Search dblp for Publications

export results for "toc:db/journals/ijisec/ijisec11.bht:"

 download as .bib file

@article{DBLP:journals/ijisec/AhmedNSSW12,
  author       = {Irfan Ahmed and
                  Martin Naedele and
                  Bradley L. Schatz and
                  Ry{\^{o}}ichi Sasaki and
                  Andrew West},
  title        = {Message from the guest editors},
  journal      = {Int. J. Inf. Sec.},
  volume       = {11},
  number       = {4},
  pages        = {213},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10207-012-0168-3},
  doi          = {10.1007/S10207-012-0168-3},
  timestamp    = {Fri, 19 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/AhmedNSSW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/AndreevaBMPR12,
  author       = {Elena Andreeva and
                  Andrey Bogdanov and
                  Bart Mennink and
                  Bart Preneel and
                  Christian Rechberger},
  title        = {On security arguments of the second round {SHA-3} candidates},
  journal      = {Int. J. Inf. Sec.},
  volume       = {11},
  number       = {2},
  pages        = {103--120},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10207-012-0156-7},
  doi          = {10.1007/S10207-012-0156-7},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/AndreevaBMPR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/AndreevaMP12,
  author       = {Elena Andreeva and
                  Bart Mennink and
                  Bart Preneel},
  title        = {The parazoa family: generalizing the sponge hash functions},
  journal      = {Int. J. Inf. Sec.},
  volume       = {11},
  number       = {3},
  pages        = {149--165},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10207-012-0157-6},
  doi          = {10.1007/S10207-012-0157-6},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/AndreevaMP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/AtesBFL12,
  author       = {Mika{\"{e}}l Ates and
                  Francesco Buccafurri and
                  Jacques Fayolle and
                  Gianluca Lax},
  title        = {A warning on how to implement anonymous credential protocols into
                  the information card framework},
  journal      = {Int. J. Inf. Sec.},
  volume       = {11},
  number       = {1},
  pages        = {33--40},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10207-011-0150-5},
  doi          = {10.1007/S10207-011-0150-5},
  timestamp    = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/AtesBFL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/BagheriGKZ12,
  author       = {Nasour Bagheri and
                  Praveen Gauravaram and
                  Lars R. Knudsen and
                  Erik Zenner},
  title        = {The suffix-free-prefix-free hash function construction and its indifferentiability
                  security analysis},
  journal      = {Int. J. Inf. Sec.},
  volume       = {11},
  number       = {6},
  pages        = {419--434},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10207-012-0175-4},
  doi          = {10.1007/S10207-012-0175-4},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/BagheriGKZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/BogdanovNTW12,
  author       = {Dan Bogdanov and
                  Margus Niitsoo and
                  Tomas Toft and
                  Jan Willemson},
  title        = {High-performance secure multi-party computation for data mining applications},
  journal      = {Int. J. Inf. Sec.},
  volume       = {11},
  number       = {6},
  pages        = {403--418},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10207-012-0177-2},
  doi          = {10.1007/S10207-012-0177-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/BogdanovNTW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/CamachoHKO12,
  author       = {Philippe Camacho and
                  Alejandro Hevia and
                  Marcos A. Kiwi and
                  Roberto Opazo},
  title        = {Strong accumulators from collision-resistant hashing},
  journal      = {Int. J. Inf. Sec.},
  volume       = {11},
  number       = {5},
  pages        = {349--363},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10207-012-0169-2},
  doi          = {10.1007/S10207-012-0169-2},
  timestamp    = {Tue, 06 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/CamachoHKO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/CasanovaABS12,
  author       = {Javier Guerra Casanova and
                  Carmen S{\'{a}}nchez {\'{A}}vila and
                  Gonzalo Bailador and
                  Alberto {de Santos Sierra}},
  title        = {Authentication in mobile devices through hand gesture recognition},
  journal      = {Int. J. Inf. Sec.},
  volume       = {11},
  number       = {2},
  pages        = {65--83},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10207-012-0154-9},
  doi          = {10.1007/S10207-012-0154-9},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/CasanovaABS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/ChenC12,
  author       = {Liqun Chen and
                  Yu Chen},
  title        = {The n-Diffie-Hellman problem and multiple-key encryption},
  journal      = {Int. J. Inf. Sec.},
  volume       = {11},
  number       = {5},
  pages        = {305--320},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10207-012-0171-8},
  doi          = {10.1007/S10207-012-0171-8},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/ChenC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/Das12,
  author       = {Ashok Kumar Das},
  title        = {A random key establishment scheme for multi-phase deployment in large-scale
                  distributed sensor networks},
  journal      = {Int. J. Inf. Sec.},
  volume       = {11},
  number       = {3},
  pages        = {189--211},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10207-012-0162-9},
  doi          = {10.1007/S10207-012-0162-9},
  timestamp    = {Tue, 06 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/Das12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/DewriRPW12,
  author       = {Rinku Dewri and
                  Indrajit Ray and
                  Nayot Poolsappasit and
                  L. Darrell Whitley},
  title        = {Optimal security hardening on attack tree models of networks: a cost-benefit
                  analysis},
  journal      = {Int. J. Inf. Sec.},
  volume       = {11},
  number       = {3},
  pages        = {167--188},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10207-012-0160-y},
  doi          = {10.1007/S10207-012-0160-Y},
  timestamp    = {Tue, 11 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/DewriRPW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/FioreGS12,
  author       = {Dario Fiore and
                  Rosario Gennaro and
                  Nigel P. Smart},
  title        = {Relations between the security models for certificateless encryption
                  and ID-based key agreement},
  journal      = {Int. J. Inf. Sec.},
  volume       = {11},
  number       = {1},
  pages        = {1--22},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10207-011-0149-y},
  doi          = {10.1007/S10207-011-0149-Y},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/FioreGS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/Golic12,
  author       = {Jovan Dj. Golic},
  title        = {A new authentication model for ad hoc networks},
  journal      = {Int. J. Inf. Sec.},
  volume       = {11},
  number       = {5},
  pages        = {333--347},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10207-012-0167-4},
  doi          = {10.1007/S10207-012-0167-4},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/Golic12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/GritzalisKBS12,
  author       = {Dimitris Gritzalis and
                  Panagiotis Katsaros and
                  Stylianos Basagiannis and
                  Yannis Soupionis},
  title        = {Formal analysis for robust anti-SPIT protection using model checking},
  journal      = {Int. J. Inf. Sec.},
  volume       = {11},
  number       = {2},
  pages        = {121--135},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10207-012-0159-4},
  doi          = {10.1007/S10207-012-0159-4},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/GritzalisKBS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/HadziosmanovicBH12,
  author       = {Dina Hadziosmanovic and
                  Damiano Bolzoni and
                  Pieter H. Hartel},
  title        = {A log mining approach for process monitoring in {SCADA}},
  journal      = {Int. J. Inf. Sec.},
  volume       = {11},
  number       = {4},
  pages        = {231--251},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10207-012-0163-8},
  doi          = {10.1007/S10207-012-0163-8},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/HadziosmanovicBH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/HanSMY12,
  author       = {Jinguang Han and
                  Willy Susilo and
                  Yi Mu and
                  Jun Yan},
  title        = {New constructions of {OSBE} schemes and their applications in oblivious
                  access control},
  journal      = {Int. J. Inf. Sec.},
  volume       = {11},
  number       = {6},
  pages        = {389--401},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10207-012-0176-3},
  doi          = {10.1007/S10207-012-0176-3},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/HanSMY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/HuangYWS12,
  author       = {Qiong Huang and
                  Guomin Yang and
                  Duncan S. Wong and
                  Willy Susilo},
  title        = {A new efficient optimistic fair exchange protocol without random oracles},
  journal      = {Int. J. Inf. Sec.},
  volume       = {11},
  number       = {1},
  pages        = {53--63},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10207-011-0152-3},
  doi          = {10.1007/S10207-011-0152-3},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/HuangYWS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/Huber12,
  author       = {Michael Huber},
  title        = {Perfect secrecy systems immune to spoofing attacks},
  journal      = {Int. J. Inf. Sec.},
  volume       = {11},
  number       = {4},
  pages        = {281--289},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10207-012-0166-5},
  doi          = {10.1007/S10207-012-0166-5},
  timestamp    = {Fri, 09 Mar 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/Huber12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/KontaxisPM12,
  author       = {Georgios Kontaxis and
                  Michalis Polychronakis and
                  Evangelos P. Markatos},
  title        = {Minimizing information disclosure to third parties in social login
                  platforms},
  journal      = {Int. J. Inf. Sec.},
  volume       = {11},
  number       = {5},
  pages        = {321--332},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10207-012-0173-6},
  doi          = {10.1007/S10207-012-0173-6},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/KontaxisPM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/NiebuhrMBB12,
  author       = {Robert Niebuhr and
                  Mohammed Meziani and
                  Stanislav Bulygin and
                  Johannes Buchmann},
  title        = {Selecting parameters for secure McEliece-based cryptosystems},
  journal      = {Int. J. Inf. Sec.},
  volume       = {11},
  number       = {3},
  pages        = {137--147},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10207-011-0153-2},
  doi          = {10.1007/S10207-011-0153-2},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/NiebuhrMBB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/Nuida12,
  author       = {Koji Nuida},
  title        = {Short collusion-secure fingerprint codes against three pirates},
  journal      = {Int. J. Inf. Sec.},
  volume       = {11},
  number       = {2},
  pages        = {85--102},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10207-012-0155-8},
  doi          = {10.1007/S10207-012-0155-8},
  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/Nuida12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/Peng12,
  author       = {Kun Peng},
  title        = {Threshold distributed access control with public verification: a practical
                  application of {PVSS}},
  journal      = {Int. J. Inf. Sec.},
  volume       = {11},
  number       = {1},
  pages        = {23--31},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10207-011-0151-4},
  doi          = {10.1007/S10207-011-0151-4},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/Peng12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/Perez-MendezPLM12,
  author       = {Alejandro P{\'{e}}rez{-}M{\'{e}}ndez and
                  Fernando Pere{\~{n}}{\'{\i}}guez{-}Garcia and
                  Rafael Mar{\'{\i}}n L{\'{o}}pez and
                  Gabriel L{\'{o}}pez Mill{\'{a}}n},
  title        = {A cross-layer {SSO} solution for federating access to kerberized services
                  in the eduroam/DAMe network},
  journal      = {Int. J. Inf. Sec.},
  volume       = {11},
  number       = {6},
  pages        = {365--388},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10207-012-0174-5},
  doi          = {10.1007/S10207-012-0174-5},
  timestamp    = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/Perez-MendezPLM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/ReavesM12,
  author       = {Bradley Reaves and
                  Thomas H. Morris},
  title        = {An open virtual testbed for industrial control system security research},
  journal      = {Int. J. Inf. Sec.},
  volume       = {11},
  number       = {4},
  pages        = {215--229},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10207-012-0164-7},
  doi          = {10.1007/S10207-012-0164-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/ReavesM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/SoleMN12,
  author       = {Marc Sol{\'{e}} and
                  Victor Munt{\'{e}}s{-}Mulero and
                  Jordi Nin},
  title        = {Efficient microaggregation techniques for large numerical data volumes},
  journal      = {Int. J. Inf. Sec.},
  volume       = {11},
  number       = {4},
  pages        = {253--267},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10207-012-0158-5},
  doi          = {10.1007/S10207-012-0158-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/SoleMN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/WangYLMLC12,
  author       = {Yuanzhuo Wang and
                  Min Yu and
                  Jingyuan Li and
                  Kun Meng and
                  Chuang Lin and
                  Xueqi Cheng},
  title        = {Stochastic game net and applications in security analysis for enterprise
                  network},
  journal      = {Int. J. Inf. Sec.},
  volume       = {11},
  number       = {1},
  pages        = {41--52},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10207-011-0148-z},
  doi          = {10.1007/S10207-011-0148-Z},
  timestamp    = {Wed, 10 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/WangYLMLC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/XinCWLZMX12,
  author       = {Zhi Xin and
                  Huiyu Chen and
                  Xinche Wang and
                  Peng Liu and
                  Sencun Zhu and
                  Bing Mao and
                  Li Xie},
  title        = {Replacement attacks: automatically evading behavior-based software
                  birthmark},
  journal      = {Int. J. Inf. Sec.},
  volume       = {11},
  number       = {5},
  pages        = {293--304},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10207-012-0170-9},
  doi          = {10.1007/S10207-012-0170-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/XinCWLZMX12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/YaseenP12,
  author       = {Qussai Yaseen and
                  Brajendra Panda},
  title        = {Insider threat mitigation: preventing unauthorized knowledge acquisition},
  journal      = {Int. J. Inf. Sec.},
  volume       = {11},
  number       = {4},
  pages        = {269--280},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10207-012-0165-6},
  doi          = {10.1007/S10207-012-0165-6},
  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/YaseenP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/ZhouLL12,
  author       = {Jianying Zhou and
                  Xuejia Lai and
                  Hui Li},
  title        = {Message from the Guest Editors},
  journal      = {Int. J. Inf. Sec.},
  volume       = {11},
  number       = {5},
  pages        = {291--292},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10207-012-0172-7},
  doi          = {10.1007/S10207-012-0172-7},
  timestamp    = {Thu, 02 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/ZhouLL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics