Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "stream:streams/journals/ijipsi:"
@article{DBLP:journals/ijipsi/DeepaS23, author = {O. Deepa and J. Suguna}, title = {An optimised QoS-based clustering with multipath secure routing protocol for wireless sensor networks}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {5}, number = {3}, pages = {173--199}, year = {2023}, url = {https://doi.org/10.1504/IJIPSI.2023.131532}, doi = {10.1504/IJIPSI.2023.131532}, timestamp = {Wed, 05 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/DeepaS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/DubeyB23, author = {Himanshu Dubey and Shobha Bhatt}, title = {Comparative analysis of Autopsy and WinHex tools on data acquisition method}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {5}, number = {3}, pages = {200--210}, year = {2023}, url = {https://doi.org/10.1504/IJIPSI.2023.131545}, doi = {10.1504/IJIPSI.2023.131545}, timestamp = {Wed, 05 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/DubeyB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/FernandezN23, author = {Jincy J. Fernandez and P. Nithyanandam}, title = {Biometric watermarking: an application-based review}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {5}, number = {3}, pages = {211--226}, year = {2023}, url = {https://doi.org/10.1504/IJIPSI.2023.131546}, doi = {10.1504/IJIPSI.2023.131546}, timestamp = {Wed, 05 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/FernandezN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/Muhammad23, author = {Yousuf Muhammad}, title = {Data privacy laws in the {USA}}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {5}, number = {3}, pages = {238--249}, year = {2023}, url = {https://doi.org/10.1504/IJIPSI.2023.131571}, doi = {10.1504/IJIPSI.2023.131571}, timestamp = {Wed, 05 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/Muhammad23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/Rao23, author = {Vemuri Sudarsan Rao}, title = {Security policies and trust issues in cloud computing}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {5}, number = {3}, pages = {227--237}, year = {2023}, url = {https://doi.org/10.1504/IJIPSI.2023.131575}, doi = {10.1504/IJIPSI.2023.131575}, timestamp = {Wed, 05 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/Rao23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/BisginMNH21, author = {Halil Bisgin and Fadi Mohsen and Vincent Nwobodo and Rachael Havens}, title = {Enhancing malware detection in Android application by incorporating broadcast receivers}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {5}, number = {1}, pages = {36--68}, year = {2021}, url = {https://doi.org/10.1504/IJIPSI.2021.119168}, doi = {10.1504/IJIPSI.2021.119168}, timestamp = {Thu, 30 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijipsi/BisginMNH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/GeorgeJ21, author = {Geethu Mary George and L. S. Jayashree}, title = {A survey on user privacy preserving blockchain for health insurance using Ethereum smart contract}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {5}, number = {2}, pages = {111--137}, year = {2021}, url = {https://doi.org/10.1504/IJIPSI.2021.120354}, doi = {10.1504/IJIPSI.2021.120354}, timestamp = {Fri, 28 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijipsi/GeorgeJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/GreisYVMS21, author = {Jakob Greis and Artem Yushchenko and Daniel Vogel and Michael Meier and Volker Steinhage}, title = {Automated identification of vulnerable devices in networks using traffic data and deep learning}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {5}, number = {1}, pages = {1--17}, year = {2021}, url = {https://doi.org/10.1504/IJIPSI.2021.119166}, doi = {10.1504/IJIPSI.2021.119166}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/GreisYVMS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/HendricksHP21, author = {Matthew Kenneth Hendricks and Benedikt Hirschfelder and Pragasen Pillay}, title = {The willingness to provide personal information - a potential relationship with the usage of privacy enhancing self-sovereign identity technology}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {5}, number = {2}, pages = {138--153}, year = {2021}, url = {https://doi.org/10.1504/IJIPSI.2021.120356}, doi = {10.1504/IJIPSI.2021.120356}, timestamp = {Fri, 28 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijipsi/HendricksHP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/Mitropoulos21, author = {Sarandis Mitropoulos}, title = {Conflict resolution in management policies: case study in cloud computing and internet of things}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {5}, number = {2}, pages = {93--110}, year = {2021}, url = {https://doi.org/10.1504/IJIPSI.2021.120352}, doi = {10.1504/IJIPSI.2021.120352}, timestamp = {Fri, 28 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijipsi/Mitropoulos21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/PagaleP21, author = {Madhuri Pagale and Richa Purohit}, title = {A review on privacy protection in the internet of things using machine learning-based solutions}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {5}, number = {1}, pages = {69--91}, year = {2021}, url = {https://doi.org/10.1504/IJIPSI.2021.119169}, doi = {10.1504/IJIPSI.2021.119169}, timestamp = {Thu, 30 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijipsi/PagaleP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/PatelMW21, author = {N. D. Patel and B. M. Mehtre and Rajeev Wankar}, title = {Novel attribute selection technique for an efficient intrusion detection system}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {5}, number = {2}, pages = {154--172}, year = {2021}, url = {https://doi.org/10.1504/IJIPSI.2021.120358}, doi = {10.1504/IJIPSI.2021.120358}, timestamp = {Fri, 28 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijipsi/PatelMW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/WangCP21, author = {Huanhuan Wang and Debin Cheng and Hui Peng}, title = {Phishing website detection method based on {CNAIR} framework}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {5}, number = {1}, pages = {18--35}, year = {2021}, url = {https://doi.org/10.1504/IJIPSI.2021.119167}, doi = {10.1504/IJIPSI.2021.119167}, timestamp = {Thu, 30 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijipsi/WangCP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/AlmobaideenJS20, author = {Wesam Almobaideen and Hebatullah Jarboua and Khair Eddin Sabri}, title = {Searchable encryption architectures: survey of the literature and proposing a unified architecture}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {4}, number = {4}, pages = {237--260}, year = {2020}, url = {https://doi.org/10.1504/IJIPSI.2020.115508}, doi = {10.1504/IJIPSI.2020.115508}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/AlmobaideenJS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/BenarousK20, author = {Leila Benarous and Benamar Kadri}, title = {Hybrid pseudonym change strategy for location privacy in {VANET:} protecting location privacy in {VANET}}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {4}, number = {3}, pages = {153--169}, year = {2020}, url = {https://doi.org/10.1504/IJIPSI.2020.111455}, doi = {10.1504/IJIPSI.2020.111455}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/BenarousK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/Bose20, author = {Subrata Bose}, title = {Commutative encryption: an answer to privacy protected query processing of multi data sources}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {4}, number = {3}, pages = {170--202}, year = {2020}, url = {https://doi.org/10.1504/IJIPSI.2020.111457}, doi = {10.1504/IJIPSI.2020.111457}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/Bose20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/LambaV20, author = {Jyoti Lamba and V. Ch. Venkaiah}, title = {Privacy-preserving frequent itemset mining in vertically partitioned database using symmetric homomorphic encryption scheme}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {4}, number = {3}, pages = {203--225}, year = {2020}, url = {https://doi.org/10.1504/IJIPSI.2020.111464}, doi = {10.1504/IJIPSI.2020.111464}, timestamp = {Fri, 18 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijipsi/LambaV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/Larson20, author = {Ronald B. Larson}, title = {Privacy concerns and actions to reduce privacy risks}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {4}, number = {4}, pages = {314--333}, year = {2020}, url = {https://doi.org/10.1504/IJIPSI.2020.115524}, doi = {10.1504/IJIPSI.2020.115524}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijipsi/Larson20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/MitropoulosGG20, author = {Sarandis Mitropoulos and Antonios Gouglidis and Vasileios Giotsas}, title = {A categorisation of policy conflicts in distributed systems and network management}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {4}, number = {4}, pages = {276--295}, year = {2020}, url = {https://doi.org/10.1504/IJIPSI.2020.115520}, doi = {10.1504/IJIPSI.2020.115520}, timestamp = {Mon, 12 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/MitropoulosGG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/NgalamouS20, author = {Lucien Ngalamou and Harmony L. Schmidbauer}, title = {Combating and perpetuating bias: the relationship between bias and computer science}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {4}, number = {4}, pages = {296--313}, year = {2020}, url = {https://doi.org/10.1504/IJIPSI.2020.115523}, doi = {10.1504/IJIPSI.2020.115523}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/NgalamouS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/PawlaszczykWZH20, author = {Dirk Pawlaszczyk and Jannik Weber and Ralf Zimmermann and Christian Hummert}, title = {Android apps and advertising networks - a survey on data privacy}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {4}, number = {4}, pages = {261--275}, year = {2020}, url = {https://doi.org/10.1504/IJIPSI.2020.115509}, doi = {10.1504/IJIPSI.2020.115509}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/PawlaszczykWZH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/Yen20, author = {Chia{-}Sung Yen}, title = {The influence of product placement on {TV} news and journalists self-evaluation of professionalism and private policy}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {4}, number = {3}, pages = {226--236}, year = {2020}, url = {https://doi.org/10.1504/IJIPSI.2020.111466}, doi = {10.1504/IJIPSI.2020.111466}, timestamp = {Fri, 18 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijipsi/Yen20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/AlaouiM19, author = {El Arbi Abdellaoui Alaoui and Mustapha El Moudden}, title = {Security analysis for intelligent urban freight transport}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {4}, number = {1}, pages = {49--64}, year = {2019}, url = {https://doi.org/10.1504/IJIPSI.2019.103552}, doi = {10.1504/IJIPSI.2019.103552}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/AlaouiM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/AnsahAA19, author = {Albert Kofi Kwansah Ansah and Daniel Adu{-}Gyamfi and Stephen Anokye}, title = {BiSign: pairing-based anonymity in bitcoin cryptocurrency}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {4}, number = {2}, pages = {115--133}, year = {2019}, url = {https://doi.org/10.1504/IJIPSI.2019.106598}, doi = {10.1504/IJIPSI.2019.106598}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/AnsahAA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/Aswakan19, author = {Chonlathip Aswakan}, title = {Live event creation and management: case of King Bhumibol Adulyadej mourning event}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {4}, number = {2}, pages = {94--101}, year = {2019}, url = {https://doi.org/10.1504/IJIPSI.2019.106583}, doi = {10.1504/IJIPSI.2019.106583}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/Aswakan19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/BerdighOY19, author = {Asmaa Berdigh and Kenza Oufaska and Khalid {El Yassini}}, title = {Connected car and CO\({}_{\mbox{2}}\) emission overview: solutions, challenges and opportunities}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {4}, number = {1}, pages = {65--78}, year = {2019}, url = {https://doi.org/10.1504/IJIPSI.2019.103553}, doi = {10.1504/IJIPSI.2019.103553}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/BerdighOY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/Kwakye19, author = {Michael Mireku Kwakye}, title = {Privacy-preservation in data pre-processing for web usage mining}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {4}, number = {2}, pages = {134--152}, year = {2019}, url = {https://doi.org/10.1504/IJIPSI.2019.106605}, doi = {10.1504/IJIPSI.2019.106605}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/Kwakye19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/MonjagapateR19, author = {Jirayut Monjagapate and Nakorn Rungkittanasan}, title = {The study of acceptance Thai LGBTQs in Bangkok: analysis of attitudes from Gen-Z people}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {4}, number = {2}, pages = {102--114}, year = {2019}, url = {https://doi.org/10.1504/IJIPSI.2019.106582}, doi = {10.1504/IJIPSI.2019.106582}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/MonjagapateR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/RimaniHA19, author = {Rachid Rimani and Naima Hadj{-}Said and Adda Ali{-}Pacha}, title = {Proposition of a dynamic steganography system based on the chaos properties and image registration for distributing an encryption key}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {4}, number = {2}, pages = {79--93}, year = {2019}, url = {https://doi.org/10.1504/IJIPSI.2019.106573}, doi = {10.1504/IJIPSI.2019.106573}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/RimaniHA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/SaidiGA19, author = {Hanane Saidi and Driss Gretete and Adnane Addaim}, title = {Survey: secure opportunistic routing protocols in wireless networks}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {4}, number = {1}, pages = {30--48}, year = {2019}, url = {https://doi.org/10.1504/IJIPSI.2019.103550}, doi = {10.1504/IJIPSI.2019.103550}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/SaidiGA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/TiwariST19, author = {Vikas Tiwari and Ajeet Singh and Appala Naidu Tentu}, title = {Differential cryptanalysis on {DES} cryptosystem up to eight rounds}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {4}, number = {1}, pages = {1--29}, year = {2019}, url = {https://doi.org/10.1504/IJIPSI.2019.103560}, doi = {10.1504/IJIPSI.2019.103560}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/TiwariST19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/AbdulsalamOA18, author = {Yunusa Simpa Abdulsalam and Olayemi Mikail Olaniyi and Aliyu Ahmed}, title = {Enhanced tiny encryption algorithm for secure electronic health authentication system}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {3}, number = {3}, pages = {230--252}, year = {2018}, url = {https://doi.org/10.1504/IJIPSI.2018.10013222}, doi = {10.1504/IJIPSI.2018.10013222}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/AbdulsalamOA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/BabyC18, author = {Vadlana Baby and N. Subhash Chandra}, title = {Privacy preserving association rule mining based on homomorphic computations}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {3}, number = {4}, pages = {268--283}, year = {2018}, url = {https://doi.org/10.1504/IJIPSI.2018.096135}, doi = {10.1504/IJIPSI.2018.096135}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/BabyC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/FernandezS18, author = {Alfredo Perez Fernandez and Guttorm Sindre}, title = {The privacy aware transmission highway framework}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {3}, number = {4}, pages = {327--350}, year = {2018}, url = {https://doi.org/10.1504/IJIPSI.2018.096156}, doi = {10.1504/IJIPSI.2018.096156}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/FernandezS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/MichotaK18, author = {Alexandra K. Michota and Sokratis K. Katsikas}, title = {Towards improving existing online social networks' privacy policies}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {3}, number = {3}, pages = {209--229}, year = {2018}, url = {https://doi.org/10.1504/IJIPSI.2018.10013220}, doi = {10.1504/IJIPSI.2018.10013220}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/MichotaK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/PlachkinovaA18, author = {Miloslava Plachkinova and Steven Andr{\'{e}}s}, title = {Towards an intercultural approach to information security}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {3}, number = {3}, pages = {155--186}, year = {2018}, url = {https://doi.org/10.1504/IJIPSI.2018.10013212}, doi = {10.1504/IJIPSI.2018.10013212}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/PlachkinovaA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/SailajaRC18, author = {Rayi Sailaja and Ch. Rupa and A. S. N. Chakravarthy}, title = {A novel integrated approach using Euclid's and fuzzy logic for secure communication}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {3}, number = {4}, pages = {253--267}, year = {2018}, url = {https://doi.org/10.1504/IJIPSI.2018.096131}, doi = {10.1504/IJIPSI.2018.096131}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijipsi/SailajaRC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/StewartD18, author = {James Stewart and Maurice E. Dawson}, title = {How the modification of personality traits leave one vulnerable to manipulation in social engineering}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {3}, number = {3}, pages = {187--208}, year = {2018}, url = {https://doi.org/10.1504/IJIPSI.2018.10013213}, doi = {10.1504/IJIPSI.2018.10013213}, timestamp = {Sun, 09 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/StewartD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/TibiGA18, author = {Moanes H. Tibi and Asmaa Ganayem and Khaled Asad}, title = {The privacy paradox in using Facebook among Arab teens: between declarations and behaviour}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {3}, number = {4}, pages = {310--326}, year = {2018}, url = {https://doi.org/10.1504/IJIPSI.2018.096155}, doi = {10.1504/IJIPSI.2018.096155}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/TibiGA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/WhiteDZ18, author = {Benjamin White and Jun Dai and Cui Zhang}, title = {An early detection tool in Eclipse to support secure coding practices}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {3}, number = {4}, pages = {284--309}, year = {2018}, url = {https://doi.org/10.1504/IJIPSI.2018.096142}, doi = {10.1504/IJIPSI.2018.096142}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/WhiteDZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/AljohaniSR17, author = {Nawaf Aljohani and Joseph Shelton and Kaushik Roy}, title = {A secure one time password protocol schema}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {3}, number = {2}, pages = {75--95}, year = {2017}, url = {https://doi.org/10.1504/IJIPSI.2017.10009577}, doi = {10.1504/IJIPSI.2017.10009577}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/AljohaniSR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/LiL17, author = {J. Jenny Li and Jing{-}Chiou Liou}, title = {An experiment of hit-and-run wireless attacks}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {3}, number = {1}, pages = {58--74}, year = {2017}, url = {https://doi.org/10.1504/IJIPSI.2017.10007837}, doi = {10.1504/IJIPSI.2017.10007837}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/LiL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/LiS17, author = {J. Jenny Li and Tony Savor}, title = {Automatic detection of DDoS attacks to notification services}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {3}, number = {1}, pages = {1--17}, year = {2017}, url = {https://doi.org/10.1504/IJIPSI.2017.10007832}, doi = {10.1504/IJIPSI.2017.10007832}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/LiS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/LockwoodC17, author = {Robert Lockwood and Kevin Curran}, title = {Text based steganography}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {3}, number = {2}, pages = {134--153}, year = {2017}, url = {https://doi.org/10.1504/IJIPSI.2017.10009581}, doi = {10.1504/IJIPSI.2017.10009581}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/LockwoodC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/Olakanmi17, author = {Oladayo Olufemi Olakanmi}, title = {Secure and privacy-oriented obfuscation scheme for smart metering in smart grid via dynamic aggregation and lightweight perturbation}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {3}, number = {1}, pages = {38--57}, year = {2017}, url = {https://doi.org/10.1504/IJIPSI.2017.10007836}, doi = {10.1504/IJIPSI.2017.10007836}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/Olakanmi17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/Patil17, author = {Kailas Patil}, title = {Isolating malicious content scripts of browser extensions}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {3}, number = {1}, pages = {18--37}, year = {2017}, url = {https://doi.org/10.1504/IJIPSI.2017.10007834}, doi = {10.1504/IJIPSI.2017.10007834}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/Patil17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/PonsRVVP17, author = {Alexander Perez{-}Pons and Andrew De La Rosa and Silvia Vidaurre and Luis Vargas and Eugene Pons}, title = {Security and privacy implications of 'do not track'}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {3}, number = {2}, pages = {117--133}, year = {2017}, url = {https://doi.org/10.1504/IJIPSI.2017.10009580}, doi = {10.1504/IJIPSI.2017.10009580}, timestamp = {Fri, 11 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijipsi/PonsRVVP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/SheltonJR17, author = {Joseph Shelton and John Jenkins and Kaushik Roy}, title = {Extending disposable feature templates for mitigating replay attacks}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {3}, number = {2}, pages = {96--116}, year = {2017}, url = {https://doi.org/10.1504/IJIPSI.2017.10009578}, doi = {10.1504/IJIPSI.2017.10009578}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/SheltonJR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/AgilandeeswariK16, author = {Loganathan Agilandeeswari and Ganesan Kaliyaperumal}, title = {False-positive free Hilbert and multi-resolution-based image watermarking technique using firefly optimisation algorithm}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {2}, number = {4}, pages = {257--280}, year = {2016}, url = {https://doi.org/10.1504/IJIPSI.2016.10003007}, doi = {10.1504/IJIPSI.2016.10003007}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/AgilandeeswariK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/AhmadMOPSU16, author = {Aftab Ahmad and Preeti Misra and Frank Ono and Cody Priest and Jessica Suarez and Alexander Urcioli}, title = {The information privacy domain}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {2}, number = {4}, pages = {307--329}, year = {2016}, url = {https://doi.org/10.1504/IJIPSI.2016.10003023}, doi = {10.1504/IJIPSI.2016.10003023}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/AhmadMOPSU16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/ChaudharyGK16, author = {Divya Chaudhary and Shailender Gupta and Manju Kumari}, title = {A novel hybrid security mechanism for data communication networks}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {2}, number = {3}, pages = {216--231}, year = {2016}, url = {https://doi.org/10.1504/IJIPSI.2016.078592}, doi = {10.1504/IJIPSI.2016.078592}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/ChaudharyGK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/DayalN16, author = {Mohit Dayal and Bharti Nagpal}, title = {A compendious investigation of Android malware family}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {2}, number = {4}, pages = {330--352}, year = {2016}, url = {https://doi.org/10.1504/IJIPSI.2016.10003026}, doi = {10.1504/IJIPSI.2016.10003026}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/DayalN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/LeLL16, author = {Ha{-}Thanh Le and Peter Loh and Chiew Tong Lau}, title = {Performance evaluation of cyber reconnaissance tools}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {2}, number = {3}, pages = {177--196}, year = {2016}, url = {https://doi.org/10.1504/IJIPSI.2016.078589}, doi = {10.1504/IJIPSI.2016.078589}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/LeLL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/Pan16, author = {Jonathan Pan}, title = {Data farming for cyber security: an agent-based modelling approach}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {2}, number = {3}, pages = {197--215}, year = {2016}, url = {https://doi.org/10.1504/IJIPSI.2016.078590}, doi = {10.1504/IJIPSI.2016.078590}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/Pan16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/Patil16, author = {Kailas Patil}, title = {Request dependency integrity: validating web requests using dependencies in the browser environment}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {2}, number = {4}, pages = {281--306}, year = {2016}, url = {https://doi.org/10.1504/IJIPSI.2016.10003019}, doi = {10.1504/IJIPSI.2016.10003019}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/Patil16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/TrabelsiM16, author = {Zouheir Trabelsi and Mohammad M. Masud}, title = {An extended identity-based cryptography protocol based on biometric}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {2}, number = {3}, pages = {232--256}, year = {2016}, url = {https://doi.org/10.1504/IJIPSI.2016.078594}, doi = {10.1504/IJIPSI.2016.078594}, timestamp = {Fri, 17 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijipsi/TrabelsiM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/ChavanA15, author = {Pallavi Vijay Chavan and Mohammad Atique}, title = {Secured approach for authentication using threshold-based hierarchical visual cryptography}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {2}, number = {2}, pages = {159--175}, year = {2015}, url = {https://doi.org/10.1504/IJIPSI.2015.075440}, doi = {10.1504/IJIPSI.2015.075440}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/ChavanA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/IslamIWG15, author = {Mohammad Badiul Islam and Renato Iannella and Jason Watson and Shlomo Geva}, title = {Privacy architectures in social networks' state-of-the-art survey}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {2}, number = {2}, pages = {102--137}, year = {2015}, url = {https://doi.org/10.1504/IJIPSI.2015.075438}, doi = {10.1504/IJIPSI.2015.075438}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/IslamIWG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/KumarD15, author = {Sunil Kumar and Kamlesh Dutta}, title = {Intrusion detection technique for black hole attack in mobile ad hoc networks}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {2}, number = {2}, pages = {81--101}, year = {2015}, url = {https://doi.org/10.1504/IJIPSI.2015.075435}, doi = {10.1504/IJIPSI.2015.075435}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/KumarD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/ShanthiB15, author = {P. Shanthi and S. R. Balasundaram}, title = {A graph-based cloak algorithm to preserve location privacy in location-based services}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {2}, number = {2}, pages = {138--158}, year = {2015}, url = {https://doi.org/10.1504/IJIPSI.2015.075439}, doi = {10.1504/IJIPSI.2015.075439}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/ShanthiB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/ColomboF14, author = {Pietro Colombo and Elena Ferrari}, title = {A framework for privacy aware data management in relational databases}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {2}, number = {1}, pages = {56--78}, year = {2014}, url = {https://doi.org/10.1504/IJIPSI.2014.062886}, doi = {10.1504/IJIPSI.2014.062886}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/ColomboF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/FerebeeDW14, author = {Denise Ferebee and Dipankar Dasgupta and Qishi Wu}, title = {Information assurance: a cyber security storm map}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {2}, number = {1}, pages = {37--55}, year = {2014}, url = {https://doi.org/10.1504/IJIPSI.2014.062865}, doi = {10.1504/IJIPSI.2014.062865}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/FerebeeDW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/Kanampiu14, author = {Munene W. Kanampiu}, title = {Using non-verbal social signals and degree centrality to optimise a covert actor's detection scheme for a healthy networked community}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {2}, number = {1}, pages = {21--36}, year = {2014}, url = {https://doi.org/10.1504/IJIPSI.2014.062864}, doi = {10.1504/IJIPSI.2014.062864}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/Kanampiu14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/ZhanF14, author = {Justin Zhan and Xing Fang}, title = {A computational framework for detecting malicious actors in communities}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {2}, number = {1}, pages = {1--20}, year = {2014}, url = {https://doi.org/10.1504/IJIPSI.2014.062863}, doi = {10.1504/IJIPSI.2014.062863}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/ZhanF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/AbadieW13, author = {Andre Abadie and Duminda Wijesekera}, title = {An approach for risk assessment and mitigation in cognitive radio technologies}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {1}, number = {4}, pages = {344--359}, year = {2013}, url = {https://doi.org/10.1504/IJIPSI.2013.058208}, doi = {10.1504/IJIPSI.2013.058208}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/AbadieW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/AliA13, author = {Syed Taqi Ali and B. B. Amberker}, title = {A dynamic constant size attribute-based group signature scheme with attribute anonymity}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {1}, number = {4}, pages = {312--343}, year = {2013}, url = {https://doi.org/10.1504/IJIPSI.2013.058207}, doi = {10.1504/IJIPSI.2013.058207}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/AliA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/DoyalZ13, author = {Alex Doyal and Justin Zhan}, title = {Triple DoS: DDoS defence and traceback}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {1}, number = {4}, pages = {299--311}, year = {2013}, url = {https://doi.org/10.1504/IJIPSI.2013.058206}, doi = {10.1504/IJIPSI.2013.058206}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/DoyalZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/ImranGRS13, author = {Asif Imran and Alim Ul Gias and Rayhanur Rahman and Kazi Sakib}, title = {ProvIntSec: a provenance cognition blueprint ensuring integrity and security for real life open source cloud}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {1}, number = {4}, pages = {360--380}, year = {2013}, url = {https://doi.org/10.1504/IJIPSI.2013.058226}, doi = {10.1504/IJIPSI.2013.058226}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/ImranGRS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/Sagheb-TehraniG13, author = {Mehdi Sagheb{-}Tehrani and Arbi Ghazarian}, title = {High development cost and software piracy: a study of motives}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {1}, number = {4}, pages = {381--402}, year = {2013}, url = {https://doi.org/10.1504/IJIPSI.2013.058231}, doi = {10.1504/IJIPSI.2013.058231}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/Sagheb-TehraniG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/ArdagnaVFPS12, author = {Claudio A. Ardagna and Sabrina De Capitani di Vimercati and Sara Foresti and Stefano Paraboschi and Pierangela Samarati}, title = {Minimising disclosure of client information in credential-based interactions}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {1}, number = {2/3}, pages = {205--233}, year = {2012}, url = {https://doi.org/10.1504/IJIPSI.2012.046133}, doi = {10.1504/IJIPSI.2012.046133}, timestamp = {Mon, 21 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijipsi/ArdagnaVFPS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/ChaFKL12, author = {Shi{-}Cho Cha and Ya{-}Ping Fu and Ren{-}Ting Ku and Hao{-}Ping Lin}, title = {On considering enforcement while establishing {RFID} privacy policies}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {1}, number = {2/3}, pages = {234--252}, year = {2012}, url = {https://doi.org/10.1504/IJIPSI.2012.046134}, doi = {10.1504/IJIPSI.2012.046134}, timestamp = {Thu, 13 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/ChaFKL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/ChenL12, author = {Liqun Chen and Jiangtao Li}, title = {{VLR} group signatures with indisputable exculpability and efficient revocation}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {1}, number = {2/3}, pages = {129--159}, year = {2012}, url = {https://doi.org/10.1504/IJIPSI.2012.046130}, doi = {10.1504/IJIPSI.2012.046130}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/ChenL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/LarsenH12, author = {Michael D. Larsen and Jennifer C. Huckett}, title = {Multimethod synthetic data generation for confidentiality and measurement of disclosure risk}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {1}, number = {2/3}, pages = {184--204}, year = {2012}, url = {https://doi.org/10.1504/IJIPSI.2012.046132}, doi = {10.1504/IJIPSI.2012.046132}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/LarsenH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/TaheriHH12, author = {Somayeh Taheri and Salke Hartung and Dieter Hogrefe}, title = {{RDIS:} destination location privacy in MANETs}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {1}, number = {2/3}, pages = {253--277}, year = {2012}, url = {https://doi.org/10.1504/IJIPSI.2012.046135}, doi = {10.1504/IJIPSI.2012.046135}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/TaheriHH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/YapYBUKKS12, author = {Lee Fueng Yap and Takeshi Yashiro and Masahiro Bessho and Tomonori Usaka and M. Fahim Ferdous Khan and Noboru Koshizuka and Ken Sakamura}, title = {{SUCAS:} smart-card-based secure user-centric attestation framework for location-based services}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {1}, number = {2/3}, pages = {160--183}, year = {2012}, url = {https://doi.org/10.1504/IJIPSI.2012.046131}, doi = {10.1504/IJIPSI.2012.046131}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/YapYBUKKS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/ZhouH12, author = {Zhibin Zhou and Dijiang Huang}, title = {Gradual identity exposure using attribute-based encryption}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {1}, number = {2/3}, pages = {278--297}, year = {2012}, url = {https://doi.org/10.1504/IJIPSI.2012.046136}, doi = {10.1504/IJIPSI.2012.046136}, timestamp = {Thu, 05 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/ZhouH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/Al-ArayedS11, author = {Dalal Ahmed Al{-}Arayed and Jo{\~{a}}o Pedro Sousa}, title = {A general model for trust management}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {1}, number = {1}, pages = {79--105}, year = {2011}, url = {https://doi.org/10.1504/IJIPSI.2011.043732}, doi = {10.1504/IJIPSI.2011.043732}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/Al-ArayedS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/BrickellL11, author = {Ernie Brickell and Jiangtao Li}, title = {Enhanced privacy {ID} from bilinear pairing for hardware authentication and attestation}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {1}, number = {1}, pages = {3--33}, year = {2011}, url = {https://doi.org/10.1504/IJIPSI.2011.043729}, doi = {10.1504/IJIPSI.2011.043729}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/BrickellL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/JinTJ11, author = {Lei Jin and Hassan Takabi and James B. D. Joshi}, title = {Analysing security and privacy issues of using e-mail address as identity}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {1}, number = {1}, pages = {34--58}, year = {2011}, url = {https://doi.org/10.1504/IJIPSI.2011.043730}, doi = {10.1504/IJIPSI.2011.043730}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/JinTJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/MasoumzadehJ11, author = {Amirreza Masoumzadeh and James Joshi}, title = {Ontology-based access control for social network systems}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {1}, number = {1}, pages = {59--78}, year = {2011}, url = {https://doi.org/10.1504/IJIPSI.2011.043731}, doi = {10.1504/IJIPSI.2011.043731}, timestamp = {Fri, 08 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/MasoumzadehJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/MeadMZ11, author = {Nancy R. Mead and Seiya Miyazaki and Justin Zhan}, title = {Integrating privacy requirements considerations into a security requirements engineering method and tool}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {1}, number = {1}, pages = {106--126}, year = {2011}, url = {https://doi.org/10.1504/IJIPSI.2011.043733}, doi = {10.1504/IJIPSI.2011.043733}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/MeadMZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.