Search dblp for Publications

export results for "stream:streams/journals/ijipsi:"

 download as .bib file

@article{DBLP:journals/ijipsi/DeepaS23,
  author       = {O. Deepa and
                  J. Suguna},
  title        = {An optimised QoS-based clustering with multipath secure routing protocol
                  for wireless sensor networks},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {5},
  number       = {3},
  pages        = {173--199},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJIPSI.2023.131532},
  doi          = {10.1504/IJIPSI.2023.131532},
  timestamp    = {Wed, 05 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/DeepaS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/DubeyB23,
  author       = {Himanshu Dubey and
                  Shobha Bhatt},
  title        = {Comparative analysis of Autopsy and WinHex tools on data acquisition
                  method},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {5},
  number       = {3},
  pages        = {200--210},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJIPSI.2023.131545},
  doi          = {10.1504/IJIPSI.2023.131545},
  timestamp    = {Wed, 05 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/DubeyB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/FernandezN23,
  author       = {Jincy J. Fernandez and
                  P. Nithyanandam},
  title        = {Biometric watermarking: an application-based review},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {5},
  number       = {3},
  pages        = {211--226},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJIPSI.2023.131546},
  doi          = {10.1504/IJIPSI.2023.131546},
  timestamp    = {Wed, 05 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/FernandezN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/Muhammad23,
  author       = {Yousuf Muhammad},
  title        = {Data privacy laws in the {USA}},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {5},
  number       = {3},
  pages        = {238--249},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJIPSI.2023.131571},
  doi          = {10.1504/IJIPSI.2023.131571},
  timestamp    = {Wed, 05 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/Muhammad23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/Rao23,
  author       = {Vemuri Sudarsan Rao},
  title        = {Security policies and trust issues in cloud computing},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {5},
  number       = {3},
  pages        = {227--237},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJIPSI.2023.131575},
  doi          = {10.1504/IJIPSI.2023.131575},
  timestamp    = {Wed, 05 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/Rao23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/BisginMNH21,
  author       = {Halil Bisgin and
                  Fadi Mohsen and
                  Vincent Nwobodo and
                  Rachael Havens},
  title        = {Enhancing malware detection in Android application by incorporating
                  broadcast receivers},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {5},
  number       = {1},
  pages        = {36--68},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJIPSI.2021.119168},
  doi          = {10.1504/IJIPSI.2021.119168},
  timestamp    = {Thu, 30 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijipsi/BisginMNH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/GeorgeJ21,
  author       = {Geethu Mary George and
                  L. S. Jayashree},
  title        = {A survey on user privacy preserving blockchain for health insurance
                  using Ethereum smart contract},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {5},
  number       = {2},
  pages        = {111--137},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJIPSI.2021.120354},
  doi          = {10.1504/IJIPSI.2021.120354},
  timestamp    = {Fri, 28 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijipsi/GeorgeJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/GreisYVMS21,
  author       = {Jakob Greis and
                  Artem Yushchenko and
                  Daniel Vogel and
                  Michael Meier and
                  Volker Steinhage},
  title        = {Automated identification of vulnerable devices in networks using traffic
                  data and deep learning},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {5},
  number       = {1},
  pages        = {1--17},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJIPSI.2021.119166},
  doi          = {10.1504/IJIPSI.2021.119166},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/GreisYVMS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/HendricksHP21,
  author       = {Matthew Kenneth Hendricks and
                  Benedikt Hirschfelder and
                  Pragasen Pillay},
  title        = {The willingness to provide personal information - a potential relationship
                  with the usage of privacy enhancing self-sovereign identity technology},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {5},
  number       = {2},
  pages        = {138--153},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJIPSI.2021.120356},
  doi          = {10.1504/IJIPSI.2021.120356},
  timestamp    = {Fri, 28 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijipsi/HendricksHP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/Mitropoulos21,
  author       = {Sarandis Mitropoulos},
  title        = {Conflict resolution in management policies: case study in cloud computing
                  and internet of things},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {5},
  number       = {2},
  pages        = {93--110},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJIPSI.2021.120352},
  doi          = {10.1504/IJIPSI.2021.120352},
  timestamp    = {Fri, 28 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijipsi/Mitropoulos21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/PagaleP21,
  author       = {Madhuri Pagale and
                  Richa Purohit},
  title        = {A review on privacy protection in the internet of things using machine
                  learning-based solutions},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {5},
  number       = {1},
  pages        = {69--91},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJIPSI.2021.119169},
  doi          = {10.1504/IJIPSI.2021.119169},
  timestamp    = {Thu, 30 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijipsi/PagaleP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/PatelMW21,
  author       = {N. D. Patel and
                  B. M. Mehtre and
                  Rajeev Wankar},
  title        = {Novel attribute selection technique for an efficient intrusion detection
                  system},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {5},
  number       = {2},
  pages        = {154--172},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJIPSI.2021.120358},
  doi          = {10.1504/IJIPSI.2021.120358},
  timestamp    = {Fri, 28 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijipsi/PatelMW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/WangCP21,
  author       = {Huanhuan Wang and
                  Debin Cheng and
                  Hui Peng},
  title        = {Phishing website detection method based on {CNAIR} framework},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {5},
  number       = {1},
  pages        = {18--35},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJIPSI.2021.119167},
  doi          = {10.1504/IJIPSI.2021.119167},
  timestamp    = {Thu, 30 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijipsi/WangCP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/AlmobaideenJS20,
  author       = {Wesam Almobaideen and
                  Hebatullah Jarboua and
                  Khair Eddin Sabri},
  title        = {Searchable encryption architectures: survey of the literature and
                  proposing a unified architecture},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {4},
  number       = {4},
  pages        = {237--260},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJIPSI.2020.115508},
  doi          = {10.1504/IJIPSI.2020.115508},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/AlmobaideenJS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/BenarousK20,
  author       = {Leila Benarous and
                  Benamar Kadri},
  title        = {Hybrid pseudonym change strategy for location privacy in {VANET:}
                  protecting location privacy in {VANET}},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {4},
  number       = {3},
  pages        = {153--169},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJIPSI.2020.111455},
  doi          = {10.1504/IJIPSI.2020.111455},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/BenarousK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/Bose20,
  author       = {Subrata Bose},
  title        = {Commutative encryption: an answer to privacy protected query processing
                  of multi data sources},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {4},
  number       = {3},
  pages        = {170--202},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJIPSI.2020.111457},
  doi          = {10.1504/IJIPSI.2020.111457},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/Bose20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/LambaV20,
  author       = {Jyoti Lamba and
                  V. Ch. Venkaiah},
  title        = {Privacy-preserving frequent itemset mining in vertically partitioned
                  database using symmetric homomorphic encryption scheme},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {4},
  number       = {3},
  pages        = {203--225},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJIPSI.2020.111464},
  doi          = {10.1504/IJIPSI.2020.111464},
  timestamp    = {Fri, 18 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijipsi/LambaV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/Larson20,
  author       = {Ronald B. Larson},
  title        = {Privacy concerns and actions to reduce privacy risks},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {4},
  number       = {4},
  pages        = {314--333},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJIPSI.2020.115524},
  doi          = {10.1504/IJIPSI.2020.115524},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijipsi/Larson20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/MitropoulosGG20,
  author       = {Sarandis Mitropoulos and
                  Antonios Gouglidis and
                  Vasileios Giotsas},
  title        = {A categorisation of policy conflicts in distributed systems and network
                  management},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {4},
  number       = {4},
  pages        = {276--295},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJIPSI.2020.115520},
  doi          = {10.1504/IJIPSI.2020.115520},
  timestamp    = {Mon, 12 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/MitropoulosGG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/NgalamouS20,
  author       = {Lucien Ngalamou and
                  Harmony L. Schmidbauer},
  title        = {Combating and perpetuating bias: the relationship between bias and
                  computer science},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {4},
  number       = {4},
  pages        = {296--313},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJIPSI.2020.115523},
  doi          = {10.1504/IJIPSI.2020.115523},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/NgalamouS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/PawlaszczykWZH20,
  author       = {Dirk Pawlaszczyk and
                  Jannik Weber and
                  Ralf Zimmermann and
                  Christian Hummert},
  title        = {Android apps and advertising networks - a survey on data privacy},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {4},
  number       = {4},
  pages        = {261--275},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJIPSI.2020.115509},
  doi          = {10.1504/IJIPSI.2020.115509},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/PawlaszczykWZH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/Yen20,
  author       = {Chia{-}Sung Yen},
  title        = {The influence of product placement on {TV} news and journalists self-evaluation
                  of professionalism and private policy},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {4},
  number       = {3},
  pages        = {226--236},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJIPSI.2020.111466},
  doi          = {10.1504/IJIPSI.2020.111466},
  timestamp    = {Fri, 18 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijipsi/Yen20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/AlaouiM19,
  author       = {El Arbi Abdellaoui Alaoui and
                  Mustapha El Moudden},
  title        = {Security analysis for intelligent urban freight transport},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {4},
  number       = {1},
  pages        = {49--64},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJIPSI.2019.103552},
  doi          = {10.1504/IJIPSI.2019.103552},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/AlaouiM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/AnsahAA19,
  author       = {Albert Kofi Kwansah Ansah and
                  Daniel Adu{-}Gyamfi and
                  Stephen Anokye},
  title        = {BiSign: pairing-based anonymity in bitcoin cryptocurrency},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {4},
  number       = {2},
  pages        = {115--133},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJIPSI.2019.106598},
  doi          = {10.1504/IJIPSI.2019.106598},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/AnsahAA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/Aswakan19,
  author       = {Chonlathip Aswakan},
  title        = {Live event creation and management: case of King Bhumibol Adulyadej
                  mourning event},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {4},
  number       = {2},
  pages        = {94--101},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJIPSI.2019.106583},
  doi          = {10.1504/IJIPSI.2019.106583},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/Aswakan19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/BerdighOY19,
  author       = {Asmaa Berdigh and
                  Kenza Oufaska and
                  Khalid {El Yassini}},
  title        = {Connected car and CO\({}_{\mbox{2}}\) emission overview: solutions,
                  challenges and opportunities},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {4},
  number       = {1},
  pages        = {65--78},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJIPSI.2019.103553},
  doi          = {10.1504/IJIPSI.2019.103553},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/BerdighOY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/Kwakye19,
  author       = {Michael Mireku Kwakye},
  title        = {Privacy-preservation in data pre-processing for web usage mining},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {4},
  number       = {2},
  pages        = {134--152},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJIPSI.2019.106605},
  doi          = {10.1504/IJIPSI.2019.106605},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/Kwakye19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/MonjagapateR19,
  author       = {Jirayut Monjagapate and
                  Nakorn Rungkittanasan},
  title        = {The study of acceptance Thai LGBTQs in Bangkok: analysis of attitudes
                  from Gen-Z people},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {4},
  number       = {2},
  pages        = {102--114},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJIPSI.2019.106582},
  doi          = {10.1504/IJIPSI.2019.106582},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/MonjagapateR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/RimaniHA19,
  author       = {Rachid Rimani and
                  Naima Hadj{-}Said and
                  Adda Ali{-}Pacha},
  title        = {Proposition of a dynamic steganography system based on the chaos properties
                  and image registration for distributing an encryption key},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {4},
  number       = {2},
  pages        = {79--93},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJIPSI.2019.106573},
  doi          = {10.1504/IJIPSI.2019.106573},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/RimaniHA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/SaidiGA19,
  author       = {Hanane Saidi and
                  Driss Gretete and
                  Adnane Addaim},
  title        = {Survey: secure opportunistic routing protocols in wireless networks},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {4},
  number       = {1},
  pages        = {30--48},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJIPSI.2019.103550},
  doi          = {10.1504/IJIPSI.2019.103550},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/SaidiGA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/TiwariST19,
  author       = {Vikas Tiwari and
                  Ajeet Singh and
                  Appala Naidu Tentu},
  title        = {Differential cryptanalysis on {DES} cryptosystem up to eight rounds},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {4},
  number       = {1},
  pages        = {1--29},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJIPSI.2019.103560},
  doi          = {10.1504/IJIPSI.2019.103560},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/TiwariST19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/AbdulsalamOA18,
  author       = {Yunusa Simpa Abdulsalam and
                  Olayemi Mikail Olaniyi and
                  Aliyu Ahmed},
  title        = {Enhanced tiny encryption algorithm for secure electronic health authentication
                  system},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {3},
  number       = {3},
  pages        = {230--252},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJIPSI.2018.10013222},
  doi          = {10.1504/IJIPSI.2018.10013222},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/AbdulsalamOA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/BabyC18,
  author       = {Vadlana Baby and
                  N. Subhash Chandra},
  title        = {Privacy preserving association rule mining based on homomorphic computations},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {3},
  number       = {4},
  pages        = {268--283},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJIPSI.2018.096135},
  doi          = {10.1504/IJIPSI.2018.096135},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/BabyC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/FernandezS18,
  author       = {Alfredo Perez Fernandez and
                  Guttorm Sindre},
  title        = {The privacy aware transmission highway framework},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {3},
  number       = {4},
  pages        = {327--350},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJIPSI.2018.096156},
  doi          = {10.1504/IJIPSI.2018.096156},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/FernandezS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/MichotaK18,
  author       = {Alexandra K. Michota and
                  Sokratis K. Katsikas},
  title        = {Towards improving existing online social networks' privacy policies},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {3},
  number       = {3},
  pages        = {209--229},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJIPSI.2018.10013220},
  doi          = {10.1504/IJIPSI.2018.10013220},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/MichotaK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/PlachkinovaA18,
  author       = {Miloslava Plachkinova and
                  Steven Andr{\'{e}}s},
  title        = {Towards an intercultural approach to information security},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {3},
  number       = {3},
  pages        = {155--186},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJIPSI.2018.10013212},
  doi          = {10.1504/IJIPSI.2018.10013212},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/PlachkinovaA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/SailajaRC18,
  author       = {Rayi Sailaja and
                  Ch. Rupa and
                  A. S. N. Chakravarthy},
  title        = {A novel integrated approach using Euclid's and fuzzy logic for secure
                  communication},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {3},
  number       = {4},
  pages        = {253--267},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJIPSI.2018.096131},
  doi          = {10.1504/IJIPSI.2018.096131},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijipsi/SailajaRC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/StewartD18,
  author       = {James Stewart and
                  Maurice E. Dawson},
  title        = {How the modification of personality traits leave one vulnerable to
                  manipulation in social engineering},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {3},
  number       = {3},
  pages        = {187--208},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJIPSI.2018.10013213},
  doi          = {10.1504/IJIPSI.2018.10013213},
  timestamp    = {Sun, 09 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/StewartD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/TibiGA18,
  author       = {Moanes H. Tibi and
                  Asmaa Ganayem and
                  Khaled Asad},
  title        = {The privacy paradox in using Facebook among Arab teens: between declarations
                  and behaviour},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {3},
  number       = {4},
  pages        = {310--326},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJIPSI.2018.096155},
  doi          = {10.1504/IJIPSI.2018.096155},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/TibiGA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/WhiteDZ18,
  author       = {Benjamin White and
                  Jun Dai and
                  Cui Zhang},
  title        = {An early detection tool in Eclipse to support secure coding practices},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {3},
  number       = {4},
  pages        = {284--309},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJIPSI.2018.096142},
  doi          = {10.1504/IJIPSI.2018.096142},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/WhiteDZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/AljohaniSR17,
  author       = {Nawaf Aljohani and
                  Joseph Shelton and
                  Kaushik Roy},
  title        = {A secure one time password protocol schema},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {3},
  number       = {2},
  pages        = {75--95},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJIPSI.2017.10009577},
  doi          = {10.1504/IJIPSI.2017.10009577},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/AljohaniSR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/LiL17,
  author       = {J. Jenny Li and
                  Jing{-}Chiou Liou},
  title        = {An experiment of hit-and-run wireless attacks},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {3},
  number       = {1},
  pages        = {58--74},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJIPSI.2017.10007837},
  doi          = {10.1504/IJIPSI.2017.10007837},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/LiL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/LiS17,
  author       = {J. Jenny Li and
                  Tony Savor},
  title        = {Automatic detection of DDoS attacks to notification services},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {3},
  number       = {1},
  pages        = {1--17},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJIPSI.2017.10007832},
  doi          = {10.1504/IJIPSI.2017.10007832},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/LiS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/LockwoodC17,
  author       = {Robert Lockwood and
                  Kevin Curran},
  title        = {Text based steganography},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {3},
  number       = {2},
  pages        = {134--153},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJIPSI.2017.10009581},
  doi          = {10.1504/IJIPSI.2017.10009581},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/LockwoodC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/Olakanmi17,
  author       = {Oladayo Olufemi Olakanmi},
  title        = {Secure and privacy-oriented obfuscation scheme for smart metering
                  in smart grid via dynamic aggregation and lightweight perturbation},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {3},
  number       = {1},
  pages        = {38--57},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJIPSI.2017.10007836},
  doi          = {10.1504/IJIPSI.2017.10007836},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/Olakanmi17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/Patil17,
  author       = {Kailas Patil},
  title        = {Isolating malicious content scripts of browser extensions},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {3},
  number       = {1},
  pages        = {18--37},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJIPSI.2017.10007834},
  doi          = {10.1504/IJIPSI.2017.10007834},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/Patil17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/PonsRVVP17,
  author       = {Alexander Perez{-}Pons and
                  Andrew De La Rosa and
                  Silvia Vidaurre and
                  Luis Vargas and
                  Eugene Pons},
  title        = {Security and privacy implications of 'do not track'},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {3},
  number       = {2},
  pages        = {117--133},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJIPSI.2017.10009580},
  doi          = {10.1504/IJIPSI.2017.10009580},
  timestamp    = {Fri, 11 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijipsi/PonsRVVP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/SheltonJR17,
  author       = {Joseph Shelton and
                  John Jenkins and
                  Kaushik Roy},
  title        = {Extending disposable feature templates for mitigating replay attacks},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {3},
  number       = {2},
  pages        = {96--116},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJIPSI.2017.10009578},
  doi          = {10.1504/IJIPSI.2017.10009578},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/SheltonJR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/AgilandeeswariK16,
  author       = {Loganathan Agilandeeswari and
                  Ganesan Kaliyaperumal},
  title        = {False-positive free Hilbert and multi-resolution-based image watermarking
                  technique using firefly optimisation algorithm},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {2},
  number       = {4},
  pages        = {257--280},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJIPSI.2016.10003007},
  doi          = {10.1504/IJIPSI.2016.10003007},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/AgilandeeswariK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/AhmadMOPSU16,
  author       = {Aftab Ahmad and
                  Preeti Misra and
                  Frank Ono and
                  Cody Priest and
                  Jessica Suarez and
                  Alexander Urcioli},
  title        = {The information privacy domain},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {2},
  number       = {4},
  pages        = {307--329},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJIPSI.2016.10003023},
  doi          = {10.1504/IJIPSI.2016.10003023},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/AhmadMOPSU16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/ChaudharyGK16,
  author       = {Divya Chaudhary and
                  Shailender Gupta and
                  Manju Kumari},
  title        = {A novel hybrid security mechanism for data communication networks},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {2},
  number       = {3},
  pages        = {216--231},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJIPSI.2016.078592},
  doi          = {10.1504/IJIPSI.2016.078592},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/ChaudharyGK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/DayalN16,
  author       = {Mohit Dayal and
                  Bharti Nagpal},
  title        = {A compendious investigation of Android malware family},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {2},
  number       = {4},
  pages        = {330--352},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJIPSI.2016.10003026},
  doi          = {10.1504/IJIPSI.2016.10003026},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/DayalN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/LeLL16,
  author       = {Ha{-}Thanh Le and
                  Peter Loh and
                  Chiew Tong Lau},
  title        = {Performance evaluation of cyber reconnaissance tools},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {2},
  number       = {3},
  pages        = {177--196},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJIPSI.2016.078589},
  doi          = {10.1504/IJIPSI.2016.078589},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/LeLL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/Pan16,
  author       = {Jonathan Pan},
  title        = {Data farming for cyber security: an agent-based modelling approach},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {2},
  number       = {3},
  pages        = {197--215},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJIPSI.2016.078590},
  doi          = {10.1504/IJIPSI.2016.078590},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/Pan16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/Patil16,
  author       = {Kailas Patil},
  title        = {Request dependency integrity: validating web requests using dependencies
                  in the browser environment},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {2},
  number       = {4},
  pages        = {281--306},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJIPSI.2016.10003019},
  doi          = {10.1504/IJIPSI.2016.10003019},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/Patil16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/TrabelsiM16,
  author       = {Zouheir Trabelsi and
                  Mohammad M. Masud},
  title        = {An extended identity-based cryptography protocol based on biometric},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {2},
  number       = {3},
  pages        = {232--256},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJIPSI.2016.078594},
  doi          = {10.1504/IJIPSI.2016.078594},
  timestamp    = {Fri, 17 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijipsi/TrabelsiM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/ChavanA15,
  author       = {Pallavi Vijay Chavan and
                  Mohammad Atique},
  title        = {Secured approach for authentication using threshold-based hierarchical
                  visual cryptography},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {2},
  number       = {2},
  pages        = {159--175},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJIPSI.2015.075440},
  doi          = {10.1504/IJIPSI.2015.075440},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/ChavanA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/IslamIWG15,
  author       = {Mohammad Badiul Islam and
                  Renato Iannella and
                  Jason Watson and
                  Shlomo Geva},
  title        = {Privacy architectures in social networks' state-of-the-art survey},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {2},
  number       = {2},
  pages        = {102--137},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJIPSI.2015.075438},
  doi          = {10.1504/IJIPSI.2015.075438},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/IslamIWG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/KumarD15,
  author       = {Sunil Kumar and
                  Kamlesh Dutta},
  title        = {Intrusion detection technique for black hole attack in mobile ad hoc
                  networks},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {2},
  number       = {2},
  pages        = {81--101},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJIPSI.2015.075435},
  doi          = {10.1504/IJIPSI.2015.075435},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/KumarD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/ShanthiB15,
  author       = {P. Shanthi and
                  S. R. Balasundaram},
  title        = {A graph-based cloak algorithm to preserve location privacy in location-based
                  services},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {2},
  number       = {2},
  pages        = {138--158},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJIPSI.2015.075439},
  doi          = {10.1504/IJIPSI.2015.075439},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/ShanthiB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/ColomboF14,
  author       = {Pietro Colombo and
                  Elena Ferrari},
  title        = {A framework for privacy aware data management in relational databases},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {2},
  number       = {1},
  pages        = {56--78},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJIPSI.2014.062886},
  doi          = {10.1504/IJIPSI.2014.062886},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/ColomboF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/FerebeeDW14,
  author       = {Denise Ferebee and
                  Dipankar Dasgupta and
                  Qishi Wu},
  title        = {Information assurance: a cyber security storm map},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {2},
  number       = {1},
  pages        = {37--55},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJIPSI.2014.062865},
  doi          = {10.1504/IJIPSI.2014.062865},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/FerebeeDW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/Kanampiu14,
  author       = {Munene W. Kanampiu},
  title        = {Using non-verbal social signals and degree centrality to optimise
                  a covert actor's detection scheme for a healthy networked community},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {2},
  number       = {1},
  pages        = {21--36},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJIPSI.2014.062864},
  doi          = {10.1504/IJIPSI.2014.062864},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/Kanampiu14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/ZhanF14,
  author       = {Justin Zhan and
                  Xing Fang},
  title        = {A computational framework for detecting malicious actors in communities},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {2},
  number       = {1},
  pages        = {1--20},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJIPSI.2014.062863},
  doi          = {10.1504/IJIPSI.2014.062863},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/ZhanF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/AbadieW13,
  author       = {Andre Abadie and
                  Duminda Wijesekera},
  title        = {An approach for risk assessment and mitigation in cognitive radio
                  technologies},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {1},
  number       = {4},
  pages        = {344--359},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJIPSI.2013.058208},
  doi          = {10.1504/IJIPSI.2013.058208},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/AbadieW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/AliA13,
  author       = {Syed Taqi Ali and
                  B. B. Amberker},
  title        = {A dynamic constant size attribute-based group signature scheme with
                  attribute anonymity},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {1},
  number       = {4},
  pages        = {312--343},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJIPSI.2013.058207},
  doi          = {10.1504/IJIPSI.2013.058207},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/AliA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/DoyalZ13,
  author       = {Alex Doyal and
                  Justin Zhan},
  title        = {Triple DoS: DDoS defence and traceback},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {1},
  number       = {4},
  pages        = {299--311},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJIPSI.2013.058206},
  doi          = {10.1504/IJIPSI.2013.058206},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/DoyalZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/ImranGRS13,
  author       = {Asif Imran and
                  Alim Ul Gias and
                  Rayhanur Rahman and
                  Kazi Sakib},
  title        = {ProvIntSec: a provenance cognition blueprint ensuring integrity and
                  security for real life open source cloud},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {1},
  number       = {4},
  pages        = {360--380},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJIPSI.2013.058226},
  doi          = {10.1504/IJIPSI.2013.058226},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/ImranGRS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/Sagheb-TehraniG13,
  author       = {Mehdi Sagheb{-}Tehrani and
                  Arbi Ghazarian},
  title        = {High development cost and software piracy: a study of motives},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {1},
  number       = {4},
  pages        = {381--402},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJIPSI.2013.058231},
  doi          = {10.1504/IJIPSI.2013.058231},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/Sagheb-TehraniG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/ArdagnaVFPS12,
  author       = {Claudio A. Ardagna and
                  Sabrina De Capitani di Vimercati and
                  Sara Foresti and
                  Stefano Paraboschi and
                  Pierangela Samarati},
  title        = {Minimising disclosure of client information in credential-based interactions},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {1},
  number       = {2/3},
  pages        = {205--233},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJIPSI.2012.046133},
  doi          = {10.1504/IJIPSI.2012.046133},
  timestamp    = {Mon, 21 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijipsi/ArdagnaVFPS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/ChaFKL12,
  author       = {Shi{-}Cho Cha and
                  Ya{-}Ping Fu and
                  Ren{-}Ting Ku and
                  Hao{-}Ping Lin},
  title        = {On considering enforcement while establishing {RFID} privacy policies},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {1},
  number       = {2/3},
  pages        = {234--252},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJIPSI.2012.046134},
  doi          = {10.1504/IJIPSI.2012.046134},
  timestamp    = {Thu, 13 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/ChaFKL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/ChenL12,
  author       = {Liqun Chen and
                  Jiangtao Li},
  title        = {{VLR} group signatures with indisputable exculpability and efficient
                  revocation},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {1},
  number       = {2/3},
  pages        = {129--159},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJIPSI.2012.046130},
  doi          = {10.1504/IJIPSI.2012.046130},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/ChenL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/LarsenH12,
  author       = {Michael D. Larsen and
                  Jennifer C. Huckett},
  title        = {Multimethod synthetic data generation for confidentiality and measurement
                  of disclosure risk},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {1},
  number       = {2/3},
  pages        = {184--204},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJIPSI.2012.046132},
  doi          = {10.1504/IJIPSI.2012.046132},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/LarsenH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/TaheriHH12,
  author       = {Somayeh Taheri and
                  Salke Hartung and
                  Dieter Hogrefe},
  title        = {{RDIS:} destination location privacy in MANETs},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {1},
  number       = {2/3},
  pages        = {253--277},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJIPSI.2012.046135},
  doi          = {10.1504/IJIPSI.2012.046135},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/TaheriHH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/YapYBUKKS12,
  author       = {Lee Fueng Yap and
                  Takeshi Yashiro and
                  Masahiro Bessho and
                  Tomonori Usaka and
                  M. Fahim Ferdous Khan and
                  Noboru Koshizuka and
                  Ken Sakamura},
  title        = {{SUCAS:} smart-card-based secure user-centric attestation framework
                  for location-based services},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {1},
  number       = {2/3},
  pages        = {160--183},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJIPSI.2012.046131},
  doi          = {10.1504/IJIPSI.2012.046131},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/YapYBUKKS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/ZhouH12,
  author       = {Zhibin Zhou and
                  Dijiang Huang},
  title        = {Gradual identity exposure using attribute-based encryption},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {1},
  number       = {2/3},
  pages        = {278--297},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJIPSI.2012.046136},
  doi          = {10.1504/IJIPSI.2012.046136},
  timestamp    = {Thu, 05 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/ZhouH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/Al-ArayedS11,
  author       = {Dalal Ahmed Al{-}Arayed and
                  Jo{\~{a}}o Pedro Sousa},
  title        = {A general model for trust management},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {1},
  number       = {1},
  pages        = {79--105},
  year         = {2011},
  url          = {https://doi.org/10.1504/IJIPSI.2011.043732},
  doi          = {10.1504/IJIPSI.2011.043732},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/Al-ArayedS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/BrickellL11,
  author       = {Ernie Brickell and
                  Jiangtao Li},
  title        = {Enhanced privacy {ID} from bilinear pairing for hardware authentication
                  and attestation},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {1},
  number       = {1},
  pages        = {3--33},
  year         = {2011},
  url          = {https://doi.org/10.1504/IJIPSI.2011.043729},
  doi          = {10.1504/IJIPSI.2011.043729},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/BrickellL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/JinTJ11,
  author       = {Lei Jin and
                  Hassan Takabi and
                  James B. D. Joshi},
  title        = {Analysing security and privacy issues of using e-mail address as identity},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {1},
  number       = {1},
  pages        = {34--58},
  year         = {2011},
  url          = {https://doi.org/10.1504/IJIPSI.2011.043730},
  doi          = {10.1504/IJIPSI.2011.043730},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/JinTJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/MasoumzadehJ11,
  author       = {Amirreza Masoumzadeh and
                  James Joshi},
  title        = {Ontology-based access control for social network systems},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {1},
  number       = {1},
  pages        = {59--78},
  year         = {2011},
  url          = {https://doi.org/10.1504/IJIPSI.2011.043731},
  doi          = {10.1504/IJIPSI.2011.043731},
  timestamp    = {Fri, 08 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/MasoumzadehJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/MeadMZ11,
  author       = {Nancy R. Mead and
                  Seiya Miyazaki and
                  Justin Zhan},
  title        = {Integrating privacy requirements considerations into a security requirements
                  engineering method and tool},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {1},
  number       = {1},
  pages        = {106--126},
  year         = {2011},
  url          = {https://doi.org/10.1504/IJIPSI.2011.043733},
  doi          = {10.1504/IJIPSI.2011.043733},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/MeadMZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics