Search dblp for Publications

export results for "toc:db/journals/ijsn/ijsn8.bht:"

 download as .bib file

@article{DBLP:journals/ijsn/AbdallahABOA13,
  author       = {Emad Eddien Abdallah and
                  Alaa Eddien Abdallah and
                  Mohammad Bsoul and
                  Ahmed F. Otoom and
                  Essam Al{-}Daoud},
  title        = {Simplified features for email authorship identification},
  journal      = {Int. J. Secur. Networks},
  volume       = {8},
  number       = {2},
  pages        = {72--81},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJSN.2013.055941},
  doi          = {10.1504/IJSN.2013.055941},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/AbdallahABOA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/CroninW13,
  author       = {Brendan Cronin and
                  Xiaojun Wang},
  title        = {Pattern overlap in bit-parallel implementation of regular expression
                  repetition quantifiers},
  journal      = {Int. J. Secur. Networks},
  volume       = {8},
  number       = {4},
  pages        = {231--238},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJSN.2013.058154},
  doi          = {10.1504/IJSN.2013.058154},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/CroninW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/CuiMG13,
  author       = {Hui Cui and
                  Yi Mu and
                  Fuchun Guo},
  title        = {Server-aided identity-based anonymous broadcast encryption},
  journal      = {Int. J. Secur. Networks},
  volume       = {8},
  number       = {1},
  pages        = {29--39},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJSN.2013.055038},
  doi          = {10.1504/IJSN.2013.055038},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/CuiMG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/DondykRZ13,
  author       = {Erich Dondyk and
                  Louis Rivera and
                  Cliff Changchun Zou},
  title        = {Wi-Fi access denial of service attack to smartphones},
  journal      = {Int. J. Secur. Networks},
  volume       = {8},
  number       = {3},
  pages        = {117--129},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJSN.2013.057698},
  doi          = {10.1504/IJSN.2013.057698},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/DondykRZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/GogoiBK13,
  author       = {Prasanta Gogoi and
                  Dhruba K. Bhattacharyya and
                  Jugal K. Kalita},
  title        = {A rough set-based effective rule generation method for classification
                  with an application in intrusion detection},
  journal      = {Int. J. Secur. Networks},
  volume       = {8},
  number       = {2},
  pages        = {61--71},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJSN.2013.055939},
  doi          = {10.1504/IJSN.2013.055939},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/GogoiBK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/JusteEWBF13,
  author       = {Pierre St. Juste and
                  Heungsik Eom and
                  Benjamin Woodruff and
                  Corey Baker and
                  Renato J. O. Figueiredo},
  title        = {Enabling decentralised microblogging through P2PVPNs},
  journal      = {Int. J. Secur. Networks},
  volume       = {8},
  number       = {3},
  pages        = {169--178},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJSN.2013.057699},
  doi          = {10.1504/IJSN.2013.057699},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/JusteEWBF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/KalraS13,
  author       = {Sheetal Kalra and
                  Sandeep K. Sood},
  title        = {ECC-based anti-phishing protocol for cloud computing services},
  journal      = {Int. J. Secur. Networks},
  volume       = {8},
  number       = {3},
  pages        = {130--138},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJSN.2013.057695},
  doi          = {10.1504/IJSN.2013.057695},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/KalraS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/LiXZ13,
  author       = {Qinyi Li and
                  Hu Xiong and
                  Fengli Zhang},
  title        = {Broadcast revocation scheme in composite-order bilinear group and
                  its application to attribute-based encryption},
  journal      = {Int. J. Secur. Networks},
  volume       = {8},
  number       = {1},
  pages        = {1--12},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJSN.2013.055036},
  doi          = {10.1504/IJSN.2013.055036},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/LiXZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/RasslanA13,
  author       = {Mohamed M. Nasreldin Rasslan and
                  Heba Kamal Aslan},
  title        = {On the security of two improved authenticated encryption schemes},
  journal      = {Int. J. Secur. Networks},
  volume       = {8},
  number       = {4},
  pages        = {194--199},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJSN.2013.058112},
  doi          = {10.1504/IJSN.2013.058112},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/RasslanA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/RathC13,
  author       = {Annanda Thavymony Rath and
                  Jean{-}No{\"{e}}l Colin},
  title        = {Towards purpose enforcement model for privacy-aware usage control
                  policy in distributed healthcare},
  journal      = {Int. J. Secur. Networks},
  volume       = {8},
  number       = {2},
  pages        = {94--105},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJSN.2013.055943},
  doi          = {10.1504/IJSN.2013.055943},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/RathC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/SantosLSB13,
  author       = {Igor Santos and
                  Carlos Laorden and
                  Borja Sanz and
                  Pablo Garc{\'{\i}}a Bringas},
  title        = {Reversing the effects of tokenisation attacks against content-based
                  spam filters},
  journal      = {Int. J. Secur. Networks},
  volume       = {8},
  number       = {2},
  pages        = {106--116},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJSN.2013.055944},
  doi          = {10.1504/IJSN.2013.055944},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/SantosLSB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/Sarrab13,
  author       = {Mohamed Sarrab},
  title        = {Runtime verification using policy-based approach to control information
                  flow},
  journal      = {Int. J. Secur. Networks},
  volume       = {8},
  number       = {4},
  pages        = {212--230},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJSN.2013.058153},
  doi          = {10.1504/IJSN.2013.058153},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/Sarrab13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/SaxenaC13,
  author       = {Neetesh Saxena and
                  Narendra S. Chaudhari},
  title        = {An enhanced {NPA} protocol for secure communications in {GSM} network},
  journal      = {Int. J. Secur. Networks},
  volume       = {8},
  number       = {1},
  pages        = {13--28},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJSN.2013.055045},
  doi          = {10.1504/IJSN.2013.055045},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/SaxenaC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/SrinivasanK013,
  author       = {Avinash Srinivasan and
                  Satish Kolli and
                  Jie Wu},
  title        = {Steganographic information hiding that exploits a novel file system
                  vulnerability},
  journal      = {Int. J. Secur. Networks},
  volume       = {8},
  number       = {2},
  pages        = {82--93},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJSN.2013.055942},
  doi          = {10.1504/IJSN.2013.055942},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/SrinivasanK013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/Tahat13,
  author       = {Nedal Tahat},
  title        = {A new proxy signature scheme with a semi-trusted third party based
                  on elliptic curve discrete logarithm problem},
  journal      = {Int. J. Secur. Networks},
  volume       = {8},
  number       = {4},
  pages        = {207--211},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJSN.2013.058113},
  doi          = {10.1504/IJSN.2013.058113},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/Tahat13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/TripathiS13,
  author       = {Anshu Tripathi and
                  Umesh Kumar Singh},
  title        = {A model for quantitative security measurement and prioritisation of
                  vulnerability mitigation},
  journal      = {Int. J. Secur. Networks},
  volume       = {8},
  number       = {3},
  pages        = {139--153},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJSN.2013.057696},
  doi          = {10.1504/IJSN.2013.057696},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/TripathiS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/XiaoFXCL13,
  author       = {Zhifeng Xiao and
                  Bo Fu and
                  Yang Xiao and
                  C. L. Philip Chen and
                  Wei Liang},
  title        = {A review of {GENI} authentication and access control mechanisms},
  journal      = {Int. J. Secur. Networks},
  volume       = {8},
  number       = {1},
  pages        = {40--60},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJSN.2013.055046},
  doi          = {10.1504/IJSN.2013.055046},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/XiaoFXCL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/YuGZHR13,
  author       = {Wei Yu and
                  Linqiang Ge and
                  Difan Zhang and
                  Rommie L. Hardy and
                  Robert J. Reschly},
  title        = {On effective sampling techniques in host-based intrusion detection
                  in tactical {MANET}},
  journal      = {Int. J. Secur. Networks},
  volume       = {8},
  number       = {3},
  pages        = {154--168},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJSN.2013.057688},
  doi          = {10.1504/IJSN.2013.057688},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/YuGZHR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/YuHC13,
  author       = {Jia Yu and
                  Rong Hao and
                  Xiangguo Cheng},
  title        = {Security analysis and improvement of two verifiable multi-secret sharing
                  schemes},
  journal      = {Int. J. Secur. Networks},
  volume       = {8},
  number       = {4},
  pages        = {200--206},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJSN.2013.058147},
  doi          = {10.1504/IJSN.2013.058147},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/YuHC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ZhangGYZHR13,
  author       = {Difan Zhang and
                  Linqiang Ge and
                  Wei Yu and
                  Hanlin Zhang and
                  Rommie L. Hardy and
                  Robert J. Reschly},
  title        = {On effective data aggregation techniques in host-based intrusion detection
                  in {MANET}},
  journal      = {Int. J. Secur. Networks},
  volume       = {8},
  number       = {4},
  pages        = {179--193},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJSN.2013.058152},
  doi          = {10.1504/IJSN.2013.058152},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ZhangGYZHR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics