSalamouny and S{\'{e}}bastien Gambs}, title = {Optimal noise functions for location privacy on continuous regions}, journal = {Int. J. Inf. Sec.}, volume = {17}, number = {6}, pages = {613--630}, year = {2018}, url = {https://doi.org/10.1007/s10207-017-0384-y}, doi = {10.1007/S10207-017-0384-Y}, timestamp = {Wed, 03 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/ElSalamounyG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/FaustH018, author = {Sebastian Faust and Carmit Hazay and Daniele Venturi}, title = {Outsourced pattern matching}, journal = {Int. J. Inf. Sec.}, volume = {17}, number = {3}, pages = {327--346}, year = {2018}, url = {https://doi.org/10.1007/s10207-017-0374-0}, doi = {10.1007/S10207-017-0374-0}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/FaustH018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/Frattolillo18, author = {Franco Frattolillo}, title = {Watermarking protocols: an excursus to motivate a new approach}, journal = {Int. J. Inf. Sec.}, volume = {17}, number = {5}, pages = {587--601}, year = {2018}, url = {https://doi.org/10.1007/s10207-017-0386-9}, doi = {10.1007/S10207-017-0386-9}, timestamp = {Thu, 13 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/Frattolillo18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/Gonzalez-Serrano18, author = {Francisco Javier Gonz{\'{a}}lez{-}Serrano and Adrian Amor{-}Martin and Jorge Casamayon{-}Anton}, title = {Supervised machine learning using encrypted training data}, journal = {Int. J. Inf. Sec.}, volume = {17}, number = {4}, pages = {365--377}, year = {2018}, url = {https://doi.org/10.1007/s10207-017-0381-1}, doi = {10.1007/S10207-017-0381-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/Gonzalez-Serrano18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/GruberB18, author = {Aviv Gruber and Irad Ben{-}Gal}, title = {Using targeted Bayesian network learning for suspect identification in communication networks}, journal = {Int. J. Inf. Sec.}, volume = {17}, number = {2}, pages = {169--181}, year = {2018}, url = {https://doi.org/10.1007/s10207-017-0362-4}, doi = {10.1007/S10207-017-0362-4}, timestamp = {Mon, 11 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/GruberB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/HamLS18, author = {HyoungMin Ham and JongHyup Lee and JooSeok Song}, title = {Improved yoking proof protocols for preserving anonymity}, journal = {Int. J. Inf. Sec.}, volume = {17}, number = {4}, pages = {379--393}, year = {2018}, url = {https://doi.org/10.1007/s10207-017-0383-z}, doi = {10.1007/S10207-017-0383-Z}, timestamp = {Thu, 19 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/HamLS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/ImamuraMI18, author = {Kazuya Imamura and Kazuhiko Minematsu and Tetsu Iwata}, title = {Integrity analysis of authenticated encryption based on stream ciphers}, journal = {Int. J. Inf. Sec.}, volume = {17}, number = {5}, pages = {493--511}, year = {2018}, url = {https://doi.org/10.1007/s10207-017-0378-9}, doi = {10.1007/S10207-017-0378-9}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/ImamuraMI18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/JiaCLHW18, author = {Hongyong Jia and Yue Chen and Julong Lan and Kaixiang Huang and Jun Wang}, title = {Efficient revocable hierarchical identity-based encryption using cryptographic accumulators}, journal = {Int. J. Inf. Sec.}, volume = {17}, number = {4}, pages = {477--490}, year = {2018}, url = {https://doi.org/10.1007/s10207-017-0387-8}, doi = {10.1007/S10207-017-0387-8}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/JiaCLHW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/JiangSMG18, author = {Yinhao Jiang and Willy Susilo and Yi Mu and Fuchun Guo}, title = {Flexible ciphertext-policy attribute-based encryption supporting AND-gate and threshold with short ciphertexts}, journal = {Int. J. Inf. Sec.}, volume = {17}, number = {4}, pages = {463--475}, year = {2018}, url = {https://doi.org/10.1007/s10207-017-0376-y}, doi = {10.1007/S10207-017-0376-Y}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/JiangSMG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/JiangSMG18a, author = {Yinhao Jiang and Willy Susilo and Yi Mu and Fuchun Guo}, title = {Ciphertext-policy attribute-based encryption supporting access policy update and its extension with preserved attributes}, journal = {Int. J. Inf. Sec.}, volume = {17}, number = {5}, pages = {533--548}, year = {2018}, url = {https://doi.org/10.1007/s10207-017-0388-7}, doi = {10.1007/S10207-017-0388-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/JiangSMG18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/KuoYH18, author = {Tsung{-}Min Kuo and Sung{-}Ming Yen and Meng{-}Che Han}, title = {Dynamic reversed accumulator}, journal = {Int. J. Inf. Sec.}, volume = {17}, number = {2}, pages = {183--191}, year = {2018}, url = {https://doi.org/10.1007/s10207-017-0360-6}, doi = {10.1007/S10207-017-0360-6}, timestamp = {Tue, 06 Mar 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/KuoYH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/LanetBBL18, author = {Jean{-}Louis Lanet and H{\'{e}}l{\`{e}}ne Le Bouder and Mohammed Benattou and Axel Legay}, title = {When time meets test}, journal = {Int. J. Inf. Sec.}, volume = {17}, number = {4}, pages = {395--409}, year = {2018}, url = {https://doi.org/10.1007/s10207-017-0371-3}, doi = {10.1007/S10207-017-0371-3}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/LanetBBL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/LaszkaVK18, author = {Aron Laszka and Yevgeniy Vorobeychik and Xenofon D. Koutsoukos}, title = {A game-theoretic approach for integrity assurance in resource-bounded systems}, journal = {Int. J. Inf. Sec.}, volume = {17}, number = {2}, pages = {221--242}, year = {2018}, url = {https://doi.org/10.1007/s10207-017-0364-2}, doi = {10.1007/S10207-017-0364-2}, timestamp = {Tue, 06 Mar 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/LaszkaVK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/LiZQLX18, author = {Yuxi Li and Fucai Zhou and Yuhai Qin and Muqing Lin and Zifeng Xu}, title = {Integrity-verifiable conjunctive keyword searchable encryption in cloud storage}, journal = {Int. J. Inf. Sec.}, volume = {17}, number = {5}, pages = {549--568}, year = {2018}, url = {https://doi.org/10.1007/s10207-017-0394-9}, doi = {10.1007/S10207-017-0394-9}, timestamp = {Wed, 05 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/LiZQLX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/Lopriore18, author = {Lanfranco Lopriore}, title = {Access right management by extended password capabilities}, journal = {Int. J. Inf. Sec.}, volume = {17}, number = {5}, pages = {603--612}, year = {2018}, url = {https://doi.org/10.1007/s10207-017-0390-0}, doi = {10.1007/S10207-017-0390-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/Lopriore18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/LuoCLPB18, author = {Ying Luo and Sen{-}Ching S. Cheung and Riccardo Lazzeretti and Tommaso Pignata and Mauro Barni}, title = {Anonymous subject identification and privacy information management in video surveillance}, journal = {Int. J. Inf. Sec.}, volume = {17}, number = {3}, pages = {261--278}, year = {2018}, url = {https://doi.org/10.1007/s10207-017-0380-2}, doi = {10.1007/S10207-017-0380-2}, timestamp = {Thu, 31 Mar 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/LuoCLPB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/Martinez-Balleste18, author = {Antoni Mart{\'{\i}}nez{-}Ballest{\'{e}} and Hatem A. Rashwan and Domenec Puig and Agusti Solanas}, title = {Design and implementation of a secure and trustworthy platform for privacy-aware video surveillance}, journal = {Int. J. Inf. Sec.}, volume = {17}, number = {3}, pages = {279--290}, year = {2018}, url = {https://doi.org/10.1007/s10207-017-0370-4}, doi = {10.1007/S10207-017-0370-4}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/Martinez-Balleste18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/MehrnezhadTSH18, author = {Maryam Mehrnezhad and Ehsan Toreini and Siamak F. Shahandashti and Feng Hao}, title = {Stealing PINs via mobile sensors: actual risk versus user perception}, journal = {Int. J. Inf. Sec.}, volume = {17}, number = {3}, pages = {291--313}, year = {2018}, url = {https://doi.org/10.1007/s10207-017-0369-x}, doi = {10.1007/S10207-017-0369-X}, timestamp = {Mon, 12 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/MehrnezhadTSH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/Morales-Sandoval18, author = {Miguel Morales{-}Sandoval and Jos{\'{e}} Luis Gonz{\'{a}}lez and Arturo Diaz{-}Perez and V{\'{\i}}ctor Jes{\'{u}}s Sosa Sosa}, title = {A pairing-based cryptographic approach for data security in the cloud}, journal = {Int. J. Inf. Sec.}, volume = {17}, number = {4}, pages = {441--461}, year = {2018}, url = {https://doi.org/10.1007/s10207-017-0375-z}, doi = {10.1007/S10207-017-0375-Z}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/Morales-Sandoval18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/MurakamiU18, author = {Keisuke Murakami and Takeaki Uno}, title = {Optimization algorithm for k-anonymization of datasets with low information loss}, journal = {Int. J. Inf. Sec.}, volume = {17}, number = {6}, pages = {631--644}, year = {2018}, url = {https://doi.org/10.1007/s10207-017-0392-y}, doi = {10.1007/S10207-017-0392-Y}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/MurakamiU18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/RialDK18, author = {Alfredo Rial and George Danezis and Markulf Kohlweiss}, title = {Privacy-preserving smart metering revisited}, journal = {Int. J. Inf. Sec.}, volume = {17}, number = {1}, pages = {1--31}, year = {2018}, url = {https://doi.org/10.1007/s10207-016-0355-8}, doi = {10.1007/S10207-016-0355-8}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/RialDK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/RibeiroLEM18, author = {Carlos Ribeiro and Herbert Leitold and Simon Esposito and David Mitzam}, title = {{STORK:} a real, heterogeneous, large-scale eID management system}, journal = {Int. J. Inf. Sec.}, volume = {17}, number = {5}, pages = {569--585}, year = {2018}, url = {https://doi.org/10.1007/s10207-017-0385-x}, doi = {10.1007/S10207-017-0385-X}, timestamp = {Wed, 05 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/RibeiroLEM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/RoyS18, author = {Sangita Roy and Ashok Singh Sairam}, title = {Distributed star coloring of network for {IP} traceback}, journal = {Int. J. Inf. Sec.}, volume = {17}, number = {3}, pages = {315--326}, year = {2018}, url = {https://doi.org/10.1007/s10207-017-0366-0}, doi = {10.1007/S10207-017-0366-0}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/RoyS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/ScaifeCLJT18, author = {Nolen Scaife and Henry Carter and Lyrissa Lidsky and Rachael L. Jones and Patrick Traynor}, title = {OnionDNS: a seizure-resistant top-level domain}, journal = {Int. J. Inf. Sec.}, volume = {17}, number = {6}, pages = {645--660}, year = {2018}, url = {https://doi.org/10.1007/s10207-017-0391-z}, doi = {10.1007/S10207-017-0391-Z}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/ScaifeCLJT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/SeoEXY18, author = {Jae Hong Seo and Keita Emura and Keita Xagawa and Kazuki Yoneyama}, title = {Accumulable optimistic fair exchange from verifiably encrypted homomorphic signatures}, journal = {Int. J. Inf. Sec.}, volume = {17}, number = {2}, pages = {193--220}, year = {2018}, url = {https://doi.org/10.1007/s10207-017-0367-z}, doi = {10.1007/S10207-017-0367-Z}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/SeoEXY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/ShahGJC18, author = {Ankit Shah and Rajesh Ganesan and Sushil Jajodia and Hasan Cam}, title = {A methodology to measure and monitor level of operational effectiveness of a {CSOC}}, journal = {Int. J. Inf. Sec.}, volume = {17}, number = {2}, pages = {121--134}, year = {2018}, url = {https://doi.org/10.1007/s10207-017-0365-1}, doi = {10.1007/S10207-017-0365-1}, timestamp = {Tue, 21 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/ShahGJC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/VenkateshA18, author = {G. Kirubavathi Venkatesh and R. Anitha}, title = {Structural analysis and detection of android botnets using machine learning techniques}, journal = {Int. J. Inf. Sec.}, volume = {17}, number = {2}, pages = {153--167}, year = {2018}, url = {https://doi.org/10.1007/s10207-017-0363-3}, doi = {10.1007/S10207-017-0363-3}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/VenkateshA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/WangPD18, author = {Yujue Wang and HweeHwa Pang and Robert H. Deng}, title = {Verifiably encrypted cascade-instantiable blank signatures to secure progressive decision management}, journal = {Int. J. Inf. Sec.}, volume = {17}, number = {3}, pages = {347--363}, year = {2018}, url = {https://doi.org/10.1007/s10207-017-0372-2}, doi = {10.1007/S10207-017-0372-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/WangPD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/WangenHS18, author = {Gaute Wangen and Christoffer Hallstensen and Einar Snekkenes}, title = {A framework for estimating information security risk assessment method completeness - Core Unified Risk Framework, {CURF}}, journal = {Int. J. Inf. Sec.}, volume = {17}, number = {6}, pages = {681--699}, year = {2018}, url = {https://doi.org/10.1007/s10207-017-0382-0}, doi = {10.1007/S10207-017-0382-0}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/WangenHS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/YangLLZL18, author = {Zheng Yang and Chao Liu and Wanping Liu and Daigu Zhang and Song Luo}, title = {A new strong security model for stateful authenticated group key exchange}, journal = {Int. J. Inf. Sec.}, volume = {17}, number = {4}, pages = {423--440}, year = {2018}, url = {https://doi.org/10.1007/s10207-017-0373-1}, doi = {10.1007/S10207-017-0373-1}, timestamp = {Wed, 11 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/YangLLZL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/Yoneyama18, author = {Kazuki Yoneyama}, title = {Formal modeling of random oracle programmability and verification of signature unforgeability using task-PIOAs}, journal = {Int. J. Inf. Sec.}, volume = {17}, number = {1}, pages = {43--66}, year = {2018}, url = {https://doi.org/10.1007/s10207-016-0352-y}, doi = {10.1007/S10207-016-0352-Y}, timestamp = {Tue, 23 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/Yoneyama18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/YoneyamaYKKFY18, author = {Kazuki Yoneyama and Reo Yoshida and Yuto Kawahara and Tetsutaro Kobayashi and Hitoshi Fuji and Tomohide Yamamoto}, title = {Multi-cast key distribution: scalable, dynamic and provably secure construction}, journal = {Int. J. Inf. Sec.}, volume = {17}, number = {5}, pages = {513--532}, year = {2018}, url = {https://doi.org/10.1007/s10207-017-0389-6}, doi = {10.1007/S10207-017-0389-6}, timestamp = {Wed, 05 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/YoneyamaYKKFY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.