Search dblp for Publications

export results for "toc:db/journals/jisis/jisis10.bht:"

 download as .bib file

@article{DBLP:journals/jisis/AlizadehAS20,
  author       = {Morteza Alizadeh and
                  Karl Andersson and
                  Olov Schel{\'{e}}n},
  title        = {A Survey of Secure Internet of Things in Relation to Blockchain},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {10},
  number       = {3},
  pages        = {47--75},
  year         = {2020},
  url          = {https://doi.org/10.22667/JISIS.2020.08.31.047},
  doi          = {10.22667/JISIS.2020.08.31.047},
  timestamp    = {Tue, 22 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/AlizadehAS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/Anada20,
  author       = {Hiroaki Anada},
  title        = {Decentralized Multi-authority Anonymous Authentication for Global
                  Identities with Non-interactive Proofs},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {10},
  number       = {4},
  pages        = {23--37},
  year         = {2020},
  url          = {https://doi.org/10.22667/JISIS.2020.11.30.023},
  doi          = {10.22667/JISIS.2020.11.30.023},
  timestamp    = {Fri, 08 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisis/Anada20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/BaldiDDMMMOS20,
  author       = {Gabriele Baldi and
                  Yair Diaz{-}Tellez and
                  Theo Dimitrakos and
                  Fabio Martinelli and
                  Christina Michailidou and
                  Paolo Mori and
                  Oleksii Osliak and
                  Andrea Saracino},
  title        = {Session-dependent Usage Control for Big Data},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {10},
  number       = {3},
  pages        = {76--92},
  year         = {2020},
  url          = {https://doi.org/10.22667/JISIS.2020.08.31.076},
  doi          = {10.22667/JISIS.2020.08.31.076},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisis/BaldiDDMMMOS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/ColaceSLMS20,
  author       = {Francesco Colace and
                  Massimo De Santo and
                  Marco Lombardi and
                  Rosalba Mosca and
                  Domenico Santaniello},
  title        = {A Multilayer Approach for Recommending Contextual Learning Paths},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {10},
  number       = {2},
  pages        = {91--102},
  year         = {2020},
  url          = {https://doi.org/10.22667/JISIS.2020.05.31.091},
  doi          = {10.22667/JISIS.2020.05.31.091},
  timestamp    = {Fri, 01 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisis/ColaceSLMS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/DuttaSDBR20,
  author       = {Priyanka Dutta and
                  Willy Susilo and
                  Dung Hoang Duong and
                  Joonsang Baek and
                  Partha Sarathi Roy},
  title        = {Identity-based Unidirectional Proxy Re-Encryption and Re-Signature
                  in Standard Model: Lattice-based Constructions},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {10},
  number       = {4},
  pages        = {1--22},
  year         = {2020},
  url          = {https://doi.org/10.22667/JISIS.2020.11.30.001},
  doi          = {10.22667/JISIS.2020.11.30.001},
  timestamp    = {Mon, 08 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisis/DuttaSDBR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/HerskindKD20,
  author       = {Lasse Herskind and
                  Panagiota Katsikouli and
                  Nicola Dragoni},
  title        = {Oscausi - Practical Private Electronic Cash from Lelantus and MimbleWimble},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {10},
  number       = {2},
  pages        = {16--34},
  year         = {2020},
  url          = {https://doi.org/10.22667/JISIS.2020.05.31.016},
  doi          = {10.22667/JISIS.2020.05.31.016},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisis/HerskindKD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/Kang20,
  author       = {Myeongjoo Kang},
  title        = {The Study on the Effect of the Internet and Mobile-Cellular on Trade
                  in Services: Using the Modified Gravity Model},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {10},
  number       = {4},
  pages        = {90--100},
  year         = {2020},
  url          = {https://doi.org/10.22667/JISIS.2020.11.30.090},
  doi          = {10.22667/JISIS.2020.11.30.090},
  timestamp    = {Fri, 08 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisis/Kang20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/Kim20,
  author       = {Hwankuk Kim},
  title        = {5G core network security issues and attack classification from network
                  protocol perspective},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {10},
  number       = {2},
  pages        = {1--15},
  year         = {2020},
  url          = {https://doi.org/10.22667/JISIS.2020.05.31.001},
  doi          = {10.22667/JISIS.2020.05.31.001},
  timestamp    = {Fri, 26 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/Kim20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/KitanaTW20,
  author       = {Asem Kitana and
                  Issa Traor{\'{e}} and
                  Isaac Woungang},
  title        = {Towards an Epidemic SMS-based Cellular Botnet},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {10},
  number       = {4},
  pages        = {38--58},
  year         = {2020},
  url          = {https://doi.org/10.22667/JISIS.2020.11.30.038},
  doi          = {10.22667/JISIS.2020.11.30.038},
  timestamp    = {Fri, 08 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisis/KitanaTW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/KonigUKT20,
  author       = {Lukas K{\"{o}}nig and
                  Stefan Unger and
                  Peter Kieseberg and
                  Simon Tjoa},
  title        = {The Risks of the Blockchain {A} Review on Current Vulnerabilities
                  and Attacks},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {10},
  number       = {3},
  pages        = {110--127},
  year         = {2020},
  url          = {https://doi.org/10.22667/JISIS.2020.08.31.110},
  doi          = {10.22667/JISIS.2020.08.31.110},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/KonigUKT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/LawaK20,
  author       = {Sherifdeen Lawal and
                  Ram Krishnan},
  title        = {Policy Review in Attribute Based Access Control - {A} Policy Machine
                  Case Study},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {10},
  number       = {2},
  pages        = {67--81},
  year         = {2020},
  url          = {https://doi.org/10.22667/JISIS.2020.05.31.067},
  doi          = {10.22667/JISIS.2020.05.31.067},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/LawaK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/LemayBD20,
  author       = {David John Lemay and
                  Ram B. Basnet and
                  Tenzin Doleck},
  title        = {Examining the Relationship between Threat and Coping Appraisal in
                  Phishing Detection among College Students},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {10},
  number       = {1},
  pages        = {38--49},
  year         = {2020},
  url          = {https://doi.org/10.22667/JISIS.2020.02.29.038},
  doi          = {10.22667/JISIS.2020.02.29.038},
  timestamp    = {Wed, 11 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisis/LemayBD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/LuI20,
  author       = {Yangzhicheng Lu and
                  Tomoyuki Ishida},
  title        = {Implementation and Evaluation of a High-presence Interior Layout Simulation
                  System using Mixed Reality},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {10},
  number       = {1},
  pages        = {50--63},
  year         = {2020},
  url          = {https://doi.org/10.22667/JISIS.2020.02.29.050},
  doi          = {10.22667/JISIS.2020.02.29.050},
  timestamp    = {Wed, 11 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisis/LuI20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/PaulWSR20,
  author       = {Arinjita Paul and
                  Lihua Wang and
                  S. Sharmila Deva Selvi and
                  C. Pandu Rangan},
  title        = {Non-transferability in Proxy Re-Encryption Revisited},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {10},
  number       = {3},
  pages        = {1--30},
  year         = {2020},
  url          = {https://doi.org/10.22667/JISIS.2020.08.31.001},
  doi          = {10.22667/JISIS.2020.08.31.001},
  timestamp    = {Mon, 05 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/PaulWSR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/PavlenkoAMM20,
  author       = {Andrey Pavlenko and
                  Nursultan Askarbekuly and
                  Swati Megha and
                  Manuel Mazzara},
  title        = {Micro-frontends: application of microservices to web front-ends},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {10},
  number       = {2},
  pages        = {49--66},
  year         = {2020},
  url          = {https://doi.org/10.22667/JISIS.2020.05.31.049},
  doi          = {10.22667/JISIS.2020.05.31.049},
  timestamp    = {Fri, 26 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/PavlenkoAMM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/PoziO20,
  author       = {Muhammad Syafiq Mohd Pozi and
                  Mohd. Hasbullah Omar},
  title        = {A Kernel Density Estimation Method to Generate Synthetic Shifted Datasets
                  in Privacy-Preserving Task},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {10},
  number       = {4},
  pages        = {70--89},
  year         = {2020},
  url          = {https://doi.org/10.22667/JISIS.2020.11.30.070},
  doi          = {10.22667/JISIS.2020.11.30.070},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/PoziO20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/SMM20,
  author       = {Manipriya Sankaranarayanan and
                  Mala Chelliah and
                  Samson Mathew},
  title        = {A Collaborative Framework for Traffic Information in Vehicular Adhoc
                  Network Applications},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {10},
  number       = {3},
  pages        = {93--109},
  year         = {2020},
  url          = {https://doi.org/10.22667/JISIS.2020.08.31.093},
  doi          = {10.22667/JISIS.2020.08.31.093},
  timestamp    = {Fri, 20 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/SMM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/SimH20,
  author       = {Bo{-}Yeon Sim and
                  Dong{-}Guk Han},
  title        = {A Study on the {SCA} Trends for Application to IoT Devices},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {10},
  number       = {1},
  pages        = {2--21},
  year         = {2020},
  url          = {https://doi.org/10.22667/JISIS.2020.02.29.002},
  doi          = {10.22667/JISIS.2020.02.29.002},
  timestamp    = {Wed, 11 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisis/SimH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/SuHDKLY20,
  author       = {Qianqian Su and
                  Rong Hao and
                  Shaoxia Duan and
                  Fanyu Kong and
                  Xiaodong Liu and
                  Jia Yu},
  title        = {Secure Computation Outsourcing for Inversion in Finite Field},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {10},
  number       = {2},
  pages        = {35--48},
  year         = {2020},
  url          = {https://doi.org/10.22667/JISIS.2020.05.31.035},
  doi          = {10.22667/JISIS.2020.05.31.035},
  timestamp    = {Fri, 26 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/SuHDKLY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/TalegaonK20,
  author       = {Samir Talegaon and
                  Ram Krishnan},
  title        = {Administrative Models for Role Based Access Control in Android},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {10},
  number       = {3},
  pages        = {31--46},
  year         = {2020},
  url          = {https://doi.org/10.22667/JISIS.2020.08.31.031},
  doi          = {10.22667/JISIS.2020.08.31.031},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/TalegaonK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/ThangP20,
  author       = {Nguyen Canh Thang and
                  Minho Park},
  title        = {Detecting Malicious Middleboxes In Service Function Chaining},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {10},
  number       = {2},
  pages        = {82--90},
  year         = {2020},
  url          = {https://doi.org/10.22667/JISIS.2020.05.31.082},
  doi          = {10.22667/JISIS.2020.05.31.082},
  timestamp    = {Fri, 26 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/ThangP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/ValenzaC20,
  author       = {Fulvio Valenza and
                  Manuel Cheminod},
  title        = {An Optimized Firewall Anomaly Resolution},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {10},
  number       = {1},
  pages        = {22--37},
  year         = {2020},
  url          = {https://doi.org/10.22667/JISIS.2020.02.29.022},
  doi          = {10.22667/JISIS.2020.02.29.022},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisis/ValenzaC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/WongY20,
  author       = {Shing Ki Wong and
                  Siu{-}Ming Yiu},
  title        = {Identification of device motion status via Bluetooth discovery},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {10},
  number       = {4},
  pages        = {59--69},
  year         = {2020},
  url          = {https://doi.org/10.22667/JISIS.2020.11.30.059},
  doi          = {10.22667/JISIS.2020.11.30.059},
  timestamp    = {Fri, 08 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisis/WongY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/You20,
  author       = {Ilsun You},
  title        = {Letter from the Editor-in-Chief},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {10},
  number       = {1},
  pages        = {1},
  year         = {2020},
  url          = {https://doi.org/10.22667/JISIS.2020.02.29.001},
  doi          = {10.22667/JISIS.2020.02.29.001},
  timestamp    = {Wed, 11 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisis/You20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/ZhaoHZC20,
  author       = {Yan Zhao and
                  Ning Hu and
                  Chi Zhang and
                  Xinda Cheng},
  title        = {{DCG:} {A} Client-side Protection Method for {DNS} Cache},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {10},
  number       = {2},
  pages        = {103--121},
  year         = {2020},
  url          = {https://doi.org/10.22667/JISIS.2020.05.31.103},
  doi          = {10.22667/JISIS.2020.05.31.103},
  timestamp    = {Fri, 26 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/ZhaoHZC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics