Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/ijisec/ijisec14.bht:"
@article{DBLP:journals/ijisec/0004R15, author = {Lei Wei and Michael K. Reiter}, title = {Toward practical encrypted email that supports private, regular-expression searches}, journal = {Int. J. Inf. Sec.}, volume = {14}, number = {5}, pages = {397--416}, year = {2015}, url = {https://doi.org/10.1007/s10207-014-0268-3}, doi = {10.1007/S10207-014-0268-3}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/0004R15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/Al-SalehAA15, author = {Mohammed I. Al{-}Saleh and Fatima M. AbuHjeela and Ziad A. Al{-}Sharif}, title = {Investigating the detection capabilities of antiviruses under concurrent attacks}, journal = {Int. J. Inf. Sec.}, volume = {14}, number = {4}, pages = {387--396}, year = {2015}, url = {https://doi.org/10.1007/s10207-014-0261-x}, doi = {10.1007/S10207-014-0261-X}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/Al-SalehAA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/ArbitLOW15, author = {Alex Arbit and Yoel Livne and Yossef Oren and Avishai Wool}, title = {Implementing public-key cryptography on passive {RFID} tags is practical}, journal = {Int. J. Inf. Sec.}, volume = {14}, number = {1}, pages = {85--99}, year = {2015}, url = {https://doi.org/10.1007/s10207-014-0236-y}, doi = {10.1007/S10207-014-0236-Y}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/ArbitLOW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/ArmandoCMV15, author = {Alessandro Armando and Gabriele Costa and Alessio Merlo and Luca Verderame}, title = {Formal modeling and automatic enforcement of Bring Your Own Device policies}, journal = {Int. J. Inf. Sec.}, volume = {14}, number = {2}, pages = {123--140}, year = {2015}, url = {https://doi.org/10.1007/s10207-014-0252-y}, doi = {10.1007/S10207-014-0252-Y}, timestamp = {Tue, 05 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/ArmandoCMV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/AzkiaCCCO15, author = {Hanieh Azkia and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Gouenou Coatrieux and Said Oulmakhzoune}, title = {Deployment of a posteriori access control using {IHE} {ATNA}}, journal = {Int. J. Inf. Sec.}, volume = {14}, number = {5}, pages = {471--483}, year = {2015}, url = {https://doi.org/10.1007/s10207-014-0265-6}, doi = {10.1007/S10207-014-0265-6}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/AzkiaCCCO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/BellaJ15, author = {Giampaolo Bella and Helge Janicke}, title = {Special issue on the Security Track at the {ACM} Symposium on Applied Computing 2013}, journal = {Int. J. Inf. Sec.}, volume = {14}, number = {2}, pages = {101--102}, year = {2015}, url = {https://doi.org/10.1007/s10207-015-0280-2}, doi = {10.1007/S10207-015-0280-2}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/BellaJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/BertinoDHZ15, author = {Elisa Bertino and Robert H. Deng and Xinyi Huang and Jianying Zhou}, title = {Security and privacy of electronic health information systems}, journal = {Int. J. Inf. Sec.}, volume = {14}, number = {6}, pages = {485--486}, year = {2015}, url = {https://doi.org/10.1007/s10207-015-0303-z}, doi = {10.1007/S10207-015-0303-Z}, timestamp = {Thu, 17 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/BertinoDHZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/ChakravartyPPK15, author = {Sambuddho Chakravarty and Georgios Portokalidis and Michalis Polychronakis and Angelos D. Keromytis}, title = {Detection and analysis of eavesdropping in anonymous communication networks}, journal = {Int. J. Inf. Sec.}, volume = {14}, number = {3}, pages = {205--220}, year = {2015}, url = {https://doi.org/10.1007/s10207-014-0256-7}, doi = {10.1007/S10207-014-0256-7}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/ChakravartyPPK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/DolzhenkoLR15, author = {Egor Dolzhenko and Jay Ligatti and Srikar Reddy}, title = {Modeling runtime enforcement with mandatory results automata}, journal = {Int. J. Inf. Sec.}, volume = {14}, number = {1}, pages = {47--60}, year = {2015}, url = {https://doi.org/10.1007/s10207-014-0239-8}, doi = {10.1007/S10207-014-0239-8}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/DolzhenkoLR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/EgnersHM15, author = {Andr{\'{e}} Egners and Patrick Herrmann and Ulrike Meyer}, title = {Multi-operator wireless mesh networks secured by an all-encompassing security architecture}, journal = {Int. J. Inf. Sec.}, volume = {14}, number = {2}, pages = {169--186}, year = {2015}, url = {https://doi.org/10.1007/s10207-014-0244-y}, doi = {10.1007/S10207-014-0244-Y}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/EgnersHM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/GiffhornS15, author = {Dennis Giffhorn and Gregor Snelting}, title = {A new algorithm for low-deterministic security}, journal = {Int. J. Inf. Sec.}, volume = {14}, number = {3}, pages = {263--287}, year = {2015}, url = {https://doi.org/10.1007/s10207-014-0257-6}, doi = {10.1007/S10207-014-0257-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/GiffhornS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/HadaviJDC15, author = {Mohammad Ali Hadavi and Rasool Jalili and Ernesto Damiani and Stelvio Cimato}, title = {Security and searchability in secret sharing-based data outsourcing}, journal = {Int. J. Inf. Sec.}, volume = {14}, number = {6}, pages = {513--529}, year = {2015}, url = {https://doi.org/10.1007/s10207-015-0277-x}, doi = {10.1007/S10207-015-0277-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/HadaviJDC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/HaleviS15, author = {Tzipora Halevi and Nitesh Saxena}, title = {Keyboard acoustic side channel attacks: exploring realistic and security-sensitive scenarios}, journal = {Int. J. Inf. Sec.}, volume = {14}, number = {5}, pages = {443--456}, year = {2015}, url = {https://doi.org/10.1007/s10207-014-0264-7}, doi = {10.1007/S10207-014-0264-7}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/HaleviS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/HanLKI15, author = {Kyoung{-}Soo Han and Jae Hyun Lim and Boojoong Kang and Eul Gyu Im}, title = {Malware analysis using visualized images and entropy graphs}, journal = {Int. J. Inf. Sec.}, volume = {14}, number = {1}, pages = {1--14}, year = {2015}, url = {https://doi.org/10.1007/s10207-014-0242-0}, doi = {10.1007/S10207-014-0242-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/HanLKI15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/HassaniKBAO15, author = {Abdeljebar Ameziane El Hassani and Anas Abou El Kalam and Adel Bouhoula and Ryma Abassi and Abdellah Ait Ouahman}, title = {Integrity-OrBAC: a new model to preserve Critical Infrastructures integrity}, journal = {Int. J. Inf. Sec.}, volume = {14}, number = {4}, pages = {367--385}, year = {2015}, url = {https://doi.org/10.1007/s10207-014-0254-9}, doi = {10.1007/S10207-014-0254-9}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/HassaniKBAO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/HoangCN15, author = {Thang Hoang and Deokjai Choi and Thuc Dinh Nguyen}, title = {Gait authentication on mobile phone using biometric cryptosystem and fuzzy commitment scheme}, journal = {Int. J. Inf. Sec.}, volume = {14}, number = {6}, pages = {549--560}, year = {2015}, url = {https://doi.org/10.1007/s10207-015-0273-1}, doi = {10.1007/S10207-015-0273-1}, timestamp = {Tue, 08 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/HoangCN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/Isern-DeyaRPP15, author = {Andreu Pere Isern{-}Dey{\`{a}} and Lloren{\c{c}} Huguet i Rotger and Magdalena Payeras{-}Capell{\`{a}} and Maci{\`{a}} Mut Puigserver}, title = {On the practicability of using group signatures on mobile devices: implementation and performance analysis on the android platform}, journal = {Int. J. Inf. Sec.}, volume = {14}, number = {4}, pages = {335--345}, year = {2015}, url = {https://doi.org/10.1007/s10207-014-0259-4}, doi = {10.1007/S10207-014-0259-4}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/Isern-DeyaRPP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/JamesG15, author = {Joshua I. James and Pavel Gladyshev}, title = {Automated inference of past action instances in digital investigations}, journal = {Int. J. Inf. Sec.}, volume = {14}, number = {3}, pages = {249--261}, year = {2015}, url = {https://doi.org/10.1007/s10207-014-0249-6}, doi = {10.1007/S10207-014-0249-6}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/JamesG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/KammW15, author = {Liina Kamm and Jan Willemson}, title = {Secure floating point arithmetic and private satellite collision analysis}, journal = {Int. J. Inf. Sec.}, volume = {14}, number = {6}, pages = {531--548}, year = {2015}, url = {https://doi.org/10.1007/s10207-014-0271-8}, doi = {10.1007/S10207-014-0271-8}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/KammW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/KozakeviciusCMN15, author = {Alice J. Kozakevicius and Cristian Cappo and Bruno Augusti Mozzaquatro and Raul Ceretta Nunes and Christian E. Schaerer}, title = {{URL} query string anomaly sensor designed with the bidimensional Haar wavelet transform}, journal = {Int. J. Inf. Sec.}, volume = {14}, number = {6}, pages = {561--581}, year = {2015}, url = {https://doi.org/10.1007/s10207-015-0276-y}, doi = {10.1007/S10207-015-0276-Y}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/KozakeviciusCMN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/LiH15, author = {Tao Li and Aiqun Hu}, title = {Trusted mobile model based on {DTE} technology}, journal = {Int. J. Inf. Sec.}, volume = {14}, number = {5}, pages = {457--469}, year = {2015}, url = {https://doi.org/10.1007/s10207-014-0266-5}, doi = {10.1007/S10207-014-0266-5}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/LiH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/Lin15, author = {Han{-}Yu Lin}, title = {{RPCAE:} a novel revocable proxy convertible authenticated encryption scheme}, journal = {Int. J. Inf. Sec.}, volume = {14}, number = {5}, pages = {431--441}, year = {2015}, url = {https://doi.org/10.1007/s10207-014-0269-2}, doi = {10.1007/S10207-014-0269-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/Lin15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/MartinaP15, author = {Jean Everson Martina and Lawrence C. Paulson}, title = {Verifying multicast-based security protocols using the inductive method}, journal = {Int. J. Inf. Sec.}, volume = {14}, number = {2}, pages = {187--204}, year = {2015}, url = {https://doi.org/10.1007/s10207-014-0251-z}, doi = {10.1007/S10207-014-0251-Z}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/MartinaP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/MartinaSCPC15, author = {Jean Everson Martina and Eduardo dos Santos and Marcelo Carlomagno Carlos and Geraint Price and Ricardo Felipe Cust{\'{o}}dio}, title = {An adaptive threat model for security ceremonies}, journal = {Int. J. Inf. Sec.}, volume = {14}, number = {2}, pages = {103--121}, year = {2015}, url = {https://doi.org/10.1007/s10207-014-0253-x}, doi = {10.1007/S10207-014-0253-X}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/MartinaSCPC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/MontMPS15, author = {Marco Casassa Mont and Ilaria Matteucci and Marinella Petrocchi and Marco Luca Sbodio}, title = {Towards safer information sharing in the cloud}, journal = {Int. J. Inf. Sec.}, volume = {14}, number = {4}, pages = {319--334}, year = {2015}, url = {https://doi.org/10.1007/s10207-014-0258-5}, doi = {10.1007/S10207-014-0258-5}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/MontMPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/MustafaS15, author = {Tanveer Mustafa and Karsten Sohr}, title = {Understanding the implemented access control policy of Android system services with slicing and extended static checking}, journal = {Int. J. Inf. Sec.}, volume = {14}, number = {4}, pages = {347--366}, year = {2015}, url = {https://doi.org/10.1007/s10207-014-0260-y}, doi = {10.1007/S10207-014-0260-Y}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/MustafaS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/NappaRC15, author = {Antonio Nappa and M. Zubair Rafique and Juan Caballero}, title = {The {MALICIA} dataset: identification and analysis of drive-by download operations}, journal = {Int. J. Inf. Sec.}, volume = {14}, number = {1}, pages = {15--33}, year = {2015}, url = {https://doi.org/10.1007/s10207-014-0248-7}, doi = {10.1007/S10207-014-0248-7}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/NappaRC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/PitropakisPL15, author = {Nikolaos Pitropakis and Aggelos Pikrakis and Costas Lambrinoudakis}, title = {Behaviour reflects personality: detecting co-residence attacks on Xen-based cloud environments}, journal = {Int. J. Inf. Sec.}, volume = {14}, number = {4}, pages = {299--305}, year = {2015}, url = {https://doi.org/10.1007/s10207-014-0255-8}, doi = {10.1007/S10207-014-0255-8}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/PitropakisPL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/QianLZH15, author = {Huiling Qian and Jiguo Li and Yichen Zhang and Jinguang Han}, title = {Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation}, journal = {Int. J. Inf. Sec.}, volume = {14}, number = {6}, pages = {487--497}, year = {2015}, url = {https://doi.org/10.1007/s10207-014-0270-9}, doi = {10.1007/S10207-014-0270-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/QianLZH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/QinDWDNZ15, author = {Bo Qin and Hua Deng and Qianhong Wu and Josep Domingo{-}Ferrer and David Naccache and Yunya Zhou}, title = {Flexible attribute-based encryption applicable to secure e-healthcare records}, journal = {Int. J. Inf. Sec.}, volume = {14}, number = {6}, pages = {499--511}, year = {2015}, url = {https://doi.org/10.1007/s10207-014-0272-7}, doi = {10.1007/S10207-014-0272-7}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/QinDWDNZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/RieckerBBH15, author = {Michael Riecker and Sebastian Biedermann and Rachid El Bansarkhani and Matthias Hollick}, title = {Lightweight energy consumption-based intrusion detection system for wireless sensor networks}, journal = {Int. J. Inf. Sec.}, volume = {14}, number = {2}, pages = {155--167}, year = {2015}, url = {https://doi.org/10.1007/s10207-014-0241-1}, doi = {10.1007/S10207-014-0241-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/RieckerBBH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/SeifiSFB15, author = {Younes Seifi and Suriadi Suriadi and Ernest Foo and Colin Boyd}, title = {Analysis of two authorization protocols using Colored Petri Nets}, journal = {Int. J. Inf. Sec.}, volume = {14}, number = {3}, pages = {221--247}, year = {2015}, url = {https://doi.org/10.1007/s10207-014-0243-z}, doi = {10.1007/S10207-014-0243-Z}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/SeifiSFB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/SilvaSN15, author = {Helber Silva and Aldri Santos and Michele Nogueira}, title = {Routing management for performance and security tradeoff in wireless mesh networks}, journal = {Int. J. Inf. Sec.}, volume = {14}, number = {1}, pages = {35--46}, year = {2015}, url = {https://doi.org/10.1007/s10207-014-0246-9}, doi = {10.1007/S10207-014-0246-9}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/SilvaSN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/SpreitzenbarthS15, author = {Michael Spreitzenbarth and Thomas Schreck and Florian Echtler and Daniel Arp and Johannes Hoffmann}, title = {Mobile-Sandbox: combining static and dynamic analysis with machine-learning techniques}, journal = {Int. J. Inf. Sec.}, volume = {14}, number = {2}, pages = {141--153}, year = {2015}, url = {https://doi.org/10.1007/s10207-014-0250-0}, doi = {10.1007/S10207-014-0250-0}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/SpreitzenbarthS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/TonicelliNDMIHO15, author = {Rafael Tonicelli and Anderson C. A. Nascimento and Rafael Dowsley and J{\"{o}}rn M{\"{u}}ller{-}Quade and Hideki Imai and Goichiro Hanaoka and Akira Otsuka}, title = {Information-theoretically secure oblivious polynomial evaluation in the commodity-based model}, journal = {Int. J. Inf. Sec.}, volume = {14}, number = {1}, pages = {73--84}, year = {2015}, url = {https://doi.org/10.1007/s10207-014-0247-8}, doi = {10.1007/S10207-014-0247-8}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/TonicelliNDMIHO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/ValenzuelaSR15, author = {Michael L. Valenzuela and Ferenc Szidarovszky and Jerzy W. Rozenblit}, title = {A multiresolution approach for optimal defense against random attacks}, journal = {Int. J. Inf. Sec.}, volume = {14}, number = {1}, pages = {61--72}, year = {2015}, url = {https://doi.org/10.1007/s10207-014-0245-x}, doi = {10.1007/S10207-014-0245-X}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/ValenzuelaSR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/VasiliadisPI15, author = {Giorgos Vasiliadis and Michalis Polychronakis and Sotiris Ioannidis}, title = {GPU-assisted malware}, journal = {Int. J. Inf. Sec.}, volume = {14}, number = {3}, pages = {289--297}, year = {2015}, url = {https://doi.org/10.1007/s10207-014-0262-9}, doi = {10.1007/S10207-014-0262-9}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/VasiliadisPI15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/YuAMTRSD15, author = {Yong Yu and Man Ho Au and Yi Mu and Shaohua Tang and Jian Ren and Willy Susilo and Liju Dong}, title = {Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage}, journal = {Int. J. Inf. Sec.}, volume = {14}, number = {4}, pages = {307--318}, year = {2015}, url = {https://doi.org/10.1007/s10207-014-0263-8}, doi = {10.1007/S10207-014-0263-8}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/YuAMTRSD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/ZhouVH15, author = {Lan Zhou and Vijay Varadharajan and Michael Hitchens}, title = {Generic constructions for role-based encryption}, journal = {Int. J. Inf. Sec.}, volume = {14}, number = {5}, pages = {417--430}, year = {2015}, url = {https://doi.org/10.1007/s10207-014-0267-4}, doi = {10.1007/S10207-014-0267-4}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/ZhouVH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.