Search dblp for Publications

export results for "toc:db/journals/istr/istr19.bht:"

 download as .bib file

@article{DBLP:journals/istr/BaiardiCTS14,
  author       = {Fabrizio Baiardi and
                  Fabio Cor{\`{o}} and
                  Federico Tonelli and
                  Daniele Sgandurra},
  title        = {Automating the assessment of {ICT} risk},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {19},
  number       = {3},
  pages        = {182--193},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.jisa.2014.04.002},
  doi          = {10.1016/J.JISA.2014.04.002},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/BaiardiCTS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/BeckertGSBW14,
  author       = {Bernhard Beckert and
                  Rajeev Gor{\'{e}} and
                  Carsten Sch{\"{u}}rmann and
                  Thorsten Bormer and
                  Jian Wang},
  title        = {Verifying voting schemes},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {19},
  number       = {2},
  pages        = {115--129},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.jisa.2014.04.005},
  doi          = {10.1016/J.JISA.2014.04.005},
  timestamp    = {Tue, 30 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/BeckertGSBW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/BudurushiJV14,
  author       = {Jurlind Budurushi and
                  Roman J{\"{o}}ris and
                  Melanie Volkamer},
  title        = {Implementing and evaluating a software-independent voting system for
                  polling station elections},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {19},
  number       = {2},
  pages        = {105--114},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.jisa.2014.03.001},
  doi          = {10.1016/J.JISA.2014.03.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/BudurushiJV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/CamenischDELNPP14,
  author       = {Jan Camenisch and
                  Maria Dubovitskaya and
                  Robert R. Enderlein and
                  Anja Lehmann and
                  Gregory Neven and
                  Christian Paquin and
                  Franz{-}Stefan Preiss},
  title        = {Concepts and languages for privacy-preserving attribute-based authentication},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {19},
  number       = {1},
  pages        = {25--44},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.jisa.2014.03.004},
  doi          = {10.1016/J.JISA.2014.03.004},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/CamenischDELNPP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/CohenA14,
  author       = {Jason C. Cohen and
                  Subrata Acharya},
  title        = {Towards a trusted {HDFS} storage platform: Mitigating threats to Hadoop
                  infrastructures using hardware-accelerated encryption with TPM-rooted
                  key protection},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {19},
  number       = {3},
  pages        = {224--244},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.jisa.2014.03.003},
  doi          = {10.1016/J.JISA.2014.03.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/CohenA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/FangWGB14,
  author       = {Xiaole Fang and
                  Qianxue Wang and
                  Christophe Guyeux and
                  Jacques M. Bahi},
  title        = {{FPGA} acceleration of a pseudorandom number generator based on chaotic
                  iterations},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {19},
  number       = {1},
  pages        = {78--87},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.jisa.2014.02.003},
  doi          = {10.1016/J.JISA.2014.02.003},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/FangWGB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Faraoun14,
  author       = {Kamel Mohamed Faraoun},
  title        = {A novel fast and provably secure (t, n)-threshold secret sharing construction
                  for digital images},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {19},
  number       = {6},
  pages        = {331--340},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.jisa.2014.10.013},
  doi          = {10.1016/J.JISA.2014.10.013},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Faraoun14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/GhosalM14,
  author       = {Sudipta Kumar Ghosal and
                  Jyotsna Kumar Mandal},
  title        = {Binomial transform based fragile watermarking for image authentication},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {19},
  number       = {4-5},
  pages        = {272--281},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.jisa.2014.07.004},
  doi          = {10.1016/J.JISA.2014.07.004},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/GhosalM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HosseiniKJ14,
  author       = {Seyed Morteza Hosseini and
                  Hossein Karimi and
                  Majid Vafaei Jahan},
  title        = {Generating pseudo-random numbers by combining two systems with complex
                  behaviors},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {19},
  number       = {2},
  pages        = {149--162},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.jisa.2014.01.001},
  doi          = {10.1016/J.JISA.2014.01.001},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/HosseiniKJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Joaquim14,
  author       = {Rui Joaquim},
  title        = {How to prove the validity of a complex ballot encryption to the voter
                  and the public},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {19},
  number       = {2},
  pages        = {130--142},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.jisa.2014.04.004},
  doi          = {10.1016/J.JISA.2014.04.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Joaquim14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Johns14,
  author       = {Martin Johns},
  title        = {Script-templates for the Content Security Policy},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {19},
  number       = {3},
  pages        = {209--223},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.jisa.2014.03.007},
  doi          = {10.1016/J.JISA.2014.03.007},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Johns14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Kambourakis14,
  author       = {Georgios Kambourakis},
  title        = {Anonymity and closely related terms in the cyberspace: An analysis
                  by example},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {19},
  number       = {1},
  pages        = {2--17},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.jisa.2014.04.001},
  doi          = {10.1016/J.JISA.2014.04.001},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/Kambourakis14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KaruppiahS14,
  author       = {Marimuthu Karuppiah and
                  R. Saravanan},
  title        = {A secure remote user mutual authentication scheme using smart cards},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {19},
  number       = {4-5},
  pages        = {282--294},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.jisa.2014.09.006},
  doi          = {10.1016/J.JISA.2014.09.006},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/KaruppiahS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KheirKHK14,
  author       = {Mohamed S. Kheir and
                  Heinz Kreft and
                  Iris H{\"{o}}lken and
                  Reinhard H. Kn{\"{o}}chel},
  title        = {On the physical robustness of {RF} on-chip nanostructured security},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {19},
  number       = {4-5},
  pages        = {301--307},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.jisa.2014.09.007},
  doi          = {10.1016/J.JISA.2014.09.007},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/KheirKHK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KheirKK14,
  author       = {Mohamed S. Kheir and
                  Heinz Kreft and
                  Reinhard H. Kn{\"{o}}chel},
  title        = {A novel {RF} fingerprinting approach for hardware integrated security},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {19},
  number       = {2},
  pages        = {143--148},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.jisa.2014.02.001},
  doi          = {10.1016/J.JISA.2014.02.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/KheirKK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KuoWC14,
  author       = {Wen{-}Chung Kuo and
                  Hong{-}Ji Wei and
                  Jiin{-}Chiou Cheng},
  title        = {An efficient and secure anonymous mobility network authentication
                  scheme},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {19},
  number       = {1},
  pages        = {18--24},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.jisa.2013.12.002},
  doi          = {10.1016/J.JISA.2013.12.002},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/KuoWC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LaytonW14,
  author       = {Robert Layton and
                  Paul A. Watters},
  title        = {A methodology for estimating the tangible cost of data breaches},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {19},
  number       = {6},
  pages        = {321--330},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.jisa.2014.10.012},
  doi          = {10.1016/J.JISA.2014.10.012},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/LaytonW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LiRW14,
  author       = {Shujun Li and
                  Konrad Rieck and
                  Alan Woodward},
  title        = {Special issue on threat detection, analysis and defense},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {19},
  number       = {3},
  pages        = {163--164},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.jisa.2014.08.001},
  doi          = {10.1016/J.JISA.2014.08.001},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/LiRW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/PaulV14,
  author       = {St{\'{e}}phane Paul and
                  Rapha{\"{e}}l Vignon{-}Davillier},
  title        = {Unifying traditional risk assessment approaches with attack trees},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {19},
  number       = {3},
  pages        = {165--181},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.jisa.2014.03.006},
  doi          = {10.1016/J.JISA.2014.03.006},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/PaulV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/PirouniasMP14,
  author       = {Sotirios Pirounias and
                  Dimitrios Mermigas and
                  Constantinos Patsakis},
  title        = {The relation between information security events and firm market value,
                  empirical evidence on recent disclosures: An extension of the {GLZ}
                  study},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {19},
  number       = {4-5},
  pages        = {257--271},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.jisa.2014.07.001},
  doi          = {10.1016/J.JISA.2014.07.001},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/PirouniasMP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/RahbariniaPLL14,
  author       = {Babak Rahbarinia and
                  Roberto Perdisci and
                  Andrea Lanzi and
                  Kang Li},
  title        = {PeerRush: Mining for unwanted {P2P} traffic},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {19},
  number       = {3},
  pages        = {194--208},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.jisa.2014.03.002},
  doi          = {10.1016/J.JISA.2014.03.002},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/RahbariniaPLL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/RoyA14,
  author       = {Partha Sarathi Roy and
                  Avishek Adhikari},
  title        = {One-sided leakage-resilient privacy only two-message oblivious transfer},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {19},
  number       = {4-5},
  pages        = {295--300},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.jisa.2014.10.002},
  doi          = {10.1016/J.JISA.2014.10.002},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/RoyA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SalehiB14,
  author       = {Saman Salehi and
                  M. A. Balafar},
  title        = {Visual multi secret sharing by cylindrical random grid},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {19},
  number       = {3},
  pages        = {245--255},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.jisa.2014.05.003},
  doi          = {10.1016/J.JISA.2014.05.003},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/SalehiB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SatvatFHT14,
  author       = {Kiavash Satvat and
                  Matthew Forshaw and
                  Feng Hao and
                  Ehsan Toreini},
  title        = {On the privacy of private browsing - {A} forensic approach},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {19},
  number       = {1},
  pages        = {88--100},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.jisa.2014.02.002},
  doi          = {10.1016/J.JISA.2014.02.002},
  timestamp    = {Mon, 12 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/SatvatFHT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SchneiderTCH14,
  author       = {Steve A. Schneider and
                  Vanessa Teague and
                  Chris Culnane and
                  James Heather},
  title        = {Special Section on Vote-ID 2013},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {19},
  number       = {2},
  pages        = {103--104},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.jisa.2014.06.002},
  doi          = {10.1016/J.JISA.2014.06.002},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/SchneiderTCH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SunWZ14,
  author       = {Chen Sun and
                  Yang Wang and
                  Jun Zheng},
  title        = {Dissecting pattern unlock: The effect of pattern strength meter on
                  pattern selection},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {19},
  number       = {4-5},
  pages        = {308--320},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.jisa.2014.10.009},
  doi          = {10.1016/J.JISA.2014.10.009},
  timestamp    = {Mon, 01 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/SunWZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SuorantaMTRA14,
  author       = {Sanna Suoranta and
                  Kamran Manzoor and
                  Asko Tontti and
                  Joonas Ruuskanen and
                  Tuomas Aura},
  title        = {Logout in single sign-on systems: Problems and solutions},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {19},
  number       = {1},
  pages        = {61--77},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.jisa.2014.03.005},
  doi          = {10.1016/J.JISA.2014.03.005},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/SuorantaMTRA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WallerPM14,
  author       = {Adrian Waller and
                  Gregorio Mart{\'{\i}}nez P{\'{e}}rez and
                  F{\'{e}}lix G{\'{o}}mez M{\'{a}}rmol},
  title        = {Editorial: Special issue on Identity Protection and Management},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {19},
  number       = {1},
  pages        = {1},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.jisa.2014.06.001},
  doi          = {10.1016/J.JISA.2014.06.001},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/WallerPM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/YounisKM14,
  author       = {Younis A. Younis and
                  Kashif Kifayat and
                  Madjid Merabti},
  title        = {An access control model for cloud computing},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {19},
  number       = {1},
  pages        = {45--60},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.jisa.2014.04.003},
  doi          = {10.1016/J.JISA.2014.04.003},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/YounisKM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics