Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/ijisec/ijisec6.bht:"
@article{DBLP:journals/ijisec/AnagnostakisGIK07, author = {Kostas G. Anagnostakis and Michael B. Greenwald and Sotiris Ioannidis and Angelos D. Keromytis}, title = {{COVERAGE:} detecting and reacting to worm epidemics using cooperation and validation}, journal = {Int. J. Inf. Sec.}, volume = {6}, number = {6}, pages = {361--378}, year = {2007}, url = {https://doi.org/10.1007/s10207-007-0032-z}, doi = {10.1007/S10207-007-0032-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/AnagnostakisGIK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/BackesGP07, author = {Michael Backes and Stefanos Gritzalis and Bart Preneel}, title = {Preface}, journal = {Int. J. Inf. Sec.}, volume = {6}, number = {6}, pages = {359--360}, year = {2007}, url = {https://doi.org/10.1007/s10207-007-0034-x}, doi = {10.1007/S10207-007-0034-X}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/BackesGP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/BertinoFPP07, author = {Elisa Bertino and Elena Ferrari and Federica Paci and Loredana Parasiliti Provenza}, title = {A system for securing push-based distribution of {XML} documents}, journal = {Int. J. Inf. Sec.}, volume = {6}, number = {4}, pages = {255--284}, year = {2007}, url = {https://doi.org/10.1007/s10207-007-0020-3}, doi = {10.1007/S10207-007-0020-3}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/BertinoFPP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/BlundoGP07, author = {Carlo Blundo and Clemente Galdi and Giuseppe Persiano}, title = {Low-randomness constant-round private {XOR} computations}, journal = {Int. J. Inf. Sec.}, volume = {6}, number = {1}, pages = {15--26}, year = {2007}, url = {https://doi.org/10.1007/s10207-006-0007-5}, doi = {10.1007/S10207-006-0007-5}, timestamp = {Tue, 06 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/BlundoGP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/BohliVS07, author = {Jens{-}Matthias Bohli and Mar{\'{\i}}a Isabel Gonz{\'{a}}lez Vasco and Rainer Steinwandt}, title = {Secure group key establishment revisited}, journal = {Int. J. Inf. Sec.}, volume = {6}, number = {4}, pages = {243--254}, year = {2007}, url = {https://doi.org/10.1007/s10207-007-0018-x}, doi = {10.1007/S10207-007-0018-X}, timestamp = {Mon, 31 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/BohliVS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/BononiT07, author = {Luciano Bononi and Carlo Tacconi}, title = {Intrusion detection for secure clustering and routing in Mobile Multi-hop Wireless Networks}, journal = {Int. J. Inf. Sec.}, volume = {6}, number = {6}, pages = {379--392}, year = {2007}, url = {https://doi.org/10.1007/s10207-007-0035-9}, doi = {10.1007/S10207-007-0035-9}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/BononiT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/CederquistCDEHL07, author = {J. G. Cederquist and Ricardo Corin and M. A. C. Dekker and Sandro Etalle and J. I. den Hartog and Gabriele Lenzini}, title = {Audit-based compliance control}, journal = {Int. J. Inf. Sec.}, volume = {6}, number = {2-3}, pages = {133--151}, year = {2007}, url = {https://doi.org/10.1007/s10207-007-0017-y}, doi = {10.1007/S10207-007-0017-Y}, timestamp = {Tue, 06 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/CederquistCDEHL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/ChenCS07, author = {Liqun Chen and Zhaohui Cheng and Nigel P. Smart}, title = {Identity-based key agreement protocols from pairings}, journal = {Int. J. Inf. Sec.}, volume = {6}, number = {4}, pages = {213--241}, year = {2007}, url = {https://doi.org/10.1007/s10207-006-0011-9}, doi = {10.1007/S10207-006-0011-9}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/ChenCS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/ClarkeF07, author = {Nathan L. Clarke and Steven Furnell}, title = {Authenticating mobile phone users using keystroke analysis}, journal = {Int. J. Inf. Sec.}, volume = {6}, number = {1}, pages = {1--14}, year = {2007}, url = {https://doi.org/10.1007/s10207-006-0006-6}, doi = {10.1007/S10207-006-0006-6}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/ClarkeF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/Danezis07, author = {George Danezis}, title = {Breaking four mix-related schemes based on Universal Re-encryption}, journal = {Int. J. Inf. Sec.}, volume = {6}, number = {6}, pages = {393--402}, year = {2007}, url = {https://doi.org/10.1007/s10207-007-0033-y}, doi = {10.1007/S10207-007-0033-Y}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/Danezis07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/DelicataS07, author = {Rob Delicata and Steve A. Schneider}, title = {An algebraic approach to the verification of a class of Diffie-Hellman protocols}, journal = {Int. J. Inf. Sec.}, volume = {6}, number = {2-3}, pages = {183--196}, year = {2007}, url = {https://doi.org/10.1007/s10207-007-0013-2}, doi = {10.1007/S10207-007-0013-2}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/DelicataS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/DimitrakosMRS07, author = {Theodosis Dimitrakos and Fabio Martinelli and Peter Y. A. Ryan and Steve A. Schneider}, title = {Guest Editors' Preface}, journal = {Int. J. Inf. Sec.}, volume = {6}, number = {2-3}, pages = {65--66}, year = {2007}, url = {https://doi.org/10.1007/s10207-007-0012-3}, doi = {10.1007/S10207-007-0012-3}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/DimitrakosMRS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/EspondaAHJF07, author = {Fernando Esponda and Elena S. Ackley and Paul Helman and Haixia Jia and Stephanie Forrest}, title = {Protecting data privacy through hard-to-reverse negative databases}, journal = {Int. J. Inf. Sec.}, volume = {6}, number = {6}, pages = {403--415}, year = {2007}, url = {https://doi.org/10.1007/s10207-007-0030-1}, doi = {10.1007/S10207-007-0030-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/EspondaAHJF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/FrancescoM07, author = {Nicoletta De Francesco and Luca Martini}, title = {Instruction-level security typing by abstract interpretation}, journal = {Int. J. Inf. Sec.}, volume = {6}, number = {2-3}, pages = {85--106}, year = {2007}, url = {https://doi.org/10.1007/s10207-007-0015-0}, doi = {10.1007/S10207-007-0015-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/FrancescoM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/GritzalisYLHK07, author = {Stefanos Gritzalis and Athanasios N. Yannacopoulos and Costas Lambrinoudakis and Petros Hatzopoulos and Sokratis K. Katsikas}, title = {A probabilistic model for optimal insurance contracts against security risks and privacy violation in {IT} outsourcing environments}, journal = {Int. J. Inf. Sec.}, volume = {6}, number = {4}, pages = {197--211}, year = {2007}, url = {https://doi.org/10.1007/s10207-006-0010-x}, doi = {10.1007/S10207-006-0010-X}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/GritzalisYLHK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/KlinkoffKKV07, author = {Patrick Klinkoff and Engin Kirda and Christopher Kruegel and Giovanni Vigna}, title = {Extending .NET security to unmanaged code}, journal = {Int. J. Inf. Sec.}, volume = {6}, number = {6}, pages = {417--428}, year = {2007}, url = {https://doi.org/10.1007/s10207-007-0031-0}, doi = {10.1007/S10207-007-0031-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/KlinkoffKKV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/KnightBH07, author = {Scott Knight and Scott Buffett and Patrick C. K. Hung}, title = {The International Journal of Information Security Special Issue on privacy, security and trust technologies and E-business services}, journal = {Int. J. Inf. Sec.}, volume = {6}, number = {5}, pages = {285--286}, year = {2007}, url = {https://doi.org/10.1007/s10207-007-0036-8}, doi = {10.1007/S10207-007-0036-8}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/KnightBH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/KonstantinouSZ07, author = {Elisavet Konstantinou and Yannis C. Stamatiou and Christos D. Zaroliagis}, title = {Efficient generation of secure elliptic curves}, journal = {Int. J. Inf. Sec.}, volume = {6}, number = {1}, pages = {47--63}, year = {2007}, url = {https://doi.org/10.1007/s10207-006-0009-3}, doi = {10.1007/S10207-006-0009-3}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/KonstantinouSZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/KopfM07, author = {Boris K{\"{o}}pf and Heiko Mantel}, title = {Transformational typing and unification for automatically correcting insecure programs}, journal = {Int. J. Inf. Sec.}, volume = {6}, number = {2-3}, pages = {107--131}, year = {2007}, url = {https://doi.org/10.1007/s10207-007-0016-z}, doi = {10.1007/S10207-007-0016-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/KopfM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/KrukowN07, author = {Karl Krukow and Mogens Nielsen}, title = {Trust structures}, journal = {Int. J. Inf. Sec.}, volume = {6}, number = {2-3}, pages = {153--181}, year = {2007}, url = {https://doi.org/10.1007/s10207-007-0014-1}, doi = {10.1007/S10207-007-0014-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/KrukowN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/LauerD07, author = {Thomas W. Lauer and Xiaodong Deng}, title = {Building online trust through privacy practices}, journal = {Int. J. Inf. Sec.}, volume = {6}, number = {5}, pages = {323--331}, year = {2007}, url = {https://doi.org/10.1007/s10207-007-0028-8}, doi = {10.1007/S10207-007-0028-8}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/LauerD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/Levin07, author = {Avner Levin}, title = {Is workplace surveillance legal in Canada?}, journal = {Int. J. Inf. Sec.}, volume = {6}, number = {5}, pages = {313--321}, year = {2007}, url = {https://doi.org/10.1007/s10207-007-0026-x}, doi = {10.1007/S10207-007-0026-X}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/Levin07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/LiuI07, author = {Jinshan Liu and Val{\'{e}}rie Issarny}, title = {An incentive compatible reputation mechanism for ubiquitous computing environments}, journal = {Int. J. Inf. Sec.}, volume = {6}, number = {5}, pages = {297--311}, year = {2007}, url = {https://doi.org/10.1007/s10207-007-0029-7}, doi = {10.1007/S10207-007-0029-7}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/LiuI07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/WangZ07, author = {Shujing Wang and Yan Zhang}, title = {Handling distributed authorization with delegation through answer set programming}, journal = {Int. J. Inf. Sec.}, volume = {6}, number = {1}, pages = {27--46}, year = {2007}, url = {https://doi.org/10.1007/s10207-006-0008-4}, doi = {10.1007/S10207-006-0008-4}, timestamp = {Wed, 27 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/WangZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/WuW07, author = {Zhengping Wu and Alfred C. Weaver}, title = {Requirements of federated trust management for service-oriented architectures}, journal = {Int. J. Inf. Sec.}, volume = {6}, number = {5}, pages = {287--296}, year = {2007}, url = {https://doi.org/10.1007/s10207-007-0027-9}, doi = {10.1007/S10207-007-0027-9}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/WuW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/ZhangGC07, author = {Jie Zhang and Ali A. Ghorbani and Robin Cohen}, title = {A familiarity-based trust model for effective selection of sellers in multiagent e-commerce systems}, journal = {Int. J. Inf. Sec.}, volume = {6}, number = {5}, pages = {333--344}, year = {2007}, url = {https://doi.org/10.1007/s10207-007-0025-y}, doi = {10.1007/S10207-007-0025-Y}, timestamp = {Mon, 14 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/ZhangGC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/ZhengM07, author = {Lantian Zheng and Andrew C. Myers}, title = {Dynamic security labels and static information flow control}, journal = {Int. J. Inf. Sec.}, volume = {6}, number = {2-3}, pages = {67--84}, year = {2007}, url = {https://doi.org/10.1007/s10207-007-0019-9}, doi = {10.1007/S10207-007-0019-9}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/ZhengM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/ZulkernineGK07, author = {Mohammad Zulkernine and Mathew Graves and Muhammad Umair Ahmed Khan}, title = {Integrating software specifications into intrusion detection}, journal = {Int. J. Inf. Sec.}, volume = {6}, number = {5}, pages = {345--357}, year = {2007}, url = {https://doi.org/10.1007/s10207-007-0023-0}, doi = {10.1007/S10207-007-0023-0}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/ZulkernineGK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.