Search dblp for Publications

export results for "toc:db/journals/istr/istr17.bht:"

 download as .bib file

@article{DBLP:journals/istr/AskoxylakisMP13,
  author       = {Ioannis G. Askoxylakis and
                  Mark Manulis and
                  Joachim Posegga},
  title        = {Security and privacy for digital ecosystems},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {17},
  number       = {3},
  pages        = {45},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.istr.2013.02.001},
  doi          = {10.1016/J.ISTR.2013.02.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/AskoxylakisMP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/BaumgrassS13,
  author       = {Anne Baumgrass and
                  Mark Strembeck},
  title        = {Bridging the gap between role mining and role engineering via migration
                  guides},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {17},
  number       = {4},
  pages        = {148--172},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.istr.2013.03.003},
  doi          = {10.1016/J.ISTR.2013.03.003},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/BaumgrassS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/CatuognoGMV13,
  author       = {Luigi Catuogno and
                  Roberto Gassir{\`{a}} and
                  Michele Masullo and
                  Ivan Visconti},
  title        = {SmartK: Smart cards in operating systems at kernel level},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {17},
  number       = {3},
  pages        = {93--104},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.istr.2012.10.003},
  doi          = {10.1016/J.ISTR.2012.10.003},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/CatuognoGMV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChowAS13,
  author       = {Sherman S. M. Chow and
                  Man Ho Au and
                  Willy Susilo},
  title        = {Server-aided signatures verification secure against collusion attack},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {17},
  number       = {3},
  pages        = {46--57},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.istr.2012.10.007},
  doi          = {10.1016/J.ISTR.2012.10.007},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ChowAS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChristinLRHK13,
  author       = {Delphine Christin and
                  Pablo S{\'{a}}nchez L{\'{o}}pez and
                  Andreas Reinhardt and
                  Matthias Hollick and
                  Michaela Kauer},
  title        = {Share with strangers: Privacy bubbles as user-centered privacy control
                  for mobile content sharing applications},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {17},
  number       = {3},
  pages        = {105--116},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.istr.2012.10.004},
  doi          = {10.1016/J.ISTR.2012.10.004},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ChristinLRHK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/DellAmicoSIOR13,
  author       = {Matteo Dell'Amico and
                  Gabriel Serme and
                  Muhammad Sabir Idrees and
                  Anderson Santana de Oliveira and
                  Yves Roudier},
  title        = {HiPoLDS: {A} Hierarchical Security Policy Language for Distributed
                  Systems},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {17},
  number       = {3},
  pages        = {81--92},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.istr.2012.10.002},
  doi          = {10.1016/J.ISTR.2012.10.002},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/DellAmicoSIOR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/FelediFL13,
  author       = {Daniel Feledi and
                  Stefan Fenz and
                  Lukas Lechner},
  title        = {Toward web-based information security knowledge sharing},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {17},
  number       = {4},
  pages        = {199--209},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.istr.2013.03.004},
  doi          = {10.1016/J.ISTR.2013.03.004},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/FelediFL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/FranzDHJKS13,
  author       = {Martin Franz and
                  Bj{\"{o}}rn Deiseroth and
                  Kay Hamacher and
                  Somesh Jha and
                  Stefan Katzenbeisser and
                  Heike Schr{\"{o}}der},
  title        = {Secure computations on non-integer values with applications to privacy-preserving
                  sequence analysis},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {17},
  number       = {3},
  pages        = {117--128},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.istr.2012.10.001},
  doi          = {10.1016/J.ISTR.2012.10.001},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/FranzDHJKS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/FruhwirtKSHW13,
  author       = {Peter Fr{\"{u}}hwirt and
                  Peter Kieseberg and
                  Sebastian Schrittwieser and
                  Markus Huber and
                  Edgar R. Weippl},
  title        = {InnoDB database forensics: Enhanced reconstruction of data manipulation
                  queries from redo logs},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {17},
  number       = {4},
  pages        = {227--238},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.istr.2013.02.003},
  doi          = {10.1016/J.ISTR.2013.02.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/FruhwirtKSHW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HachanaCCG13,
  author       = {Safa{\`{a}} Hachana and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Semantic analysis of role mining results and shadowed roles detection},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {17},
  number       = {4},
  pages        = {131--147},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.istr.2013.03.001},
  doi          = {10.1016/J.ISTR.2013.03.001},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/HachanaCCG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HerzbergS13,
  author       = {Amir Herzberg and
                  Haya Schulmann},
  title        = {Oblivious and fair server-aided two-party computation},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {17},
  number       = {4},
  pages        = {210--226},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.istr.2013.03.002},
  doi          = {10.1016/J.ISTR.2013.03.002},
  timestamp    = {Tue, 17 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/HerzbergS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/PetroulakisTFS13,
  author       = {Nikolaos E. Petroulakis and
                  Elias Z. Tragos and
                  Alexandros G. Fragkiadakis and
                  George Spanoudakis},
  title        = {A lightweight framework for secure life-logging in smart environments},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {17},
  number       = {3},
  pages        = {58--70},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.istr.2012.10.005},
  doi          = {10.1016/J.ISTR.2012.10.005},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/PetroulakisTFS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/PlosM13,
  author       = {Thomas Plos and
                  Christian Maierhofer},
  title        = {On measuring the parasitic backscatter of sensor-enabled {UHF} {RFID}
                  tags},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {17},
  number       = {4},
  pages        = {239--252},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.istr.2013.02.004},
  doi          = {10.1016/J.ISTR.2013.02.004},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/PlosM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/RiesnerNP13,
  author       = {Moritz Riesner and
                  Michael Netter and
                  G{\"{u}}nther Pernul},
  title        = {Analyzing settings for social identity management on Social Networking
                  Sites: Classification, current state, and proposed developments},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {17},
  number       = {4},
  pages        = {185--198},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.istr.2013.02.005},
  doi          = {10.1016/J.ISTR.2013.02.005},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/RiesnerNP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SchrecklingKS13,
  author       = {Daniel Schreckling and
                  Johannes K{\"{o}}stler and
                  Matthias Schaff},
  title        = {Kynoid: Real-time enforcement of fine-grained, user-defined, and data-centric
                  security policies for Android},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {17},
  number       = {3},
  pages        = {71--80},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.istr.2012.10.006},
  doi          = {10.1016/J.ISTR.2012.10.006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/SchrecklingKS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WrightMW13,
  author       = {Jason L. Wright and
                  Miles McQueen and
                  Lawrence Wellman},
  title        = {Analyses of two end-user software vulnerability exposure metrics (extended
                  version)},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {17},
  number       = {4},
  pages        = {173--184},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.istr.2013.02.002},
  doi          = {10.1016/J.ISTR.2013.02.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/WrightMW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Bours12,
  author       = {Patrick Bours},
  title        = {Continuous keystroke dynamics: {A} different perspective towards biometric
                  evaluation},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {17},
  number       = {1-2},
  pages        = {36--43},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.istr.2012.02.001},
  doi          = {10.1016/J.ISTR.2012.02.001},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Bours12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Bunker12,
  author       = {Guy Bunker},
  title        = {Technology is not enough: Taking a holistic view for information assurance},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {17},
  number       = {1-2},
  pages        = {19--25},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.istr.2011.12.002},
  doi          = {10.1016/J.ISTR.2011.12.002},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Bunker12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Jirasek12,
  author       = {Vladimir Jirasek},
  title        = {Practical application of information security models},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {17},
  number       = {1-2},
  pages        = {1--8},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.istr.2011.12.004},
  doi          = {10.1016/J.ISTR.2011.12.004},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Jirasek12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/PflugHB12,
  author       = {Anika Pflug and
                  Daniel Hartung and
                  Christoph Busch},
  title        = {Feature extraction from vein images using spatial information and
                  chain codes},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {17},
  number       = {1-2},
  pages        = {26--35},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.istr.2012.02.003},
  doi          = {10.1016/J.ISTR.2012.02.003},
  timestamp    = {Wed, 06 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/PflugHB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/QuayleT12,
  author       = {Ethel Quayle and
                  Max Taylor},
  title        = {Corrigendum to "Social networking as a nexus for engagement and exploitation
                  of young people" [Inform Secur Tech Rep 16 {(2)} {(2011)} 44-50]},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {17},
  number       = {1-2},
  pages        = {44},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.istr.2012.02.002},
  doi          = {10.1016/J.ISTR.2012.02.002},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/QuayleT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Walker12,
  author       = {Simon Walker},
  title        = {Economics and the cyber challenge},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {17},
  number       = {1-2},
  pages        = {9--18},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.istr.2011.12.003},
  doi          = {10.1016/J.ISTR.2011.12.003},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Walker12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics