Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/ijsn/ijsn8.bht:"
@article{DBLP:journals/ijsn/AbdallahABOA13, author = {Emad Eddien Abdallah and Alaa Eddien Abdallah and Mohammad Bsoul and Ahmed F. Otoom and Essam Al{-}Daoud}, title = {Simplified features for email authorship identification}, journal = {Int. J. Secur. Networks}, volume = {8}, number = {2}, pages = {72--81}, year = {2013}, url = {https://doi.org/10.1504/IJSN.2013.055941}, doi = {10.1504/IJSN.2013.055941}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/AbdallahABOA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/CroninW13, author = {Brendan Cronin and Xiaojun Wang}, title = {Pattern overlap in bit-parallel implementation of regular expression repetition quantifiers}, journal = {Int. J. Secur. Networks}, volume = {8}, number = {4}, pages = {231--238}, year = {2013}, url = {https://doi.org/10.1504/IJSN.2013.058154}, doi = {10.1504/IJSN.2013.058154}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/CroninW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/CuiMG13, author = {Hui Cui and Yi Mu and Fuchun Guo}, title = {Server-aided identity-based anonymous broadcast encryption}, journal = {Int. J. Secur. Networks}, volume = {8}, number = {1}, pages = {29--39}, year = {2013}, url = {https://doi.org/10.1504/IJSN.2013.055038}, doi = {10.1504/IJSN.2013.055038}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/CuiMG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/DondykRZ13, author = {Erich Dondyk and Louis Rivera and Cliff Changchun Zou}, title = {Wi-Fi access denial of service attack to smartphones}, journal = {Int. J. Secur. Networks}, volume = {8}, number = {3}, pages = {117--129}, year = {2013}, url = {https://doi.org/10.1504/IJSN.2013.057698}, doi = {10.1504/IJSN.2013.057698}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/DondykRZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/GogoiBK13, author = {Prasanta Gogoi and Dhruba K. Bhattacharyya and Jugal K. Kalita}, title = {A rough set-based effective rule generation method for classification with an application in intrusion detection}, journal = {Int. J. Secur. Networks}, volume = {8}, number = {2}, pages = {61--71}, year = {2013}, url = {https://doi.org/10.1504/IJSN.2013.055939}, doi = {10.1504/IJSN.2013.055939}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/GogoiBK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/JusteEWBF13, author = {Pierre St. Juste and Heungsik Eom and Benjamin Woodruff and Corey Baker and Renato J. O. Figueiredo}, title = {Enabling decentralised microblogging through P2PVPNs}, journal = {Int. J. Secur. Networks}, volume = {8}, number = {3}, pages = {169--178}, year = {2013}, url = {https://doi.org/10.1504/IJSN.2013.057699}, doi = {10.1504/IJSN.2013.057699}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/JusteEWBF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/KalraS13, author = {Sheetal Kalra and Sandeep K. Sood}, title = {ECC-based anti-phishing protocol for cloud computing services}, journal = {Int. J. Secur. Networks}, volume = {8}, number = {3}, pages = {130--138}, year = {2013}, url = {https://doi.org/10.1504/IJSN.2013.057695}, doi = {10.1504/IJSN.2013.057695}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/KalraS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/LiXZ13, author = {Qinyi Li and Hu Xiong and Fengli Zhang}, title = {Broadcast revocation scheme in composite-order bilinear group and its application to attribute-based encryption}, journal = {Int. J. Secur. Networks}, volume = {8}, number = {1}, pages = {1--12}, year = {2013}, url = {https://doi.org/10.1504/IJSN.2013.055036}, doi = {10.1504/IJSN.2013.055036}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/LiXZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/RasslanA13, author = {Mohamed M. Nasreldin Rasslan and Heba Kamal Aslan}, title = {On the security of two improved authenticated encryption schemes}, journal = {Int. J. Secur. Networks}, volume = {8}, number = {4}, pages = {194--199}, year = {2013}, url = {https://doi.org/10.1504/IJSN.2013.058112}, doi = {10.1504/IJSN.2013.058112}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/RasslanA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/RathC13, author = {Annanda Thavymony Rath and Jean{-}No{\"{e}}l Colin}, title = {Towards purpose enforcement model for privacy-aware usage control policy in distributed healthcare}, journal = {Int. J. Secur. Networks}, volume = {8}, number = {2}, pages = {94--105}, year = {2013}, url = {https://doi.org/10.1504/IJSN.2013.055943}, doi = {10.1504/IJSN.2013.055943}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/RathC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/SantosLSB13, author = {Igor Santos and Carlos Laorden and Borja Sanz and Pablo Garc{\'{\i}}a Bringas}, title = {Reversing the effects of tokenisation attacks against content-based spam filters}, journal = {Int. J. Secur. Networks}, volume = {8}, number = {2}, pages = {106--116}, year = {2013}, url = {https://doi.org/10.1504/IJSN.2013.055944}, doi = {10.1504/IJSN.2013.055944}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/SantosLSB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/Sarrab13, author = {Mohamed Sarrab}, title = {Runtime verification using policy-based approach to control information flow}, journal = {Int. J. Secur. Networks}, volume = {8}, number = {4}, pages = {212--230}, year = {2013}, url = {https://doi.org/10.1504/IJSN.2013.058153}, doi = {10.1504/IJSN.2013.058153}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/Sarrab13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/SaxenaC13, author = {Neetesh Saxena and Narendra S. Chaudhari}, title = {An enhanced {NPA} protocol for secure communications in {GSM} network}, journal = {Int. J. Secur. Networks}, volume = {8}, number = {1}, pages = {13--28}, year = {2013}, url = {https://doi.org/10.1504/IJSN.2013.055045}, doi = {10.1504/IJSN.2013.055045}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/SaxenaC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/SrinivasanK013, author = {Avinash Srinivasan and Satish Kolli and Jie Wu}, title = {Steganographic information hiding that exploits a novel file system vulnerability}, journal = {Int. J. Secur. Networks}, volume = {8}, number = {2}, pages = {82--93}, year = {2013}, url = {https://doi.org/10.1504/IJSN.2013.055942}, doi = {10.1504/IJSN.2013.055942}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/SrinivasanK013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/Tahat13, author = {Nedal Tahat}, title = {A new proxy signature scheme with a semi-trusted third party based on elliptic curve discrete logarithm problem}, journal = {Int. J. Secur. Networks}, volume = {8}, number = {4}, pages = {207--211}, year = {2013}, url = {https://doi.org/10.1504/IJSN.2013.058113}, doi = {10.1504/IJSN.2013.058113}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/Tahat13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/TripathiS13, author = {Anshu Tripathi and Umesh Kumar Singh}, title = {A model for quantitative security measurement and prioritisation of vulnerability mitigation}, journal = {Int. J. Secur. Networks}, volume = {8}, number = {3}, pages = {139--153}, year = {2013}, url = {https://doi.org/10.1504/IJSN.2013.057696}, doi = {10.1504/IJSN.2013.057696}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/TripathiS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/XiaoFXCL13, author = {Zhifeng Xiao and Bo Fu and Yang Xiao and C. L. Philip Chen and Wei Liang}, title = {A review of {GENI} authentication and access control mechanisms}, journal = {Int. J. Secur. Networks}, volume = {8}, number = {1}, pages = {40--60}, year = {2013}, url = {https://doi.org/10.1504/IJSN.2013.055046}, doi = {10.1504/IJSN.2013.055046}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/XiaoFXCL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/YuGZHR13, author = {Wei Yu and Linqiang Ge and Difan Zhang and Rommie L. Hardy and Robert J. Reschly}, title = {On effective sampling techniques in host-based intrusion detection in tactical {MANET}}, journal = {Int. J. Secur. Networks}, volume = {8}, number = {3}, pages = {154--168}, year = {2013}, url = {https://doi.org/10.1504/IJSN.2013.057688}, doi = {10.1504/IJSN.2013.057688}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/YuGZHR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/YuHC13, author = {Jia Yu and Rong Hao and Xiangguo Cheng}, title = {Security analysis and improvement of two verifiable multi-secret sharing schemes}, journal = {Int. J. Secur. Networks}, volume = {8}, number = {4}, pages = {200--206}, year = {2013}, url = {https://doi.org/10.1504/IJSN.2013.058147}, doi = {10.1504/IJSN.2013.058147}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/YuHC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ZhangGYZHR13, author = {Difan Zhang and Linqiang Ge and Wei Yu and Hanlin Zhang and Rommie L. Hardy and Robert J. Reschly}, title = {On effective data aggregation techniques in host-based intrusion detection in {MANET}}, journal = {Int. J. Secur. Networks}, volume = {8}, number = {4}, pages = {179--193}, year = {2013}, url = {https://doi.org/10.1504/IJSN.2013.058152}, doi = {10.1504/IJSN.2013.058152}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ZhangGYZHR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.