Search dblp for Publications

export results for "toc:db/journals/ijisec/ijisec6.bht:"

 download as .bib file

@article{DBLP:journals/ijisec/AnagnostakisGIK07,
  author       = {Kostas G. Anagnostakis and
                  Michael B. Greenwald and
                  Sotiris Ioannidis and
                  Angelos D. Keromytis},
  title        = {{COVERAGE:} detecting and reacting to worm epidemics using cooperation
                  and validation},
  journal      = {Int. J. Inf. Sec.},
  volume       = {6},
  number       = {6},
  pages        = {361--378},
  year         = {2007},
  url          = {https://doi.org/10.1007/s10207-007-0032-z},
  doi          = {10.1007/S10207-007-0032-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/AnagnostakisGIK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/BackesGP07,
  author       = {Michael Backes and
                  Stefanos Gritzalis and
                  Bart Preneel},
  title        = {Preface},
  journal      = {Int. J. Inf. Sec.},
  volume       = {6},
  number       = {6},
  pages        = {359--360},
  year         = {2007},
  url          = {https://doi.org/10.1007/s10207-007-0034-x},
  doi          = {10.1007/S10207-007-0034-X},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/BackesGP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/BertinoFPP07,
  author       = {Elisa Bertino and
                  Elena Ferrari and
                  Federica Paci and
                  Loredana Parasiliti Provenza},
  title        = {A system for securing push-based distribution of {XML} documents},
  journal      = {Int. J. Inf. Sec.},
  volume       = {6},
  number       = {4},
  pages        = {255--284},
  year         = {2007},
  url          = {https://doi.org/10.1007/s10207-007-0020-3},
  doi          = {10.1007/S10207-007-0020-3},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/BertinoFPP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/BlundoGP07,
  author       = {Carlo Blundo and
                  Clemente Galdi and
                  Giuseppe Persiano},
  title        = {Low-randomness constant-round private {XOR} computations},
  journal      = {Int. J. Inf. Sec.},
  volume       = {6},
  number       = {1},
  pages        = {15--26},
  year         = {2007},
  url          = {https://doi.org/10.1007/s10207-006-0007-5},
  doi          = {10.1007/S10207-006-0007-5},
  timestamp    = {Tue, 06 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/BlundoGP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/BohliVS07,
  author       = {Jens{-}Matthias Bohli and
                  Mar{\'{\i}}a Isabel Gonz{\'{a}}lez Vasco and
                  Rainer Steinwandt},
  title        = {Secure group key establishment revisited},
  journal      = {Int. J. Inf. Sec.},
  volume       = {6},
  number       = {4},
  pages        = {243--254},
  year         = {2007},
  url          = {https://doi.org/10.1007/s10207-007-0018-x},
  doi          = {10.1007/S10207-007-0018-X},
  timestamp    = {Mon, 31 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/BohliVS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/BononiT07,
  author       = {Luciano Bononi and
                  Carlo Tacconi},
  title        = {Intrusion detection for secure clustering and routing in Mobile Multi-hop
                  Wireless Networks},
  journal      = {Int. J. Inf. Sec.},
  volume       = {6},
  number       = {6},
  pages        = {379--392},
  year         = {2007},
  url          = {https://doi.org/10.1007/s10207-007-0035-9},
  doi          = {10.1007/S10207-007-0035-9},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/BononiT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/CederquistCDEHL07,
  author       = {J. G. Cederquist and
                  Ricardo Corin and
                  M. A. C. Dekker and
                  Sandro Etalle and
                  J. I. den Hartog and
                  Gabriele Lenzini},
  title        = {Audit-based compliance control},
  journal      = {Int. J. Inf. Sec.},
  volume       = {6},
  number       = {2-3},
  pages        = {133--151},
  year         = {2007},
  url          = {https://doi.org/10.1007/s10207-007-0017-y},
  doi          = {10.1007/S10207-007-0017-Y},
  timestamp    = {Tue, 06 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/CederquistCDEHL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/ChenCS07,
  author       = {Liqun Chen and
                  Zhaohui Cheng and
                  Nigel P. Smart},
  title        = {Identity-based key agreement protocols from pairings},
  journal      = {Int. J. Inf. Sec.},
  volume       = {6},
  number       = {4},
  pages        = {213--241},
  year         = {2007},
  url          = {https://doi.org/10.1007/s10207-006-0011-9},
  doi          = {10.1007/S10207-006-0011-9},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/ChenCS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/ClarkeF07,
  author       = {Nathan L. Clarke and
                  Steven Furnell},
  title        = {Authenticating mobile phone users using keystroke analysis},
  journal      = {Int. J. Inf. Sec.},
  volume       = {6},
  number       = {1},
  pages        = {1--14},
  year         = {2007},
  url          = {https://doi.org/10.1007/s10207-006-0006-6},
  doi          = {10.1007/S10207-006-0006-6},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/ClarkeF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/Danezis07,
  author       = {George Danezis},
  title        = {Breaking four mix-related schemes based on Universal Re-encryption},
  journal      = {Int. J. Inf. Sec.},
  volume       = {6},
  number       = {6},
  pages        = {393--402},
  year         = {2007},
  url          = {https://doi.org/10.1007/s10207-007-0033-y},
  doi          = {10.1007/S10207-007-0033-Y},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/Danezis07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/DelicataS07,
  author       = {Rob Delicata and
                  Steve A. Schneider},
  title        = {An algebraic approach to the verification of a class of Diffie-Hellman
                  protocols},
  journal      = {Int. J. Inf. Sec.},
  volume       = {6},
  number       = {2-3},
  pages        = {183--196},
  year         = {2007},
  url          = {https://doi.org/10.1007/s10207-007-0013-2},
  doi          = {10.1007/S10207-007-0013-2},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/DelicataS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/DimitrakosMRS07,
  author       = {Theodosis Dimitrakos and
                  Fabio Martinelli and
                  Peter Y. A. Ryan and
                  Steve A. Schneider},
  title        = {Guest Editors' Preface},
  journal      = {Int. J. Inf. Sec.},
  volume       = {6},
  number       = {2-3},
  pages        = {65--66},
  year         = {2007},
  url          = {https://doi.org/10.1007/s10207-007-0012-3},
  doi          = {10.1007/S10207-007-0012-3},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/DimitrakosMRS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/EspondaAHJF07,
  author       = {Fernando Esponda and
                  Elena S. Ackley and
                  Paul Helman and
                  Haixia Jia and
                  Stephanie Forrest},
  title        = {Protecting data privacy through hard-to-reverse negative databases},
  journal      = {Int. J. Inf. Sec.},
  volume       = {6},
  number       = {6},
  pages        = {403--415},
  year         = {2007},
  url          = {https://doi.org/10.1007/s10207-007-0030-1},
  doi          = {10.1007/S10207-007-0030-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/EspondaAHJF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/FrancescoM07,
  author       = {Nicoletta De Francesco and
                  Luca Martini},
  title        = {Instruction-level security typing by abstract interpretation},
  journal      = {Int. J. Inf. Sec.},
  volume       = {6},
  number       = {2-3},
  pages        = {85--106},
  year         = {2007},
  url          = {https://doi.org/10.1007/s10207-007-0015-0},
  doi          = {10.1007/S10207-007-0015-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/FrancescoM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/GritzalisYLHK07,
  author       = {Stefanos Gritzalis and
                  Athanasios N. Yannacopoulos and
                  Costas Lambrinoudakis and
                  Petros Hatzopoulos and
                  Sokratis K. Katsikas},
  title        = {A probabilistic model for optimal insurance contracts against security
                  risks and privacy violation in {IT} outsourcing environments},
  journal      = {Int. J. Inf. Sec.},
  volume       = {6},
  number       = {4},
  pages        = {197--211},
  year         = {2007},
  url          = {https://doi.org/10.1007/s10207-006-0010-x},
  doi          = {10.1007/S10207-006-0010-X},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/GritzalisYLHK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/KlinkoffKKV07,
  author       = {Patrick Klinkoff and
                  Engin Kirda and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Extending .NET security to unmanaged code},
  journal      = {Int. J. Inf. Sec.},
  volume       = {6},
  number       = {6},
  pages        = {417--428},
  year         = {2007},
  url          = {https://doi.org/10.1007/s10207-007-0031-0},
  doi          = {10.1007/S10207-007-0031-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/KlinkoffKKV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/KnightBH07,
  author       = {Scott Knight and
                  Scott Buffett and
                  Patrick C. K. Hung},
  title        = {The International Journal of Information Security Special Issue on
                  privacy, security and trust technologies and E-business services},
  journal      = {Int. J. Inf. Sec.},
  volume       = {6},
  number       = {5},
  pages        = {285--286},
  year         = {2007},
  url          = {https://doi.org/10.1007/s10207-007-0036-8},
  doi          = {10.1007/S10207-007-0036-8},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/KnightBH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/KonstantinouSZ07,
  author       = {Elisavet Konstantinou and
                  Yannis C. Stamatiou and
                  Christos D. Zaroliagis},
  title        = {Efficient generation of secure elliptic curves},
  journal      = {Int. J. Inf. Sec.},
  volume       = {6},
  number       = {1},
  pages        = {47--63},
  year         = {2007},
  url          = {https://doi.org/10.1007/s10207-006-0009-3},
  doi          = {10.1007/S10207-006-0009-3},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/KonstantinouSZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/KopfM07,
  author       = {Boris K{\"{o}}pf and
                  Heiko Mantel},
  title        = {Transformational typing and unification for automatically correcting
                  insecure programs},
  journal      = {Int. J. Inf. Sec.},
  volume       = {6},
  number       = {2-3},
  pages        = {107--131},
  year         = {2007},
  url          = {https://doi.org/10.1007/s10207-007-0016-z},
  doi          = {10.1007/S10207-007-0016-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/KopfM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/KrukowN07,
  author       = {Karl Krukow and
                  Mogens Nielsen},
  title        = {Trust structures},
  journal      = {Int. J. Inf. Sec.},
  volume       = {6},
  number       = {2-3},
  pages        = {153--181},
  year         = {2007},
  url          = {https://doi.org/10.1007/s10207-007-0014-1},
  doi          = {10.1007/S10207-007-0014-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/KrukowN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/LauerD07,
  author       = {Thomas W. Lauer and
                  Xiaodong Deng},
  title        = {Building online trust through privacy practices},
  journal      = {Int. J. Inf. Sec.},
  volume       = {6},
  number       = {5},
  pages        = {323--331},
  year         = {2007},
  url          = {https://doi.org/10.1007/s10207-007-0028-8},
  doi          = {10.1007/S10207-007-0028-8},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/LauerD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/Levin07,
  author       = {Avner Levin},
  title        = {Is workplace surveillance legal in Canada?},
  journal      = {Int. J. Inf. Sec.},
  volume       = {6},
  number       = {5},
  pages        = {313--321},
  year         = {2007},
  url          = {https://doi.org/10.1007/s10207-007-0026-x},
  doi          = {10.1007/S10207-007-0026-X},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/Levin07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/LiuI07,
  author       = {Jinshan Liu and
                  Val{\'{e}}rie Issarny},
  title        = {An incentive compatible reputation mechanism for ubiquitous computing
                  environments},
  journal      = {Int. J. Inf. Sec.},
  volume       = {6},
  number       = {5},
  pages        = {297--311},
  year         = {2007},
  url          = {https://doi.org/10.1007/s10207-007-0029-7},
  doi          = {10.1007/S10207-007-0029-7},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/LiuI07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/WangZ07,
  author       = {Shujing Wang and
                  Yan Zhang},
  title        = {Handling distributed authorization with delegation through answer
                  set programming},
  journal      = {Int. J. Inf. Sec.},
  volume       = {6},
  number       = {1},
  pages        = {27--46},
  year         = {2007},
  url          = {https://doi.org/10.1007/s10207-006-0008-4},
  doi          = {10.1007/S10207-006-0008-4},
  timestamp    = {Wed, 27 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/WangZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/WuW07,
  author       = {Zhengping Wu and
                  Alfred C. Weaver},
  title        = {Requirements of federated trust management for service-oriented architectures},
  journal      = {Int. J. Inf. Sec.},
  volume       = {6},
  number       = {5},
  pages        = {287--296},
  year         = {2007},
  url          = {https://doi.org/10.1007/s10207-007-0027-9},
  doi          = {10.1007/S10207-007-0027-9},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/WuW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/ZhangGC07,
  author       = {Jie Zhang and
                  Ali A. Ghorbani and
                  Robin Cohen},
  title        = {A familiarity-based trust model for effective selection of sellers
                  in multiagent e-commerce systems},
  journal      = {Int. J. Inf. Sec.},
  volume       = {6},
  number       = {5},
  pages        = {333--344},
  year         = {2007},
  url          = {https://doi.org/10.1007/s10207-007-0025-y},
  doi          = {10.1007/S10207-007-0025-Y},
  timestamp    = {Mon, 14 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/ZhangGC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/ZhengM07,
  author       = {Lantian Zheng and
                  Andrew C. Myers},
  title        = {Dynamic security labels and static information flow control},
  journal      = {Int. J. Inf. Sec.},
  volume       = {6},
  number       = {2-3},
  pages        = {67--84},
  year         = {2007},
  url          = {https://doi.org/10.1007/s10207-007-0019-9},
  doi          = {10.1007/S10207-007-0019-9},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/ZhengM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/ZulkernineGK07,
  author       = {Mohammad Zulkernine and
                  Mathew Graves and
                  Muhammad Umair Ahmed Khan},
  title        = {Integrating software specifications into intrusion detection},
  journal      = {Int. J. Inf. Sec.},
  volume       = {6},
  number       = {5},
  pages        = {345--357},
  year         = {2007},
  url          = {https://doi.org/10.1007/s10207-007-0023-0},
  doi          = {10.1007/S10207-007-0023-0},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/ZulkernineGK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics