Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/jisis/jisis10.bht:"
@article{DBLP:journals/jisis/AlizadehAS20, author = {Morteza Alizadeh and Karl Andersson and Olov Schel{\'{e}}n}, title = {A Survey of Secure Internet of Things in Relation to Blockchain}, journal = {J. Internet Serv. Inf. Secur.}, volume = {10}, number = {3}, pages = {47--75}, year = {2020}, url = {https://doi.org/10.22667/JISIS.2020.08.31.047}, doi = {10.22667/JISIS.2020.08.31.047}, timestamp = {Tue, 22 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/AlizadehAS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/Anada20, author = {Hiroaki Anada}, title = {Decentralized Multi-authority Anonymous Authentication for Global Identities with Non-interactive Proofs}, journal = {J. Internet Serv. Inf. Secur.}, volume = {10}, number = {4}, pages = {23--37}, year = {2020}, url = {https://doi.org/10.22667/JISIS.2020.11.30.023}, doi = {10.22667/JISIS.2020.11.30.023}, timestamp = {Fri, 08 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisis/Anada20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/BaldiDDMMMOS20, author = {Gabriele Baldi and Yair Diaz{-}Tellez and Theo Dimitrakos and Fabio Martinelli and Christina Michailidou and Paolo Mori and Oleksii Osliak and Andrea Saracino}, title = {Session-dependent Usage Control for Big Data}, journal = {J. Internet Serv. Inf. Secur.}, volume = {10}, number = {3}, pages = {76--92}, year = {2020}, url = {https://doi.org/10.22667/JISIS.2020.08.31.076}, doi = {10.22667/JISIS.2020.08.31.076}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisis/BaldiDDMMMOS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/ColaceSLMS20, author = {Francesco Colace and Massimo De Santo and Marco Lombardi and Rosalba Mosca and Domenico Santaniello}, title = {A Multilayer Approach for Recommending Contextual Learning Paths}, journal = {J. Internet Serv. Inf. Secur.}, volume = {10}, number = {2}, pages = {91--102}, year = {2020}, url = {https://doi.org/10.22667/JISIS.2020.05.31.091}, doi = {10.22667/JISIS.2020.05.31.091}, timestamp = {Fri, 01 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisis/ColaceSLMS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/DuttaSDBR20, author = {Priyanka Dutta and Willy Susilo and Dung Hoang Duong and Joonsang Baek and Partha Sarathi Roy}, title = {Identity-based Unidirectional Proxy Re-Encryption and Re-Signature in Standard Model: Lattice-based Constructions}, journal = {J. Internet Serv. Inf. Secur.}, volume = {10}, number = {4}, pages = {1--22}, year = {2020}, url = {https://doi.org/10.22667/JISIS.2020.11.30.001}, doi = {10.22667/JISIS.2020.11.30.001}, timestamp = {Mon, 08 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisis/DuttaSDBR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/HerskindKD20, author = {Lasse Herskind and Panagiota Katsikouli and Nicola Dragoni}, title = {Oscausi - Practical Private Electronic Cash from Lelantus and MimbleWimble}, journal = {J. Internet Serv. Inf. Secur.}, volume = {10}, number = {2}, pages = {16--34}, year = {2020}, url = {https://doi.org/10.22667/JISIS.2020.05.31.016}, doi = {10.22667/JISIS.2020.05.31.016}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisis/HerskindKD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/Kang20, author = {Myeongjoo Kang}, title = {The Study on the Effect of the Internet and Mobile-Cellular on Trade in Services: Using the Modified Gravity Model}, journal = {J. Internet Serv. Inf. Secur.}, volume = {10}, number = {4}, pages = {90--100}, year = {2020}, url = {https://doi.org/10.22667/JISIS.2020.11.30.090}, doi = {10.22667/JISIS.2020.11.30.090}, timestamp = {Fri, 08 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisis/Kang20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/Kim20, author = {Hwankuk Kim}, title = {5G core network security issues and attack classification from network protocol perspective}, journal = {J. Internet Serv. Inf. Secur.}, volume = {10}, number = {2}, pages = {1--15}, year = {2020}, url = {https://doi.org/10.22667/JISIS.2020.05.31.001}, doi = {10.22667/JISIS.2020.05.31.001}, timestamp = {Fri, 26 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/Kim20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/KitanaTW20, author = {Asem Kitana and Issa Traor{\'{e}} and Isaac Woungang}, title = {Towards an Epidemic SMS-based Cellular Botnet}, journal = {J. Internet Serv. Inf. Secur.}, volume = {10}, number = {4}, pages = {38--58}, year = {2020}, url = {https://doi.org/10.22667/JISIS.2020.11.30.038}, doi = {10.22667/JISIS.2020.11.30.038}, timestamp = {Fri, 08 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisis/KitanaTW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/KonigUKT20, author = {Lukas K{\"{o}}nig and Stefan Unger and Peter Kieseberg and Simon Tjoa}, title = {The Risks of the Blockchain {A} Review on Current Vulnerabilities and Attacks}, journal = {J. Internet Serv. Inf. Secur.}, volume = {10}, number = {3}, pages = {110--127}, year = {2020}, url = {https://doi.org/10.22667/JISIS.2020.08.31.110}, doi = {10.22667/JISIS.2020.08.31.110}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/KonigUKT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/LawaK20, author = {Sherifdeen Lawal and Ram Krishnan}, title = {Policy Review in Attribute Based Access Control - {A} Policy Machine Case Study}, journal = {J. Internet Serv. Inf. Secur.}, volume = {10}, number = {2}, pages = {67--81}, year = {2020}, url = {https://doi.org/10.22667/JISIS.2020.05.31.067}, doi = {10.22667/JISIS.2020.05.31.067}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/LawaK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/LemayBD20, author = {David John Lemay and Ram B. Basnet and Tenzin Doleck}, title = {Examining the Relationship between Threat and Coping Appraisal in Phishing Detection among College Students}, journal = {J. Internet Serv. Inf. Secur.}, volume = {10}, number = {1}, pages = {38--49}, year = {2020}, url = {https://doi.org/10.22667/JISIS.2020.02.29.038}, doi = {10.22667/JISIS.2020.02.29.038}, timestamp = {Wed, 11 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisis/LemayBD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/LuI20, author = {Yangzhicheng Lu and Tomoyuki Ishida}, title = {Implementation and Evaluation of a High-presence Interior Layout Simulation System using Mixed Reality}, journal = {J. Internet Serv. Inf. Secur.}, volume = {10}, number = {1}, pages = {50--63}, year = {2020}, url = {https://doi.org/10.22667/JISIS.2020.02.29.050}, doi = {10.22667/JISIS.2020.02.29.050}, timestamp = {Wed, 11 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisis/LuI20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/PaulWSR20, author = {Arinjita Paul and Lihua Wang and S. Sharmila Deva Selvi and C. Pandu Rangan}, title = {Non-transferability in Proxy Re-Encryption Revisited}, journal = {J. Internet Serv. Inf. Secur.}, volume = {10}, number = {3}, pages = {1--30}, year = {2020}, url = {https://doi.org/10.22667/JISIS.2020.08.31.001}, doi = {10.22667/JISIS.2020.08.31.001}, timestamp = {Mon, 05 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/PaulWSR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/PavlenkoAMM20, author = {Andrey Pavlenko and Nursultan Askarbekuly and Swati Megha and Manuel Mazzara}, title = {Micro-frontends: application of microservices to web front-ends}, journal = {J. Internet Serv. Inf. Secur.}, volume = {10}, number = {2}, pages = {49--66}, year = {2020}, url = {https://doi.org/10.22667/JISIS.2020.05.31.049}, doi = {10.22667/JISIS.2020.05.31.049}, timestamp = {Fri, 26 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/PavlenkoAMM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/PoziO20, author = {Muhammad Syafiq Mohd Pozi and Mohd. Hasbullah Omar}, title = {A Kernel Density Estimation Method to Generate Synthetic Shifted Datasets in Privacy-Preserving Task}, journal = {J. Internet Serv. Inf. Secur.}, volume = {10}, number = {4}, pages = {70--89}, year = {2020}, url = {https://doi.org/10.22667/JISIS.2020.11.30.070}, doi = {10.22667/JISIS.2020.11.30.070}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/PoziO20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/SMM20, author = {Manipriya Sankaranarayanan and Mala Chelliah and Samson Mathew}, title = {A Collaborative Framework for Traffic Information in Vehicular Adhoc Network Applications}, journal = {J. Internet Serv. Inf. Secur.}, volume = {10}, number = {3}, pages = {93--109}, year = {2020}, url = {https://doi.org/10.22667/JISIS.2020.08.31.093}, doi = {10.22667/JISIS.2020.08.31.093}, timestamp = {Fri, 20 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/SMM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/SimH20, author = {Bo{-}Yeon Sim and Dong{-}Guk Han}, title = {A Study on the {SCA} Trends for Application to IoT Devices}, journal = {J. Internet Serv. Inf. Secur.}, volume = {10}, number = {1}, pages = {2--21}, year = {2020}, url = {https://doi.org/10.22667/JISIS.2020.02.29.002}, doi = {10.22667/JISIS.2020.02.29.002}, timestamp = {Wed, 11 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisis/SimH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/SuHDKLY20, author = {Qianqian Su and Rong Hao and Shaoxia Duan and Fanyu Kong and Xiaodong Liu and Jia Yu}, title = {Secure Computation Outsourcing for Inversion in Finite Field}, journal = {J. Internet Serv. Inf. Secur.}, volume = {10}, number = {2}, pages = {35--48}, year = {2020}, url = {https://doi.org/10.22667/JISIS.2020.05.31.035}, doi = {10.22667/JISIS.2020.05.31.035}, timestamp = {Fri, 26 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/SuHDKLY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/TalegaonK20, author = {Samir Talegaon and Ram Krishnan}, title = {Administrative Models for Role Based Access Control in Android}, journal = {J. Internet Serv. Inf. Secur.}, volume = {10}, number = {3}, pages = {31--46}, year = {2020}, url = {https://doi.org/10.22667/JISIS.2020.08.31.031}, doi = {10.22667/JISIS.2020.08.31.031}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/TalegaonK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/ThangP20, author = {Nguyen Canh Thang and Minho Park}, title = {Detecting Malicious Middleboxes In Service Function Chaining}, journal = {J. Internet Serv. Inf. Secur.}, volume = {10}, number = {2}, pages = {82--90}, year = {2020}, url = {https://doi.org/10.22667/JISIS.2020.05.31.082}, doi = {10.22667/JISIS.2020.05.31.082}, timestamp = {Fri, 26 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/ThangP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/ValenzaC20, author = {Fulvio Valenza and Manuel Cheminod}, title = {An Optimized Firewall Anomaly Resolution}, journal = {J. Internet Serv. Inf. Secur.}, volume = {10}, number = {1}, pages = {22--37}, year = {2020}, url = {https://doi.org/10.22667/JISIS.2020.02.29.022}, doi = {10.22667/JISIS.2020.02.29.022}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisis/ValenzaC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/WongY20, author = {Shing Ki Wong and Siu{-}Ming Yiu}, title = {Identification of device motion status via Bluetooth discovery}, journal = {J. Internet Serv. Inf. Secur.}, volume = {10}, number = {4}, pages = {59--69}, year = {2020}, url = {https://doi.org/10.22667/JISIS.2020.11.30.059}, doi = {10.22667/JISIS.2020.11.30.059}, timestamp = {Fri, 08 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisis/WongY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/You20, author = {Ilsun You}, title = {Letter from the Editor-in-Chief}, journal = {J. Internet Serv. Inf. Secur.}, volume = {10}, number = {1}, pages = {1}, year = {2020}, url = {https://doi.org/10.22667/JISIS.2020.02.29.001}, doi = {10.22667/JISIS.2020.02.29.001}, timestamp = {Wed, 11 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisis/You20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/ZhaoHZC20, author = {Yan Zhao and Ning Hu and Chi Zhang and Xinda Cheng}, title = {{DCG:} {A} Client-side Protection Method for {DNS} Cache}, journal = {J. Internet Serv. Inf. Secur.}, volume = {10}, number = {2}, pages = {103--121}, year = {2020}, url = {https://doi.org/10.22667/JISIS.2020.05.31.103}, doi = {10.22667/JISIS.2020.05.31.103}, timestamp = {Fri, 26 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/ZhaoHZC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.