Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/ijisec/ijisec11.bht:"
@article{DBLP:journals/ijisec/AhmedNSSW12, author = {Irfan Ahmed and Martin Naedele and Bradley L. Schatz and Ry{\^{o}}ichi Sasaki and Andrew West}, title = {Message from the guest editors}, journal = {Int. J. Inf. Sec.}, volume = {11}, number = {4}, pages = {213}, year = {2012}, url = {https://doi.org/10.1007/s10207-012-0168-3}, doi = {10.1007/S10207-012-0168-3}, timestamp = {Fri, 19 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/AhmedNSSW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/AndreevaBMPR12, author = {Elena Andreeva and Andrey Bogdanov and Bart Mennink and Bart Preneel and Christian Rechberger}, title = {On security arguments of the second round {SHA-3} candidates}, journal = {Int. J. Inf. Sec.}, volume = {11}, number = {2}, pages = {103--120}, year = {2012}, url = {https://doi.org/10.1007/s10207-012-0156-7}, doi = {10.1007/S10207-012-0156-7}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/AndreevaBMPR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/AndreevaMP12, author = {Elena Andreeva and Bart Mennink and Bart Preneel}, title = {The parazoa family: generalizing the sponge hash functions}, journal = {Int. J. Inf. Sec.}, volume = {11}, number = {3}, pages = {149--165}, year = {2012}, url = {https://doi.org/10.1007/s10207-012-0157-6}, doi = {10.1007/S10207-012-0157-6}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/AndreevaMP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/AtesBFL12, author = {Mika{\"{e}}l Ates and Francesco Buccafurri and Jacques Fayolle and Gianluca Lax}, title = {A warning on how to implement anonymous credential protocols into the information card framework}, journal = {Int. J. Inf. Sec.}, volume = {11}, number = {1}, pages = {33--40}, year = {2012}, url = {https://doi.org/10.1007/s10207-011-0150-5}, doi = {10.1007/S10207-011-0150-5}, timestamp = {Wed, 14 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/AtesBFL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/BagheriGKZ12, author = {Nasour Bagheri and Praveen Gauravaram and Lars R. Knudsen and Erik Zenner}, title = {The suffix-free-prefix-free hash function construction and its indifferentiability security analysis}, journal = {Int. J. Inf. Sec.}, volume = {11}, number = {6}, pages = {419--434}, year = {2012}, url = {https://doi.org/10.1007/s10207-012-0175-4}, doi = {10.1007/S10207-012-0175-4}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/BagheriGKZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/BogdanovNTW12, author = {Dan Bogdanov and Margus Niitsoo and Tomas Toft and Jan Willemson}, title = {High-performance secure multi-party computation for data mining applications}, journal = {Int. J. Inf. Sec.}, volume = {11}, number = {6}, pages = {403--418}, year = {2012}, url = {https://doi.org/10.1007/s10207-012-0177-2}, doi = {10.1007/S10207-012-0177-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/BogdanovNTW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/CamachoHKO12, author = {Philippe Camacho and Alejandro Hevia and Marcos A. Kiwi and Roberto Opazo}, title = {Strong accumulators from collision-resistant hashing}, journal = {Int. J. Inf. Sec.}, volume = {11}, number = {5}, pages = {349--363}, year = {2012}, url = {https://doi.org/10.1007/s10207-012-0169-2}, doi = {10.1007/S10207-012-0169-2}, timestamp = {Tue, 06 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/CamachoHKO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/CasanovaABS12, author = {Javier Guerra Casanova and Carmen S{\'{a}}nchez {\'{A}}vila and Gonzalo Bailador and Alberto {de Santos Sierra}}, title = {Authentication in mobile devices through hand gesture recognition}, journal = {Int. J. Inf. Sec.}, volume = {11}, number = {2}, pages = {65--83}, year = {2012}, url = {https://doi.org/10.1007/s10207-012-0154-9}, doi = {10.1007/S10207-012-0154-9}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/CasanovaABS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/ChenC12, author = {Liqun Chen and Yu Chen}, title = {The n-Diffie-Hellman problem and multiple-key encryption}, journal = {Int. J. Inf. Sec.}, volume = {11}, number = {5}, pages = {305--320}, year = {2012}, url = {https://doi.org/10.1007/s10207-012-0171-8}, doi = {10.1007/S10207-012-0171-8}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/ChenC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/Das12, author = {Ashok Kumar Das}, title = {A random key establishment scheme for multi-phase deployment in large-scale distributed sensor networks}, journal = {Int. J. Inf. Sec.}, volume = {11}, number = {3}, pages = {189--211}, year = {2012}, url = {https://doi.org/10.1007/s10207-012-0162-9}, doi = {10.1007/S10207-012-0162-9}, timestamp = {Tue, 06 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/Das12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/DewriRPW12, author = {Rinku Dewri and Indrajit Ray and Nayot Poolsappasit and L. Darrell Whitley}, title = {Optimal security hardening on attack tree models of networks: a cost-benefit analysis}, journal = {Int. J. Inf. Sec.}, volume = {11}, number = {3}, pages = {167--188}, year = {2012}, url = {https://doi.org/10.1007/s10207-012-0160-y}, doi = {10.1007/S10207-012-0160-Y}, timestamp = {Tue, 11 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/DewriRPW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/FioreGS12, author = {Dario Fiore and Rosario Gennaro and Nigel P. Smart}, title = {Relations between the security models for certificateless encryption and ID-based key agreement}, journal = {Int. J. Inf. Sec.}, volume = {11}, number = {1}, pages = {1--22}, year = {2012}, url = {https://doi.org/10.1007/s10207-011-0149-y}, doi = {10.1007/S10207-011-0149-Y}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/FioreGS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/Golic12, author = {Jovan Dj. Golic}, title = {A new authentication model for ad hoc networks}, journal = {Int. J. Inf. Sec.}, volume = {11}, number = {5}, pages = {333--347}, year = {2012}, url = {https://doi.org/10.1007/s10207-012-0167-4}, doi = {10.1007/S10207-012-0167-4}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/Golic12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/GritzalisKBS12, author = {Dimitris Gritzalis and Panagiotis Katsaros and Stylianos Basagiannis and Yannis Soupionis}, title = {Formal analysis for robust anti-SPIT protection using model checking}, journal = {Int. J. Inf. Sec.}, volume = {11}, number = {2}, pages = {121--135}, year = {2012}, url = {https://doi.org/10.1007/s10207-012-0159-4}, doi = {10.1007/S10207-012-0159-4}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/GritzalisKBS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/HadziosmanovicBH12, author = {Dina Hadziosmanovic and Damiano Bolzoni and Pieter H. Hartel}, title = {A log mining approach for process monitoring in {SCADA}}, journal = {Int. J. Inf. Sec.}, volume = {11}, number = {4}, pages = {231--251}, year = {2012}, url = {https://doi.org/10.1007/s10207-012-0163-8}, doi = {10.1007/S10207-012-0163-8}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/HadziosmanovicBH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/HanSMY12, author = {Jinguang Han and Willy Susilo and Yi Mu and Jun Yan}, title = {New constructions of {OSBE} schemes and their applications in oblivious access control}, journal = {Int. J. Inf. Sec.}, volume = {11}, number = {6}, pages = {389--401}, year = {2012}, url = {https://doi.org/10.1007/s10207-012-0176-3}, doi = {10.1007/S10207-012-0176-3}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/HanSMY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/HuangYWS12, author = {Qiong Huang and Guomin Yang and Duncan S. Wong and Willy Susilo}, title = {A new efficient optimistic fair exchange protocol without random oracles}, journal = {Int. J. Inf. Sec.}, volume = {11}, number = {1}, pages = {53--63}, year = {2012}, url = {https://doi.org/10.1007/s10207-011-0152-3}, doi = {10.1007/S10207-011-0152-3}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/HuangYWS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/Huber12, author = {Michael Huber}, title = {Perfect secrecy systems immune to spoofing attacks}, journal = {Int. J. Inf. Sec.}, volume = {11}, number = {4}, pages = {281--289}, year = {2012}, url = {https://doi.org/10.1007/s10207-012-0166-5}, doi = {10.1007/S10207-012-0166-5}, timestamp = {Fri, 09 Mar 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/Huber12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/KontaxisPM12, author = {Georgios Kontaxis and Michalis Polychronakis and Evangelos P. Markatos}, title = {Minimizing information disclosure to third parties in social login platforms}, journal = {Int. J. Inf. Sec.}, volume = {11}, number = {5}, pages = {321--332}, year = {2012}, url = {https://doi.org/10.1007/s10207-012-0173-6}, doi = {10.1007/S10207-012-0173-6}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/KontaxisPM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/NiebuhrMBB12, author = {Robert Niebuhr and Mohammed Meziani and Stanislav Bulygin and Johannes Buchmann}, title = {Selecting parameters for secure McEliece-based cryptosystems}, journal = {Int. J. Inf. Sec.}, volume = {11}, number = {3}, pages = {137--147}, year = {2012}, url = {https://doi.org/10.1007/s10207-011-0153-2}, doi = {10.1007/S10207-011-0153-2}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/NiebuhrMBB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/Nuida12, author = {Koji Nuida}, title = {Short collusion-secure fingerprint codes against three pirates}, journal = {Int. J. Inf. Sec.}, volume = {11}, number = {2}, pages = {85--102}, year = {2012}, url = {https://doi.org/10.1007/s10207-012-0155-8}, doi = {10.1007/S10207-012-0155-8}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/Nuida12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/Peng12, author = {Kun Peng}, title = {Threshold distributed access control with public verification: a practical application of {PVSS}}, journal = {Int. J. Inf. Sec.}, volume = {11}, number = {1}, pages = {23--31}, year = {2012}, url = {https://doi.org/10.1007/s10207-011-0151-4}, doi = {10.1007/S10207-011-0151-4}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/Peng12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/Perez-MendezPLM12, author = {Alejandro P{\'{e}}rez{-}M{\'{e}}ndez and Fernando Pere{\~{n}}{\'{\i}}guez{-}Garcia and Rafael Mar{\'{\i}}n L{\'{o}}pez and Gabriel L{\'{o}}pez Mill{\'{a}}n}, title = {A cross-layer {SSO} solution for federating access to kerberized services in the eduroam/DAMe network}, journal = {Int. J. Inf. Sec.}, volume = {11}, number = {6}, pages = {365--388}, year = {2012}, url = {https://doi.org/10.1007/s10207-012-0174-5}, doi = {10.1007/S10207-012-0174-5}, timestamp = {Wed, 14 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/Perez-MendezPLM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/ReavesM12, author = {Bradley Reaves and Thomas H. Morris}, title = {An open virtual testbed for industrial control system security research}, journal = {Int. J. Inf. Sec.}, volume = {11}, number = {4}, pages = {215--229}, year = {2012}, url = {https://doi.org/10.1007/s10207-012-0164-7}, doi = {10.1007/S10207-012-0164-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/ReavesM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/SoleMN12, author = {Marc Sol{\'{e}} and Victor Munt{\'{e}}s{-}Mulero and Jordi Nin}, title = {Efficient microaggregation techniques for large numerical data volumes}, journal = {Int. J. Inf. Sec.}, volume = {11}, number = {4}, pages = {253--267}, year = {2012}, url = {https://doi.org/10.1007/s10207-012-0158-5}, doi = {10.1007/S10207-012-0158-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/SoleMN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/WangYLMLC12, author = {Yuanzhuo Wang and Min Yu and Jingyuan Li and Kun Meng and Chuang Lin and Xueqi Cheng}, title = {Stochastic game net and applications in security analysis for enterprise network}, journal = {Int. J. Inf. Sec.}, volume = {11}, number = {1}, pages = {41--52}, year = {2012}, url = {https://doi.org/10.1007/s10207-011-0148-z}, doi = {10.1007/S10207-011-0148-Z}, timestamp = {Wed, 10 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/WangYLMLC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/XinCWLZMX12, author = {Zhi Xin and Huiyu Chen and Xinche Wang and Peng Liu and Sencun Zhu and Bing Mao and Li Xie}, title = {Replacement attacks: automatically evading behavior-based software birthmark}, journal = {Int. J. Inf. Sec.}, volume = {11}, number = {5}, pages = {293--304}, year = {2012}, url = {https://doi.org/10.1007/s10207-012-0170-9}, doi = {10.1007/S10207-012-0170-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/XinCWLZMX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/YaseenP12, author = {Qussai Yaseen and Brajendra Panda}, title = {Insider threat mitigation: preventing unauthorized knowledge acquisition}, journal = {Int. J. Inf. Sec.}, volume = {11}, number = {4}, pages = {269--280}, year = {2012}, url = {https://doi.org/10.1007/s10207-012-0165-6}, doi = {10.1007/S10207-012-0165-6}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/YaseenP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/ZhouLL12, author = {Jianying Zhou and Xuejia Lai and Hui Li}, title = {Message from the Guest Editors}, journal = {Int. J. Inf. Sec.}, volume = {11}, number = {5}, pages = {291--292}, year = {2012}, url = {https://doi.org/10.1007/s10207-012-0172-7}, doi = {10.1007/S10207-012-0172-7}, timestamp = {Thu, 02 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/ZhouLL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.