Search dblp for Publications

export results for "toc:db/journals/ijisec/ijisec14.bht:"

 download as .bib file

@article{DBLP:journals/ijisec/0004R15,
  author       = {Lei Wei and
                  Michael K. Reiter},
  title        = {Toward practical encrypted email that supports private, regular-expression
                  searches},
  journal      = {Int. J. Inf. Sec.},
  volume       = {14},
  number       = {5},
  pages        = {397--416},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10207-014-0268-3},
  doi          = {10.1007/S10207-014-0268-3},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/0004R15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/Al-SalehAA15,
  author       = {Mohammed I. Al{-}Saleh and
                  Fatima M. AbuHjeela and
                  Ziad A. Al{-}Sharif},
  title        = {Investigating the detection capabilities of antiviruses under concurrent
                  attacks},
  journal      = {Int. J. Inf. Sec.},
  volume       = {14},
  number       = {4},
  pages        = {387--396},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10207-014-0261-x},
  doi          = {10.1007/S10207-014-0261-X},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/Al-SalehAA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/ArbitLOW15,
  author       = {Alex Arbit and
                  Yoel Livne and
                  Yossef Oren and
                  Avishai Wool},
  title        = {Implementing public-key cryptography on passive {RFID} tags is practical},
  journal      = {Int. J. Inf. Sec.},
  volume       = {14},
  number       = {1},
  pages        = {85--99},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10207-014-0236-y},
  doi          = {10.1007/S10207-014-0236-Y},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/ArbitLOW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/ArmandoCMV15,
  author       = {Alessandro Armando and
                  Gabriele Costa and
                  Alessio Merlo and
                  Luca Verderame},
  title        = {Formal modeling and automatic enforcement of Bring Your Own Device
                  policies},
  journal      = {Int. J. Inf. Sec.},
  volume       = {14},
  number       = {2},
  pages        = {123--140},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10207-014-0252-y},
  doi          = {10.1007/S10207-014-0252-Y},
  timestamp    = {Tue, 05 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/ArmandoCMV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/AzkiaCCCO15,
  author       = {Hanieh Azkia and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Gouenou Coatrieux and
                  Said Oulmakhzoune},
  title        = {Deployment of a posteriori access control using {IHE} {ATNA}},
  journal      = {Int. J. Inf. Sec.},
  volume       = {14},
  number       = {5},
  pages        = {471--483},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10207-014-0265-6},
  doi          = {10.1007/S10207-014-0265-6},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/AzkiaCCCO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/BellaJ15,
  author       = {Giampaolo Bella and
                  Helge Janicke},
  title        = {Special issue on the Security Track at the {ACM} Symposium on Applied
                  Computing 2013},
  journal      = {Int. J. Inf. Sec.},
  volume       = {14},
  number       = {2},
  pages        = {101--102},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10207-015-0280-2},
  doi          = {10.1007/S10207-015-0280-2},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/BellaJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/BertinoDHZ15,
  author       = {Elisa Bertino and
                  Robert H. Deng and
                  Xinyi Huang and
                  Jianying Zhou},
  title        = {Security and privacy of electronic health information systems},
  journal      = {Int. J. Inf. Sec.},
  volume       = {14},
  number       = {6},
  pages        = {485--486},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10207-015-0303-z},
  doi          = {10.1007/S10207-015-0303-Z},
  timestamp    = {Thu, 17 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/BertinoDHZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/ChakravartyPPK15,
  author       = {Sambuddho Chakravarty and
                  Georgios Portokalidis and
                  Michalis Polychronakis and
                  Angelos D. Keromytis},
  title        = {Detection and analysis of eavesdropping in anonymous communication
                  networks},
  journal      = {Int. J. Inf. Sec.},
  volume       = {14},
  number       = {3},
  pages        = {205--220},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10207-014-0256-7},
  doi          = {10.1007/S10207-014-0256-7},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/ChakravartyPPK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/DolzhenkoLR15,
  author       = {Egor Dolzhenko and
                  Jay Ligatti and
                  Srikar Reddy},
  title        = {Modeling runtime enforcement with mandatory results automata},
  journal      = {Int. J. Inf. Sec.},
  volume       = {14},
  number       = {1},
  pages        = {47--60},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10207-014-0239-8},
  doi          = {10.1007/S10207-014-0239-8},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/DolzhenkoLR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/EgnersHM15,
  author       = {Andr{\'{e}} Egners and
                  Patrick Herrmann and
                  Ulrike Meyer},
  title        = {Multi-operator wireless mesh networks secured by an all-encompassing
                  security architecture},
  journal      = {Int. J. Inf. Sec.},
  volume       = {14},
  number       = {2},
  pages        = {169--186},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10207-014-0244-y},
  doi          = {10.1007/S10207-014-0244-Y},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/EgnersHM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/GiffhornS15,
  author       = {Dennis Giffhorn and
                  Gregor Snelting},
  title        = {A new algorithm for low-deterministic security},
  journal      = {Int. J. Inf. Sec.},
  volume       = {14},
  number       = {3},
  pages        = {263--287},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10207-014-0257-6},
  doi          = {10.1007/S10207-014-0257-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/GiffhornS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/HadaviJDC15,
  author       = {Mohammad Ali Hadavi and
                  Rasool Jalili and
                  Ernesto Damiani and
                  Stelvio Cimato},
  title        = {Security and searchability in secret sharing-based data outsourcing},
  journal      = {Int. J. Inf. Sec.},
  volume       = {14},
  number       = {6},
  pages        = {513--529},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10207-015-0277-x},
  doi          = {10.1007/S10207-015-0277-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/HadaviJDC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/HaleviS15,
  author       = {Tzipora Halevi and
                  Nitesh Saxena},
  title        = {Keyboard acoustic side channel attacks: exploring realistic and security-sensitive
                  scenarios},
  journal      = {Int. J. Inf. Sec.},
  volume       = {14},
  number       = {5},
  pages        = {443--456},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10207-014-0264-7},
  doi          = {10.1007/S10207-014-0264-7},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/HaleviS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/HanLKI15,
  author       = {Kyoung{-}Soo Han and
                  Jae Hyun Lim and
                  Boojoong Kang and
                  Eul Gyu Im},
  title        = {Malware analysis using visualized images and entropy graphs},
  journal      = {Int. J. Inf. Sec.},
  volume       = {14},
  number       = {1},
  pages        = {1--14},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10207-014-0242-0},
  doi          = {10.1007/S10207-014-0242-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/HanLKI15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/HassaniKBAO15,
  author       = {Abdeljebar Ameziane El Hassani and
                  Anas Abou El Kalam and
                  Adel Bouhoula and
                  Ryma Abassi and
                  Abdellah Ait Ouahman},
  title        = {Integrity-OrBAC: a new model to preserve Critical Infrastructures
                  integrity},
  journal      = {Int. J. Inf. Sec.},
  volume       = {14},
  number       = {4},
  pages        = {367--385},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10207-014-0254-9},
  doi          = {10.1007/S10207-014-0254-9},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/HassaniKBAO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/HoangCN15,
  author       = {Thang Hoang and
                  Deokjai Choi and
                  Thuc Dinh Nguyen},
  title        = {Gait authentication on mobile phone using biometric cryptosystem and
                  fuzzy commitment scheme},
  journal      = {Int. J. Inf. Sec.},
  volume       = {14},
  number       = {6},
  pages        = {549--560},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10207-015-0273-1},
  doi          = {10.1007/S10207-015-0273-1},
  timestamp    = {Tue, 08 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/HoangCN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/Isern-DeyaRPP15,
  author       = {Andreu Pere Isern{-}Dey{\`{a}} and
                  Lloren{\c{c}} Huguet i Rotger and
                  Magdalena Payeras{-}Capell{\`{a}} and
                  Maci{\`{a}} Mut Puigserver},
  title        = {On the practicability of using group signatures on mobile devices:
                  implementation and performance analysis on the android platform},
  journal      = {Int. J. Inf. Sec.},
  volume       = {14},
  number       = {4},
  pages        = {335--345},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10207-014-0259-4},
  doi          = {10.1007/S10207-014-0259-4},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/Isern-DeyaRPP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/JamesG15,
  author       = {Joshua I. James and
                  Pavel Gladyshev},
  title        = {Automated inference of past action instances in digital investigations},
  journal      = {Int. J. Inf. Sec.},
  volume       = {14},
  number       = {3},
  pages        = {249--261},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10207-014-0249-6},
  doi          = {10.1007/S10207-014-0249-6},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/JamesG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/KammW15,
  author       = {Liina Kamm and
                  Jan Willemson},
  title        = {Secure floating point arithmetic and private satellite collision analysis},
  journal      = {Int. J. Inf. Sec.},
  volume       = {14},
  number       = {6},
  pages        = {531--548},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10207-014-0271-8},
  doi          = {10.1007/S10207-014-0271-8},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/KammW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/KozakeviciusCMN15,
  author       = {Alice J. Kozakevicius and
                  Cristian Cappo and
                  Bruno Augusti Mozzaquatro and
                  Raul Ceretta Nunes and
                  Christian E. Schaerer},
  title        = {{URL} query string anomaly sensor designed with the bidimensional
                  Haar wavelet transform},
  journal      = {Int. J. Inf. Sec.},
  volume       = {14},
  number       = {6},
  pages        = {561--581},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10207-015-0276-y},
  doi          = {10.1007/S10207-015-0276-Y},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/KozakeviciusCMN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/LiH15,
  author       = {Tao Li and
                  Aiqun Hu},
  title        = {Trusted mobile model based on {DTE} technology},
  journal      = {Int. J. Inf. Sec.},
  volume       = {14},
  number       = {5},
  pages        = {457--469},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10207-014-0266-5},
  doi          = {10.1007/S10207-014-0266-5},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/LiH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/Lin15,
  author       = {Han{-}Yu Lin},
  title        = {{RPCAE:} a novel revocable proxy convertible authenticated encryption
                  scheme},
  journal      = {Int. J. Inf. Sec.},
  volume       = {14},
  number       = {5},
  pages        = {431--441},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10207-014-0269-2},
  doi          = {10.1007/S10207-014-0269-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/Lin15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/MartinaP15,
  author       = {Jean Everson Martina and
                  Lawrence C. Paulson},
  title        = {Verifying multicast-based security protocols using the inductive method},
  journal      = {Int. J. Inf. Sec.},
  volume       = {14},
  number       = {2},
  pages        = {187--204},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10207-014-0251-z},
  doi          = {10.1007/S10207-014-0251-Z},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/MartinaP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/MartinaSCPC15,
  author       = {Jean Everson Martina and
                  Eduardo dos Santos and
                  Marcelo Carlomagno Carlos and
                  Geraint Price and
                  Ricardo Felipe Cust{\'{o}}dio},
  title        = {An adaptive threat model for security ceremonies},
  journal      = {Int. J. Inf. Sec.},
  volume       = {14},
  number       = {2},
  pages        = {103--121},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10207-014-0253-x},
  doi          = {10.1007/S10207-014-0253-X},
  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/MartinaSCPC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/MontMPS15,
  author       = {Marco Casassa Mont and
                  Ilaria Matteucci and
                  Marinella Petrocchi and
                  Marco Luca Sbodio},
  title        = {Towards safer information sharing in the cloud},
  journal      = {Int. J. Inf. Sec.},
  volume       = {14},
  number       = {4},
  pages        = {319--334},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10207-014-0258-5},
  doi          = {10.1007/S10207-014-0258-5},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/MontMPS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/MustafaS15,
  author       = {Tanveer Mustafa and
                  Karsten Sohr},
  title        = {Understanding the implemented access control policy of Android system
                  services with slicing and extended static checking},
  journal      = {Int. J. Inf. Sec.},
  volume       = {14},
  number       = {4},
  pages        = {347--366},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10207-014-0260-y},
  doi          = {10.1007/S10207-014-0260-Y},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/MustafaS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/NappaRC15,
  author       = {Antonio Nappa and
                  M. Zubair Rafique and
                  Juan Caballero},
  title        = {The {MALICIA} dataset: identification and analysis of drive-by download
                  operations},
  journal      = {Int. J. Inf. Sec.},
  volume       = {14},
  number       = {1},
  pages        = {15--33},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10207-014-0248-7},
  doi          = {10.1007/S10207-014-0248-7},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/NappaRC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/PitropakisPL15,
  author       = {Nikolaos Pitropakis and
                  Aggelos Pikrakis and
                  Costas Lambrinoudakis},
  title        = {Behaviour reflects personality: detecting co-residence attacks on
                  Xen-based cloud environments},
  journal      = {Int. J. Inf. Sec.},
  volume       = {14},
  number       = {4},
  pages        = {299--305},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10207-014-0255-8},
  doi          = {10.1007/S10207-014-0255-8},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/PitropakisPL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/QianLZH15,
  author       = {Huiling Qian and
                  Jiguo Li and
                  Yichen Zhang and
                  Jinguang Han},
  title        = {Privacy-preserving personal health record using multi-authority attribute-based
                  encryption with revocation},
  journal      = {Int. J. Inf. Sec.},
  volume       = {14},
  number       = {6},
  pages        = {487--497},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10207-014-0270-9},
  doi          = {10.1007/S10207-014-0270-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/QianLZH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/QinDWDNZ15,
  author       = {Bo Qin and
                  Hua Deng and
                  Qianhong Wu and
                  Josep Domingo{-}Ferrer and
                  David Naccache and
                  Yunya Zhou},
  title        = {Flexible attribute-based encryption applicable to secure e-healthcare
                  records},
  journal      = {Int. J. Inf. Sec.},
  volume       = {14},
  number       = {6},
  pages        = {499--511},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10207-014-0272-7},
  doi          = {10.1007/S10207-014-0272-7},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/QinDWDNZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/RieckerBBH15,
  author       = {Michael Riecker and
                  Sebastian Biedermann and
                  Rachid El Bansarkhani and
                  Matthias Hollick},
  title        = {Lightweight energy consumption-based intrusion detection system for
                  wireless sensor networks},
  journal      = {Int. J. Inf. Sec.},
  volume       = {14},
  number       = {2},
  pages        = {155--167},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10207-014-0241-1},
  doi          = {10.1007/S10207-014-0241-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/RieckerBBH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/SeifiSFB15,
  author       = {Younes Seifi and
                  Suriadi Suriadi and
                  Ernest Foo and
                  Colin Boyd},
  title        = {Analysis of two authorization protocols using Colored Petri Nets},
  journal      = {Int. J. Inf. Sec.},
  volume       = {14},
  number       = {3},
  pages        = {221--247},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10207-014-0243-z},
  doi          = {10.1007/S10207-014-0243-Z},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/SeifiSFB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/SilvaSN15,
  author       = {Helber Silva and
                  Aldri Santos and
                  Michele Nogueira},
  title        = {Routing management for performance and security tradeoff in wireless
                  mesh networks},
  journal      = {Int. J. Inf. Sec.},
  volume       = {14},
  number       = {1},
  pages        = {35--46},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10207-014-0246-9},
  doi          = {10.1007/S10207-014-0246-9},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/SilvaSN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/SpreitzenbarthS15,
  author       = {Michael Spreitzenbarth and
                  Thomas Schreck and
                  Florian Echtler and
                  Daniel Arp and
                  Johannes Hoffmann},
  title        = {Mobile-Sandbox: combining static and dynamic analysis with machine-learning
                  techniques},
  journal      = {Int. J. Inf. Sec.},
  volume       = {14},
  number       = {2},
  pages        = {141--153},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10207-014-0250-0},
  doi          = {10.1007/S10207-014-0250-0},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/SpreitzenbarthS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/TonicelliNDMIHO15,
  author       = {Rafael Tonicelli and
                  Anderson C. A. Nascimento and
                  Rafael Dowsley and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade and
                  Hideki Imai and
                  Goichiro Hanaoka and
                  Akira Otsuka},
  title        = {Information-theoretically secure oblivious polynomial evaluation in
                  the commodity-based model},
  journal      = {Int. J. Inf. Sec.},
  volume       = {14},
  number       = {1},
  pages        = {73--84},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10207-014-0247-8},
  doi          = {10.1007/S10207-014-0247-8},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/TonicelliNDMIHO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/ValenzuelaSR15,
  author       = {Michael L. Valenzuela and
                  Ferenc Szidarovszky and
                  Jerzy W. Rozenblit},
  title        = {A multiresolution approach for optimal defense against random attacks},
  journal      = {Int. J. Inf. Sec.},
  volume       = {14},
  number       = {1},
  pages        = {61--72},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10207-014-0245-x},
  doi          = {10.1007/S10207-014-0245-X},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/ValenzuelaSR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/VasiliadisPI15,
  author       = {Giorgos Vasiliadis and
                  Michalis Polychronakis and
                  Sotiris Ioannidis},
  title        = {GPU-assisted malware},
  journal      = {Int. J. Inf. Sec.},
  volume       = {14},
  number       = {3},
  pages        = {289--297},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10207-014-0262-9},
  doi          = {10.1007/S10207-014-0262-9},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/VasiliadisPI15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/YuAMTRSD15,
  author       = {Yong Yu and
                  Man Ho Au and
                  Yi Mu and
                  Shaohua Tang and
                  Jian Ren and
                  Willy Susilo and
                  Liju Dong},
  title        = {Enhanced privacy of a remote data integrity-checking protocol for
                  secure cloud storage},
  journal      = {Int. J. Inf. Sec.},
  volume       = {14},
  number       = {4},
  pages        = {307--318},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10207-014-0263-8},
  doi          = {10.1007/S10207-014-0263-8},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/YuAMTRSD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/ZhouVH15,
  author       = {Lan Zhou and
                  Vijay Varadharajan and
                  Michael Hitchens},
  title        = {Generic constructions for role-based encryption},
  journal      = {Int. J. Inf. Sec.},
  volume       = {14},
  number       = {5},
  pages        = {417--430},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10207-014-0267-4},
  doi          = {10.1007/S10207-014-0267-4},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/ZhouVH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics