Search dblp for Publications

export results for "toc:db/journals/ijisec/ijisec17.bht:"

 download as .bib file

@article{DBLP:journals/ijisec/0001YASMG18,
  author       = {Daiki Chiba and
                  Takeshi Yagi and
                  Mitsuaki Akiyama and
                  Toshiki Shibahara and
                  Tatsuya Mori and
                  Shigeki Goto},
  title        = {DomainProfiler: toward accurate and early discovery of domain names
                  abused in future},
  journal      = {Int. J. Inf. Sec.},
  volume       = {17},
  number       = {6},
  pages        = {661--680},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10207-017-0396-7},
  doi          = {10.1007/S10207-017-0396-7},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/0001YASMG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/AkiyamaYHK18,
  author       = {Mitsuaki Akiyama and
                  Takeshi Yagi and
                  Takeo Hariu and
                  Youki Kadobayashi},
  title        = {HoneyCirculator: distributing credential honeytoken for introspection
                  of web-based attack cycle},
  journal      = {Int. J. Inf. Sec.},
  volume       = {17},
  number       = {2},
  pages        = {135--151},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10207-017-0361-5},
  doi          = {10.1007/S10207-017-0361-5},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/AkiyamaYHK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/AliMLH18,
  author       = {Syed Taha Ali and
                  Patrick McCorry and
                  Peter Hyun{-}Jeen Lee and
                  Feng Hao},
  title        = {ZombieCoin 2.0: managing next-generation botnets using Bitcoin},
  journal      = {Int. J. Inf. Sec.},
  volume       = {17},
  number       = {4},
  pages        = {411--422},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10207-017-0379-8},
  doi          = {10.1007/S10207-017-0379-8},
  timestamp    = {Mon, 12 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/AliMLH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/AyedICC18,
  author       = {Samiha Ayed and
                  Muhammad Sabir Idrees and
                  Nora Cuppens and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  title        = {Achieving dynamicity in security policies enforcement using aspects},
  journal      = {Int. J. Inf. Sec.},
  volume       = {17},
  number       = {1},
  pages        = {83--103},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10207-016-0357-6},
  doi          = {10.1007/S10207-016-0357-6},
  timestamp    = {Tue, 23 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/AyedICC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/BernardiniR18,
  author       = {Riccardo Bernardini and
                  Roberto Rinaldo},
  title        = {Generalized Elias schemes for efficient harvesting of truly random
                  bits},
  journal      = {Int. J. Inf. Sec.},
  volume       = {17},
  number       = {1},
  pages        = {67--81},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10207-016-0358-5},
  doi          = {10.1007/S10207-016-0358-5},
  timestamp    = {Thu, 25 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/BernardiniR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/Bindel0R18,
  author       = {Nina Bindel and
                  Johannes Buchmann and
                  Susanne Rie{\ss}},
  title        = {Comparing apples with apples: performance analysis of lattice-based
                  authenticated key exchange protocols},
  journal      = {Int. J. Inf. Sec.},
  volume       = {17},
  number       = {6},
  pages        = {701--718},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10207-017-0397-6},
  doi          = {10.1007/S10207-017-0397-6},
  timestamp    = {Wed, 03 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/Bindel0R18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/ChenHM18,
  author       = {Liqun Chen and
                  Jinguang Han and
                  Chris J. Mitchell},
  title        = {Message from the Guest Editors},
  journal      = {Int. J. Inf. Sec.},
  volume       = {17},
  number       = {5},
  pages        = {491--492},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10207-018-0416-2},
  doi          = {10.1007/S10207-018-0416-2},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/ChenHM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/CimitileMNSV18,
  author       = {Aniello Cimitile and
                  Francesco Mercaldo and
                  Vittoria Nardone and
                  Antonella Santone and
                  Corrado Aaron Visaggio},
  title        = {Talos: no more ransomware victims with formal methods},
  journal      = {Int. J. Inf. Sec.},
  volume       = {17},
  number       = {6},
  pages        = {719--738},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10207-017-0398-5},
  doi          = {10.1007/S10207-017-0398-5},
  timestamp    = {Fri, 21 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/CimitileMNSV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/DeepaTKPPP18,
  author       = {G. Deepa and
                  P. Santhi Thilagam and
                  Furqan Ahmed Khan and
                  Amit Praseed and
                  Alwyn R. Pais and
                  Nushafreen Palsetia},
  title        = {Black-box detection of XQuery injection and parameter tampering vulnerabilities
                  in web applications},
  journal      = {Int. J. Inf. Sec.},
  volume       = {17},
  number       = {1},
  pages        = {105--120},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10207-016-0359-4},
  doi          = {10.1007/S10207-016-0359-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/DeepaTKPPP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/DengZWQL18,
  author       = {Hua Deng and
                  Yunya Zhou and
                  Qianhong Wu and
                  Bo Qin and
                  Jianwei Liu},
  title        = {Secure pay-TV for chained hotels},
  journal      = {Int. J. Inf. Sec.},
  volume       = {17},
  number       = {1},
  pages        = {33--42},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10207-016-0354-9},
  doi          = {10.1007/S10207-016-0354-9},
  timestamp    = {Tue, 03 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/DengZWQL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/Domingo-FerrerB18,
  author       = {Josep Domingo{-}Ferrer and
                  Alberto Blanco{-}Justicia and
                  Carla R{\`{a}}fols},
  title        = {Dynamic group size accreditation and group discounts preserving anonymity},
  journal      = {Int. J. Inf. Sec.},
  volume       = {17},
  number       = {3},
  pages        = {243--260},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10207-017-0368-y},
  doi          = {10.1007/S10207-017-0368-Y},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/Domingo-FerrerB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/ElSalamounyG18,
  author       = {Ehab ElSalamouny and
                  S{\'{e}}bastien Gambs},
  title        = {Optimal noise functions for location privacy on continuous regions},
  journal      = {Int. J. Inf. Sec.},
  volume       = {17},
  number       = {6},
  pages        = {613--630},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10207-017-0384-y},
  doi          = {10.1007/S10207-017-0384-Y},
  timestamp    = {Wed, 03 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/ElSalamounyG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/FaustH018,
  author       = {Sebastian Faust and
                  Carmit Hazay and
                  Daniele Venturi},
  title        = {Outsourced pattern matching},
  journal      = {Int. J. Inf. Sec.},
  volume       = {17},
  number       = {3},
  pages        = {327--346},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10207-017-0374-0},
  doi          = {10.1007/S10207-017-0374-0},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/FaustH018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/Frattolillo18,
  author       = {Franco Frattolillo},
  title        = {Watermarking protocols: an excursus to motivate a new approach},
  journal      = {Int. J. Inf. Sec.},
  volume       = {17},
  number       = {5},
  pages        = {587--601},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10207-017-0386-9},
  doi          = {10.1007/S10207-017-0386-9},
  timestamp    = {Thu, 13 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/Frattolillo18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/Gonzalez-Serrano18,
  author       = {Francisco Javier Gonz{\'{a}}lez{-}Serrano and
                  Adrian Amor{-}Martin and
                  Jorge Casamayon{-}Anton},
  title        = {Supervised machine learning using encrypted training data},
  journal      = {Int. J. Inf. Sec.},
  volume       = {17},
  number       = {4},
  pages        = {365--377},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10207-017-0381-1},
  doi          = {10.1007/S10207-017-0381-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/Gonzalez-Serrano18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/GruberB18,
  author       = {Aviv Gruber and
                  Irad Ben{-}Gal},
  title        = {Using targeted Bayesian network learning for suspect identification
                  in communication networks},
  journal      = {Int. J. Inf. Sec.},
  volume       = {17},
  number       = {2},
  pages        = {169--181},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10207-017-0362-4},
  doi          = {10.1007/S10207-017-0362-4},
  timestamp    = {Mon, 11 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/GruberB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/HamLS18,
  author       = {HyoungMin Ham and
                  JongHyup Lee and
                  JooSeok Song},
  title        = {Improved yoking proof protocols for preserving anonymity},
  journal      = {Int. J. Inf. Sec.},
  volume       = {17},
  number       = {4},
  pages        = {379--393},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10207-017-0383-z},
  doi          = {10.1007/S10207-017-0383-Z},
  timestamp    = {Thu, 19 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/HamLS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/ImamuraMI18,
  author       = {Kazuya Imamura and
                  Kazuhiko Minematsu and
                  Tetsu Iwata},
  title        = {Integrity analysis of authenticated encryption based on stream ciphers},
  journal      = {Int. J. Inf. Sec.},
  volume       = {17},
  number       = {5},
  pages        = {493--511},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10207-017-0378-9},
  doi          = {10.1007/S10207-017-0378-9},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/ImamuraMI18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/JiaCLHW18,
  author       = {Hongyong Jia and
                  Yue Chen and
                  Julong Lan and
                  Kaixiang Huang and
                  Jun Wang},
  title        = {Efficient revocable hierarchical identity-based encryption using cryptographic
                  accumulators},
  journal      = {Int. J. Inf. Sec.},
  volume       = {17},
  number       = {4},
  pages        = {477--490},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10207-017-0387-8},
  doi          = {10.1007/S10207-017-0387-8},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/JiaCLHW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/JiangSMG18,
  author       = {Yinhao Jiang and
                  Willy Susilo and
                  Yi Mu and
                  Fuchun Guo},
  title        = {Flexible ciphertext-policy attribute-based encryption supporting AND-gate
                  and threshold with short ciphertexts},
  journal      = {Int. J. Inf. Sec.},
  volume       = {17},
  number       = {4},
  pages        = {463--475},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10207-017-0376-y},
  doi          = {10.1007/S10207-017-0376-Y},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/JiangSMG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/JiangSMG18a,
  author       = {Yinhao Jiang and
                  Willy Susilo and
                  Yi Mu and
                  Fuchun Guo},
  title        = {Ciphertext-policy attribute-based encryption supporting access policy
                  update and its extension with preserved attributes},
  journal      = {Int. J. Inf. Sec.},
  volume       = {17},
  number       = {5},
  pages        = {533--548},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10207-017-0388-7},
  doi          = {10.1007/S10207-017-0388-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/JiangSMG18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/KuoYH18,
  author       = {Tsung{-}Min Kuo and
                  Sung{-}Ming Yen and
                  Meng{-}Che Han},
  title        = {Dynamic reversed accumulator},
  journal      = {Int. J. Inf. Sec.},
  volume       = {17},
  number       = {2},
  pages        = {183--191},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10207-017-0360-6},
  doi          = {10.1007/S10207-017-0360-6},
  timestamp    = {Tue, 06 Mar 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/KuoYH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/LanetBBL18,
  author       = {Jean{-}Louis Lanet and
                  H{\'{e}}l{\`{e}}ne Le Bouder and
                  Mohammed Benattou and
                  Axel Legay},
  title        = {When time meets test},
  journal      = {Int. J. Inf. Sec.},
  volume       = {17},
  number       = {4},
  pages        = {395--409},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10207-017-0371-3},
  doi          = {10.1007/S10207-017-0371-3},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/LanetBBL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/LaszkaVK18,
  author       = {Aron Laszka and
                  Yevgeniy Vorobeychik and
                  Xenofon D. Koutsoukos},
  title        = {A game-theoretic approach for integrity assurance in resource-bounded
                  systems},
  journal      = {Int. J. Inf. Sec.},
  volume       = {17},
  number       = {2},
  pages        = {221--242},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10207-017-0364-2},
  doi          = {10.1007/S10207-017-0364-2},
  timestamp    = {Tue, 06 Mar 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/LaszkaVK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/LiZQLX18,
  author       = {Yuxi Li and
                  Fucai Zhou and
                  Yuhai Qin and
                  Muqing Lin and
                  Zifeng Xu},
  title        = {Integrity-verifiable conjunctive keyword searchable encryption in
                  cloud storage},
  journal      = {Int. J. Inf. Sec.},
  volume       = {17},
  number       = {5},
  pages        = {549--568},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10207-017-0394-9},
  doi          = {10.1007/S10207-017-0394-9},
  timestamp    = {Wed, 05 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/LiZQLX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/Lopriore18,
  author       = {Lanfranco Lopriore},
  title        = {Access right management by extended password capabilities},
  journal      = {Int. J. Inf. Sec.},
  volume       = {17},
  number       = {5},
  pages        = {603--612},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10207-017-0390-0},
  doi          = {10.1007/S10207-017-0390-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/Lopriore18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/LuoCLPB18,
  author       = {Ying Luo and
                  Sen{-}Ching S. Cheung and
                  Riccardo Lazzeretti and
                  Tommaso Pignata and
                  Mauro Barni},
  title        = {Anonymous subject identification and privacy information management
                  in video surveillance},
  journal      = {Int. J. Inf. Sec.},
  volume       = {17},
  number       = {3},
  pages        = {261--278},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10207-017-0380-2},
  doi          = {10.1007/S10207-017-0380-2},
  timestamp    = {Thu, 31 Mar 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/LuoCLPB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/Martinez-Balleste18,
  author       = {Antoni Mart{\'{\i}}nez{-}Ballest{\'{e}} and
                  Hatem A. Rashwan and
                  Domenec Puig and
                  Agusti Solanas},
  title        = {Design and implementation of a secure and trustworthy platform for
                  privacy-aware video surveillance},
  journal      = {Int. J. Inf. Sec.},
  volume       = {17},
  number       = {3},
  pages        = {279--290},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10207-017-0370-4},
  doi          = {10.1007/S10207-017-0370-4},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/Martinez-Balleste18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/MehrnezhadTSH18,
  author       = {Maryam Mehrnezhad and
                  Ehsan Toreini and
                  Siamak F. Shahandashti and
                  Feng Hao},
  title        = {Stealing PINs via mobile sensors: actual risk versus user perception},
  journal      = {Int. J. Inf. Sec.},
  volume       = {17},
  number       = {3},
  pages        = {291--313},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10207-017-0369-x},
  doi          = {10.1007/S10207-017-0369-X},
  timestamp    = {Mon, 12 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/MehrnezhadTSH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/Morales-Sandoval18,
  author       = {Miguel Morales{-}Sandoval and
                  Jos{\'{e}} Luis Gonz{\'{a}}lez and
                  Arturo Diaz{-}Perez and
                  V{\'{\i}}ctor Jes{\'{u}}s Sosa Sosa},
  title        = {A pairing-based cryptographic approach for data security in the cloud},
  journal      = {Int. J. Inf. Sec.},
  volume       = {17},
  number       = {4},
  pages        = {441--461},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10207-017-0375-z},
  doi          = {10.1007/S10207-017-0375-Z},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/Morales-Sandoval18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/MurakamiU18,
  author       = {Keisuke Murakami and
                  Takeaki Uno},
  title        = {Optimization algorithm for k-anonymization of datasets with low information
                  loss},
  journal      = {Int. J. Inf. Sec.},
  volume       = {17},
  number       = {6},
  pages        = {631--644},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10207-017-0392-y},
  doi          = {10.1007/S10207-017-0392-Y},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/MurakamiU18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/RialDK18,
  author       = {Alfredo Rial and
                  George Danezis and
                  Markulf Kohlweiss},
  title        = {Privacy-preserving smart metering revisited},
  journal      = {Int. J. Inf. Sec.},
  volume       = {17},
  number       = {1},
  pages        = {1--31},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10207-016-0355-8},
  doi          = {10.1007/S10207-016-0355-8},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/RialDK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/RibeiroLEM18,
  author       = {Carlos Ribeiro and
                  Herbert Leitold and
                  Simon Esposito and
                  David Mitzam},
  title        = {{STORK:} a real, heterogeneous, large-scale eID management system},
  journal      = {Int. J. Inf. Sec.},
  volume       = {17},
  number       = {5},
  pages        = {569--585},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10207-017-0385-x},
  doi          = {10.1007/S10207-017-0385-X},
  timestamp    = {Wed, 05 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/RibeiroLEM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/RoyS18,
  author       = {Sangita Roy and
                  Ashok Singh Sairam},
  title        = {Distributed star coloring of network for {IP} traceback},
  journal      = {Int. J. Inf. Sec.},
  volume       = {17},
  number       = {3},
  pages        = {315--326},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10207-017-0366-0},
  doi          = {10.1007/S10207-017-0366-0},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/RoyS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/ScaifeCLJT18,
  author       = {Nolen Scaife and
                  Henry Carter and
                  Lyrissa Lidsky and
                  Rachael L. Jones and
                  Patrick Traynor},
  title        = {OnionDNS: a seizure-resistant top-level domain},
  journal      = {Int. J. Inf. Sec.},
  volume       = {17},
  number       = {6},
  pages        = {645--660},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10207-017-0391-z},
  doi          = {10.1007/S10207-017-0391-Z},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/ScaifeCLJT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/SeoEXY18,
  author       = {Jae Hong Seo and
                  Keita Emura and
                  Keita Xagawa and
                  Kazuki Yoneyama},
  title        = {Accumulable optimistic fair exchange from verifiably encrypted homomorphic
                  signatures},
  journal      = {Int. J. Inf. Sec.},
  volume       = {17},
  number       = {2},
  pages        = {193--220},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10207-017-0367-z},
  doi          = {10.1007/S10207-017-0367-Z},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/SeoEXY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/ShahGJC18,
  author       = {Ankit Shah and
                  Rajesh Ganesan and
                  Sushil Jajodia and
                  Hasan Cam},
  title        = {A methodology to measure and monitor level of operational effectiveness
                  of a {CSOC}},
  journal      = {Int. J. Inf. Sec.},
  volume       = {17},
  number       = {2},
  pages        = {121--134},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10207-017-0365-1},
  doi          = {10.1007/S10207-017-0365-1},
  timestamp    = {Tue, 21 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/ShahGJC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/VenkateshA18,
  author       = {G. Kirubavathi Venkatesh and
                  R. Anitha},
  title        = {Structural analysis and detection of android botnets using machine
                  learning techniques},
  journal      = {Int. J. Inf. Sec.},
  volume       = {17},
  number       = {2},
  pages        = {153--167},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10207-017-0363-3},
  doi          = {10.1007/S10207-017-0363-3},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/VenkateshA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/WangPD18,
  author       = {Yujue Wang and
                  HweeHwa Pang and
                  Robert H. Deng},
  title        = {Verifiably encrypted cascade-instantiable blank signatures to secure
                  progressive decision management},
  journal      = {Int. J. Inf. Sec.},
  volume       = {17},
  number       = {3},
  pages        = {347--363},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10207-017-0372-2},
  doi          = {10.1007/S10207-017-0372-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/WangPD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/WangenHS18,
  author       = {Gaute Wangen and
                  Christoffer Hallstensen and
                  Einar Snekkenes},
  title        = {A framework for estimating information security risk assessment method
                  completeness - Core Unified Risk Framework, {CURF}},
  journal      = {Int. J. Inf. Sec.},
  volume       = {17},
  number       = {6},
  pages        = {681--699},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10207-017-0382-0},
  doi          = {10.1007/S10207-017-0382-0},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/WangenHS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/YangLLZL18,
  author       = {Zheng Yang and
                  Chao Liu and
                  Wanping Liu and
                  Daigu Zhang and
                  Song Luo},
  title        = {A new strong security model for stateful authenticated group key exchange},
  journal      = {Int. J. Inf. Sec.},
  volume       = {17},
  number       = {4},
  pages        = {423--440},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10207-017-0373-1},
  doi          = {10.1007/S10207-017-0373-1},
  timestamp    = {Wed, 11 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/YangLLZL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/Yoneyama18,
  author       = {Kazuki Yoneyama},
  title        = {Formal modeling of random oracle programmability and verification
                  of signature unforgeability using task-PIOAs},
  journal      = {Int. J. Inf. Sec.},
  volume       = {17},
  number       = {1},
  pages        = {43--66},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10207-016-0352-y},
  doi          = {10.1007/S10207-016-0352-Y},
  timestamp    = {Tue, 23 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/Yoneyama18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/YoneyamaYKKFY18,
  author       = {Kazuki Yoneyama and
                  Reo Yoshida and
                  Yuto Kawahara and
                  Tetsutaro Kobayashi and
                  Hitoshi Fuji and
                  Tomohide Yamamoto},
  title        = {Multi-cast key distribution: scalable, dynamic and provably secure
                  construction},
  journal      = {Int. J. Inf. Sec.},
  volume       = {17},
  number       = {5},
  pages        = {513--532},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10207-017-0389-6},
  doi          = {10.1007/S10207-017-0389-6},
  timestamp    = {Wed, 05 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/YoneyamaYKKFY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics