Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/ijnsec/ijnsec4.bht:"
@article{DBLP:journals/ijnsec/Abdel-HafezMO07, author = {Ahmed Abdel{-}Hafez and Ali Miri and Luis Orozco{-}Barbosa}, title = {Authenticated Group Key Agreement Protocols for Ad hoc Wireless Networks}, journal = {Int. J. Netw. Secur.}, volume = {4}, number = {1}, pages = {90--98}, year = {2007}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n1/ijns-2007-v4-n1-p90-98.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/Abdel-HafezMO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/AbrahamGM07, author = {Ajith Abraham and Crina Grosan and Carlos Mart{\'{\i}}n{-}Vide}, title = {Evolutionary Design of Intrusion Detection Programs}, journal = {Int. J. Netw. Secur.}, volume = {4}, number = {3}, pages = {328--339}, year = {2007}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n3/ijns-2007-v4-n3-p328-339.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/AbrahamGM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/AhmedSA07, author = {Shameem Ahmed and Moushumi Sharmin and Sheikh Iqbal Ahamed}, title = {{ETS} (Efficient, Transparent, and Secured) Self-healing Service for Pervasive Computing Applications}, journal = {Int. J. Netw. Secur.}, volume = {4}, number = {3}, pages = {271--281}, year = {2007}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n3/ijns-2007-v4-n3-p271-281.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/AhmedSA07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/AwasthiL07, author = {Amit K. Awasthi and Sunder Lal}, title = {ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings}, journal = {Int. J. Netw. Secur.}, volume = {4}, number = {2}, pages = {187--192}, year = {2007}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n2/ijns-2007-v4-n2-p187-192.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/AwasthiL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/BianNKM07, author = {Gaowei Bian and Ken Nakayama and Yoshitake Kobayashi and Mamoru Maekawa}, title = {Java Bytecode Dependence Analysis for Secure Information Flow}, journal = {Int. J. Netw. Secur.}, volume = {4}, number = {1}, pages = {59--68}, year = {2007}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n1/ijns-2007-v4-n1-p59-68.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/BianNKM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/CacicW07, author = {Brian J. Cacic and Ruizhong Wei}, title = {Improving Indirect Key Management Scheme of Access Hierarchies}, journal = {Int. J. Netw. Secur.}, volume = {4}, number = {2}, pages = {128--137}, year = {2007}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n2/ijns-2007-v4-n2-p128-137.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/CacicW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/CaoM07, author = {Tianjie Cao and Xianping Mao}, title = {Original Signer's Forgery Attacks on Discrete Logarithm Based Proxy Signature Schemes}, journal = {Int. J. Netw. Secur.}, volume = {4}, number = {3}, pages = {355--360}, year = {2007}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n3/ijns-2007-v4-n3-p355-360.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/CaoM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ChangLLLY07, author = {Lin{-}Huang Chang and Che Lin Lo and Jui Jen Lo and Wei{-}Ting Liu and Chou Chen Yang}, title = {Mobility Management with Distributed {AAA} Architecture}, journal = {Int. J. Netw. Secur.}, volume = {4}, number = {3}, pages = {241--247}, year = {2007}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n3/ijns-2007-v4-n3-p241-247.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ChangLLLY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/CheccoBCNMZ07, author = {Paolo Dal Checco and Francesco Bergadano and Davide Cavagnino and Pasquale Andrea Nesta and Michele Miraglia and Pier Luigi Zaccone}, title = {Secure Logging for Irrefutable Administration}, journal = {Int. J. Netw. Secur.}, volume = {4}, number = {3}, pages = {340--347}, year = {2007}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n3/ijns-2007-v4-n3-p340-347.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/CheccoBCNMZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/DasSP07, author = {Manik Lal Das and Ashutosh Saxena and Deepak B. Phatak}, title = {Proxy Signature Scheme with Effective Revocation Using Bilinear Pairings}, journal = {Int. J. Netw. Secur.}, volume = {4}, number = {3}, pages = {312--317}, year = {2007}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n3/ijns-2007-v4-n3-p312-317.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/DasSP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/Ding07, author = {Ping Ding}, title = {Central Manager: {A} Solution to Avoid Denial Of Service Attacks for Wireless LANs}, journal = {Int. J. Netw. Secur.}, volume = {4}, number = {1}, pages = {35--44}, year = {2007}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n1/ijns-2007-v4-n1-p35-44.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/Ding07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/GiriS07, author = {Debasis Giri and Parmeshwary Dayal Srivastava}, title = {An Asymmetric Cryptographic Key Assignment Scheme for Access Control in Tree Structural Hierarchies}, journal = {Int. J. Netw. Secur.}, volume = {4}, number = {3}, pages = {348--354}, year = {2007}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n3/ijns-2007-v4-n3-p348-354.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/GiriS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/IoannidisBIKAS07, author = {Sotiris Ioannidis and Steven M. Bellovin and John Ioannidis and Angelos D. Keromytis and Kostas G. Anagnostakis and Jonathan M. Smith}, title = {Virtual Private Services: Coordinated Policy Enforcement for Distributed Applications}, journal = {Int. J. Netw. Secur.}, volume = {4}, number = {1}, pages = {69--80}, year = {2007}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n1/ijns-2007-v4-n1-p69-80.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/IoannidisBIKAS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/JiangLXL07, author = {Zhonghua Jiang and Dongdai Lin and Lin Xu and Lei Lin}, title = {Distributed Cryptographic Computing on Grid}, journal = {Int. J. Netw. Secur.}, volume = {4}, number = {2}, pages = {179--186}, year = {2007}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n2/ijns-2007-v4-n2-p179-186.pdf}, timestamp = {Wed, 06 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnsec/JiangLXL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/KarthikH07, author = {Kannan Karthik and Dimitrios Hatzinakos}, title = {Decryption Key Design for Joint Fingerprinting and Decryption in the Sign Bit Plane for Multicast Content Protection}, journal = {Int. J. Netw. Secur.}, volume = {4}, number = {3}, pages = {254--265}, year = {2007}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n3/ijns-2007-v4-n3-p254-265.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/KarthikH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/KimK07, author = {Minho Kim and {\c{C}}etin Kaya Ko{\c{c}}}, title = {Vulnerabilities in the Adachi-Aoki-Komano-Ohta Micropayment Scheme}, journal = {Int. J. Netw. Secur.}, volume = {4}, number = {2}, pages = {235--239}, year = {2007}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n2/ijns-2007-v4-n2-p235-239.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/KimK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/LeeKLHY07, author = {Jaewon Lee and Heeyoul Kim and Younho Lee and Seong{-}Min Hong and Hyunsoo Yoon}, title = {Parallelized Scalar Multiplication on Elliptic Curves Defined over Optimal Extension Field}, journal = {Int. J. Netw. Secur.}, volume = {4}, number = {1}, pages = {99--106}, year = {2007}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n1/ijns-2007-v4-n1-p99-106.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/LeeKLHY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/LiW07, author = {Jiguo Li and Shuhong Wang}, title = {New Efficient Proxy Blind Signature Scheme Using Verifiable Self-certified Public Key}, journal = {Int. J. Netw. Secur.}, volume = {4}, number = {2}, pages = {193--200}, year = {2007}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n2/ijns-2007-v4-n2-p193-200.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/LiW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/LiZC07, author = {Xiangxue Li and Dong Zheng and Kefei Chen}, title = {LFSR-based Signatures with Message Recovery}, journal = {Int. J. Netw. Secur.}, volume = {4}, number = {3}, pages = {266--270}, year = {2007}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n3/ijns-2007-v4-n3-p266-270.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/LiZC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/LiaoJZQ07, author = {Zhensong Liao and Hai Jin and Deqing Zou and Weizhong Qiang}, title = {A Novel Approach to Hide Credentials}, journal = {Int. J. Netw. Secur.}, volume = {4}, number = {3}, pages = {306--311}, year = {2007}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n3/ijns-2007-v4-n3-p306-311.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/LiaoJZQ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/LinWW07, author = {Pin Lin and Wenling Wu and Chuankun Wu}, title = {Security Analysis of Double Length Compression Function Based on Block Cipher}, journal = {Int. J. Netw. Secur.}, volume = {4}, number = {2}, pages = {121--127}, year = {2007}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n2/ijns-2007-v4-n2-p121-127.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/LinWW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/LuCS07, author = {Rongxing Lu and Zhenfu Cao and Jun Shao}, title = {On Security of Two Nonrepudiable Threshold Multi-proxy Multi-signature Schemes with Shared Verification}, journal = {Int. J. Netw. Secur.}, volume = {4}, number = {3}, pages = {248--253}, year = {2007}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n3/ijns-2007-v4-n3-p248-253.pdf}, timestamp = {Tue, 02 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnsec/LuCS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/LuminiN07, author = {Alessandra Lumini and Loris Nanni}, title = {When Fingerprints Are Combined with Iris - {A} Case Study: {FVC2004} and {CASIA}}, journal = {Int. J. Netw. Secur.}, volume = {4}, number = {1}, pages = {27--34}, year = {2007}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n1/ijns-2007-v4-n1-p27-34.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/LuminiN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/MoldovyanMS07, author = {Nikolay A. Moldovyan and Peter A. Moldovyanu and Douglas H. Summerville}, title = {On Software Implementation of Fast DDP-based Ciphers}, journal = {Int. J. Netw. Secur.}, volume = {4}, number = {1}, pages = {81--89}, year = {2007}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n1/ijns-2007-v4-n1-p81-89.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/MoldovyanMS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/PalakaDPS07, author = {Despoina Palaka and Petros Daras and Kosmas Petridis and Michael G. Strintzis}, title = {A Novel Peer-to-peer Payment Protocol}, journal = {Int. J. Netw. Secur.}, volume = {4}, number = {1}, pages = {107--120}, year = {2007}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n1/ijns-2007-v4-n1-p107-120.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/PalakaDPS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/Pan07, author = {Leon Pan}, title = {A Web-based Multilayer Access Control Model for Multimedia Applications in {MPEG-7}}, journal = {Int. J. Netw. Secur.}, volume = {4}, number = {2}, pages = {155--165}, year = {2007}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n2/ijns-2007-v4-n2-p155-165.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/Pan07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/Ramkumar07, author = {Mahalingam Ramkumar}, title = {Broadcast Authentication With Preferred Verifiers}, journal = {Int. J. Netw. Secur.}, volume = {4}, number = {2}, pages = {166--178}, year = {2007}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n2/ijns-2007-v4-n2-p166-178.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/Ramkumar07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/Ren07, author = {Wei Ren}, title = {Pulsing RoQ DDoS Attacking and Defense Scheme in Mobile Ad Hoc Networks}, journal = {Int. J. Netw. Secur.}, volume = {4}, number = {2}, pages = {227--234}, year = {2007}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n2/ijns-2007-v4-n2-p227-234.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/Ren07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/SaebHE07, author = {Magdy Saeb and Meer Hamza and Ahmed El{-}Shikh}, title = {IPLess Stochastic Anonymous Routing Algorithm Using Multi-Agent Systems}, journal = {Int. J. Netw. Secur.}, volume = {4}, number = {2}, pages = {212--226}, year = {2007}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n2/ijns-2007-v4-n2-p212-226.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/SaebHE07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/SusiloK07, author = {Willy Susilo and Hiroaki Kikuchi}, title = {Cryptanalysis of Modification to Self-Certified Group-Oriented Cryptosystem without {A} Combiner}, journal = {Int. J. Netw. Secur.}, volume = {4}, number = {3}, pages = {288--291}, year = {2007}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n3/ijns-2007-v4-n3-p288-291.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/SusiloK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ThorncharoensriXM07, author = {Pairat Thorncharoensri and Tianbing Xia and Yi Mu}, title = {How to Find the Sufficient Collision Conditions for Haval-128 Pass 3 by Backward Analysis}, journal = {Int. J. Netw. Secur.}, volume = {4}, number = {2}, pages = {138--148}, year = {2007}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n2/ijns-2007-v4-n2-p138-148.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ThorncharoensriXM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/TianZW07, author = {Xiaojian Tian and Robert W. Zhu and Duncan S. Wong}, title = {Improved Efficient Remote User Authentication Schemes}, journal = {Int. J. Netw. Secur.}, volume = {4}, number = {2}, pages = {149--154}, year = {2007}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n2/ijns-2007-v4-n2-p149-154.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/TianZW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/WangLW07, author = {Dayin Wang and Dongdai Lin and Wenling Wu}, title = {Related-Mode Attacks on {CTR} Encryption Mode}, journal = {Int. J. Netw. Secur.}, volume = {4}, number = {3}, pages = {282--287}, year = {2007}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n3/ijns-2007-v4-n3-p282-287.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/WangLW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/WuH07, author = {Nan{-}I Wu and Min{-}Shiang Hwang}, title = {Data Hiding: Current Status and Key Issues}, journal = {Int. J. Netw. Secur.}, volume = {4}, number = {1}, pages = {1--9}, year = {2007}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n1/ijns-2007-v4-n1-p1-9.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/WuH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/Yang07, author = {Cungang Yang}, title = {Designing of {ORBAC} Model For Secure Domain Environments}, journal = {Int. J. Netw. Secur.}, volume = {4}, number = {1}, pages = {10--16}, year = {2007}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n1/ijns-2007-v4-n1-p10-16.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/Yang07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ZhanM07, author = {Justin Zhijun Zhan and Stan Matwin}, title = {Privacy-Preserving Data Mining in Electronic Surveys}, journal = {Int. J. Netw. Secur.}, volume = {4}, number = {3}, pages = {318--327}, year = {2007}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n3/ijns-2007-v4-n3-p318-327.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ZhanM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ZhangSS07, author = {Zonghua Zhang and Hong Shen and Yingpeng Sang}, title = {An Observation-Centric Analysis on the Modeling of Anomaly-based Intrusion Detection}, journal = {Int. J. Netw. Secur.}, volume = {4}, number = {3}, pages = {292--305}, year = {2007}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n3/ijns-2007-v4-n3-p292-305.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ZhangSS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ZhongCC07, author = {Shangping Zhong and Xueqi Cheng and Tierui Chen}, title = {Data Hiding in a Kind of {PDF} Texts for Secret Communication}, journal = {Int. J. Netw. Secur.}, volume = {4}, number = {1}, pages = {17--26}, year = {2007}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n1/ijns-2007-v4-n1-p17-26.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ZhongCC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ZhuangTD07, author = {Li Zhuang and J. D. Tygar and Rachna Dhamija}, title = {Injecting Heterogeneity Through Protocol Randomization}, journal = {Int. J. Netw. Secur.}, volume = {4}, number = {1}, pages = {45--58}, year = {2007}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n1/ijns-2007-v4-n1-p45-58.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ZhuangTD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ZwierkoK07, author = {Aneta Zwierko and Zbigniew Kotulski}, title = {Integrity of mobile agents: a new approach}, journal = {Int. J. Netw. Secur.}, volume = {4}, number = {2}, pages = {201--211}, year = {2007}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n2/ijns-2007-v4-n2-p201-211.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ZwierkoK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.