Search dblp for Publications

export results for "toc:db/journals/isjgp/isjgp20.bht:"

 download as .bib file

@article{DBLP:journals/isjgp/BeghdadTB11,
  author       = {Rachid Beghdad and
                  Mohamed Touati and
                  Mohamed Seghir Berboucha},
  title        = {A Data Analysis-Based Approach for Detecting Intruders},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {20},
  number       = {4-5},
  pages        = {194--209},
  year         = {2011},
  url          = {https://doi.org/10.1080/19393555.2011.593611},
  doi          = {10.1080/19393555.2011.593611},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/BeghdadTB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/BhardwajS11,
  author       = {Mohini Bhardwaj and
                  Amar Jeet Singh},
  title        = {Automated Integrated Examination System: {A} Security Concern},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {20},
  number       = {3},
  pages        = {156--162},
  year         = {2011},
  url          = {https://doi.org/10.1080/19393555.2011.569907},
  doi          = {10.1080/19393555.2011.569907},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/BhardwajS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Biswas11,
  author       = {G. P. Biswas},
  title        = {Establishment of Authenticated Secret Session Keys Using Digital Signature
                  Standard},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {20},
  number       = {1},
  pages        = {9--16},
  year         = {2011},
  url          = {https://doi.org/10.1080/19393555.2010.529101},
  doi          = {10.1080/19393555.2010.529101},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Biswas11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Corwin11,
  author       = {Eric H. Corwin},
  title        = {Deep Packet Inspection: Shaping the Internet and the Implications
                  on Privacy and Security},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {20},
  number       = {6},
  pages        = {311--316},
  year         = {2011},
  url          = {https://doi.org/10.1080/19393555.2011.624162},
  doi          = {10.1080/19393555.2011.624162},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/Corwin11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Faragallah11,
  author       = {Osama S. Faragallah},
  title        = {An Efficient Block Encryption Cipher Based on Chaotic Maps for Secure
                  Multimedia Applications},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {20},
  number       = {3},
  pages        = {135--147},
  year         = {2011},
  url          = {https://doi.org/10.1080/19393555.2011.560926},
  doi          = {10.1080/19393555.2011.560926},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Faragallah11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/GandotraSB11,
  author       = {Vandana Gandotra and
                  Archana Singhal and
                  Punam Bedi},
  title        = {{MASPTA-O:} Multiagent System Planning to Avoid Threats Optimally},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {20},
  number       = {6},
  pages        = {290--310},
  year         = {2011},
  url          = {https://doi.org/10.1080/19393555.2011.624159},
  doi          = {10.1080/19393555.2011.624159},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/GandotraSB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/GeethaK11,
  author       = {S. Geetha and
                  N. Kamaraj},
  title        = {{MBNS} Steganogram Detection and Payload Capacity Estimation Exploiting
                  the Statistical Moments of Entropy Measure},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {20},
  number       = {2},
  pages        = {78--90},
  year         = {2011},
  url          = {https://doi.org/10.1080/19393555.2011.560922},
  doi          = {10.1080/19393555.2011.560922},
  timestamp    = {Tue, 06 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/GeethaK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/IsmailT11,
  author       = {E. S. Ismail and
                  N. M. F. Tahat},
  title        = {The Modified Signature Scheme Based on Factoring and Discrete Logarithms},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {20},
  number       = {4-5},
  pages        = {245--249},
  year         = {2011},
  url          = {https://doi.org/10.1080/19393555.2011.607221},
  doi          = {10.1080/19393555.2011.607221},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/IsmailT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/JohnS11,
  author       = {Saju P. John and
                  Philip Samuel},
  title        = {A Predictive Clustering Technique for Effective Key Management in
                  Mobile Ad Hoc Networks},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {20},
  number       = {4-5},
  pages        = {250--260},
  year         = {2011},
  url          = {https://doi.org/10.1080/19393555.2011.607222},
  doi          = {10.1080/19393555.2011.607222},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/JohnS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/KabirW11,
  author       = {Md. Enamul Kabir and
                  Hua Wang},
  title        = {Microdata Protection Method Through Microaggregation: {A} Median-Based
                  Approach},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {20},
  number       = {1},
  pages        = {1--8},
  year         = {2011},
  url          = {https://doi.org/10.1080/19393555.2010.515288},
  doi          = {10.1080/19393555.2010.515288},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/KabirW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/LagouC11,
  author       = {Panagiota Lagou and
                  Gregory Chondrokoukis},
  title        = {Choosing a Biometric for Nonrepudiation},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {20},
  number       = {1},
  pages        = {17--24},
  year         = {2011},
  url          = {https://doi.org/10.1080/19393555.2010.544700},
  doi          = {10.1080/19393555.2010.544700},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/LagouC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Marks11,
  author       = {Larry Marks},
  title        = {Hardening Network Security, by Mallery, J., Zahn, J., Kelly, P., Noonan,
                  W., Seagren, E., Love, P., Kraft, R., and O'Neill, {M.(2005).} {CA:}
                  McGraw-Hill/Osborne. {(608} pp., {\textdollar} 39.99 USD, {ISBN:}
                  978-0072257038)},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {20},
  number       = {4-5},
  pages        = {261},
  year         = {2011},
  url          = {https://doi.org/10.1080/19393555.2011.607224},
  doi          = {10.1080/19393555.2011.607224},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/Marks11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Matusitz11,
  author       = {Jonathan Matusitz},
  title        = {Social Network Theory: {A} Comparative Analysis of the Jewish Revolt
                  in Antiquity and the Cyber Terrorism Incident over Kosovo},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {20},
  number       = {1},
  pages        = {34--44},
  year         = {2011},
  url          = {https://doi.org/10.1080/19393555.2010.544702},
  doi          = {10.1080/19393555.2010.544702},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/Matusitz11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/McLaughlin11,
  author       = {Kevin L. McLaughlin},
  title        = {Cyber Attack! Is a Counter Attack Warranted?},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {20},
  number       = {1},
  pages        = {58--64},
  year         = {2011},
  url          = {https://doi.org/10.1080/19393555.2010.544705},
  doi          = {10.1080/19393555.2010.544705},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/McLaughlin11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Mohammed11,
  author       = {Derek Mohammed},
  title        = {Security in Cloud Computing: An Analysis of Key Drivers and Constraints},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {20},
  number       = {3},
  pages        = {123--127},
  year         = {2011},
  url          = {https://doi.org/10.1080/19393555.2010.544704},
  doi          = {10.1080/19393555.2010.544704},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/Mohammed11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/MorseRW11,
  author       = {Edward A. Morse and
                  Vasant Raval and
                  John R. Wingender Jr.},
  title        = {Market Price Effects of Data Security Breaches},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {20},
  number       = {6},
  pages        = {263--273},
  year         = {2011},
  url          = {https://doi.org/10.1080/19393555.2011.611860},
  doi          = {10.1080/19393555.2011.611860},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/MorseRW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/MouradOB11,
  author       = {Azzam Mourad and
                  Hadi Otrok and
                  Lama Baajour},
  title        = {New Approach Targeting Security Patterns Development and Deployment},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {20},
  number       = {4-5},
  pages        = {231--244},
  year         = {2011},
  url          = {https://doi.org/10.1080/19393555.2011.607220},
  doi          = {10.1080/19393555.2011.607220},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/MouradOB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/MukherjeeS11,
  author       = {Sourav Mukherjee and
                  Bibhudatta Sahoo},
  title        = {A Survey on Hardware Implementation of {IDEA} Cryptosystem},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {20},
  number       = {4-5},
  pages        = {210--218},
  year         = {2011},
  url          = {https://doi.org/10.1080/19393555.2011.599098},
  doi          = {10.1080/19393555.2011.599098},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/MukherjeeS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/PhadikarM11,
  author       = {Amit Phadikar and
                  Santi P. Maity},
  title        = {On Security of Compressed Gray Scale Image Using Joint Encryption
                  and Data Hiding},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {20},
  number       = {6},
  pages        = {274--289},
  year         = {2011},
  url          = {https://doi.org/10.1080/19393555.2011.623293},
  doi          = {10.1080/19393555.2011.623293},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/PhadikarM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/RaoK11,
  author       = {N. V. Rao and
                  V. Meena Kumari},
  title        = {Watermarking in Medical Imaging for Security and Authentication},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {20},
  number       = {3},
  pages        = {148--155},
  year         = {2011},
  url          = {https://doi.org/10.1080/19393555.2011.561154},
  doi          = {10.1080/19393555.2011.561154},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/RaoK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/RenjitS11,
  author       = {J. Arokia Renjit and
                  K. L. Shunmuganathan},
  title        = {Multi-Agent-Based Anomaly Intrusion Detection},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {20},
  number       = {4-5},
  pages        = {185--193},
  year         = {2011},
  url          = {https://doi.org/10.1080/19393555.2011.589424},
  doi          = {10.1080/19393555.2011.589424},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/RenjitS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/SaminathanS11,
  author       = {R. Saminathan and
                  K. Selvakumar},
  title        = {{TRUCE} - An Adaptive Trust Management Algorithm Over {MANET} for
                  Service-Based Mobile Computing Environments},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {20},
  number       = {4-5},
  pages        = {173--184},
  year         = {2011},
  url          = {https://doi.org/10.1080/19393555.2011.579490},
  doi          = {10.1080/19393555.2011.579490},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/SaminathanS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/ShanmugamPO11,
  author       = {Karthikeyan Shanmugam and
                  Roger S. Powell and
                  Tom Owens},
  title        = {An Approach for Validation of Digital Anti-Forensic Evidence},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {20},
  number       = {4-5},
  pages        = {219--230},
  year         = {2011},
  url          = {https://doi.org/10.1080/19393555.2011.604667},
  doi          = {10.1080/19393555.2011.604667},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/ShanmugamPO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/SheikhMK11,
  author       = {Rashid Sheikh and
                  Durgesh Kumar Mishra and
                  Beerendra Kumar},
  title        = {Secure Multiparty Computation: From Millionaires Problem to Anonymizer},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {20},
  number       = {1},
  pages        = {25--33},
  year         = {2011},
  url          = {https://doi.org/10.1080/19393555.2010.544701},
  doi          = {10.1080/19393555.2010.544701},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/SheikhMK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Sikdar11,
  author       = {Priti Sikdar},
  title        = {Alternate Approaches to Business Impact Analysis},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {20},
  number       = {3},
  pages        = {128--134},
  year         = {2011},
  url          = {https://doi.org/10.1080/19393555.2010.551274},
  doi          = {10.1080/19393555.2010.551274},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/Sikdar11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Sklavos11,
  author       = {Nicolas Sklavos},
  title        = {Editorial},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {20},
  number       = {2},
  pages        = {65--66},
  year         = {2011},
  url          = {https://doi.org/10.1080/19393555.2011.577345},
  doi          = {10.1080/19393555.2011.577345},
  timestamp    = {Fri, 15 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/Sklavos11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Sood11,
  author       = {Sandeep K. Sood},
  title        = {Secure Dynamic Identity-Based Authentication Scheme Using Smart Cards},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {20},
  number       = {2},
  pages        = {67--77},
  year         = {2011},
  url          = {https://doi.org/10.1080/19393555.2011.560921},
  doi          = {10.1080/19393555.2011.560921},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/Sood11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Sood11a,
  author       = {Sandeep K. Sood},
  title        = {Cookie-Based Virtual Password Authentication Protocol},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {20},
  number       = {2},
  pages        = {100--111},
  year         = {2011},
  url          = {https://doi.org/10.1080/19393555.2011.560924},
  doi          = {10.1080/19393555.2011.560924},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/Sood11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/StapletonP11,
  author       = {Jeff Stapleton and
                  Ralph Spencer Poore},
  title        = {Tokenization and Other Methods of Security for Cardholder Data},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {20},
  number       = {2},
  pages        = {91--99},
  year         = {2011},
  url          = {https://doi.org/10.1080/19393555.2011.560923},
  doi          = {10.1080/19393555.2011.560923},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/StapletonP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/SulthaniR11,
  author       = {R. Mynuddin Sulthani and
                  D. Sreenivasa Rao},
  title        = {A QoS Estimation-Based Scheduler for Real-Time Traffic in {IEEE} 802.11e
                  Mobile Ad hoc Networks},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {20},
  number       = {6},
  pages        = {317--327},
  year         = {2011},
  url          = {https://doi.org/10.1080/19393555.2011.624158},
  doi          = {10.1080/19393555.2011.624158},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/SulthaniR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/SurisettyK11,
  author       = {Sirisha Surisetty and
                  Sanjeev Kumar},
  title        = {Apple's Leopard Versus Microsoft's Windows {XP:} Experimental Evaluation
                  of Apple's Leopard Operating System with Windows {XP-SP2} under Distributed
                  Denial of Service Security Attacks},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {20},
  number       = {3},
  pages        = {163--172},
  year         = {2011},
  url          = {https://doi.org/10.1080/19393555.2011.569908},
  doi          = {10.1080/19393555.2011.569908},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/SurisettyK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/ThiruvaazhiD11,
  author       = {Uloli Thiruvaazhi and
                  R. Divya},
  title        = {Web Authentication Protocol Using Zero Knowledge Proof},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {20},
  number       = {2},
  pages        = {112--121},
  year         = {2011},
  url          = {https://doi.org/10.1080/19393555.2011.560925},
  doi          = {10.1080/19393555.2011.560925},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/ThiruvaazhiD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/TiwariS11,
  author       = {Rajesh Kumar Tiwari and
                  G. Sahoo Mesra},
  title        = {A Novel Methodology for Data Hiding in {PDF} Files},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {20},
  number       = {1},
  pages        = {45--57},
  year         = {2011},
  url          = {https://doi.org/10.1080/19393555.2010.544703},
  doi          = {10.1080/19393555.2010.544703},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/TiwariS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics