Search dblp for Publications

export results for "toc:db/journals/jisis/jisis3.bht:"

 download as .bib file

@article{DBLP:journals/jisis/AllalB13,
  author       = {Salim Allal and
                  Saadi Boudjit},
  title        = {Geocast Routing Protocols for VANETs: Survey and Geometry-Driven Scheme
                  Proposal},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {3},
  number       = {1/2},
  pages        = {20--36},
  year         = {2013},
  url          = {https://doi.org/10.22667/JISIS.2013.02.31.020},
  doi          = {10.22667/JISIS.2013.02.31.020},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/AllalB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/ChenP13,
  author       = {Liang (Ben) Chen and
                  Maria Prokopi},
  title        = {Enabling Resource-Aware Ubiquitous Applications for Personal Cloud
                  with a Pairing Device Framework},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {3},
  number       = {1/2},
  pages        = {83--100},
  year         = {2013},
  url          = {https://doi.org/10.22667/JISIS.2013.02.31.083},
  doi          = {10.22667/JISIS.2013.02.31.083},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/ChenP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/ChoiCKCK13,
  author       = {Junho Choi and
                  Chang Choi and
                  Byeongkyu Ko and
                  Dongjin Choi and
                  Pankoo Kim},
  title        = {Detecting Web based DDoS Attack using MapReduce operations in Cloud
                  Computing Environment},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {3},
  number       = {3/4},
  pages        = {28--37},
  year         = {2013},
  url          = {https://doi.org/10.22667/JISIS.2013.11.31.028},
  doi          = {10.22667/JISIS.2013.11.31.028},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/ChoiCKCK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/DabrowskiGMF13,
  author       = {Marek Dabrowski and
                  Justyna Gromada and
                  Hassnaa Moustafa and
                  Jacky Forestier},
  title        = {A context-aware architecture for {IPTV} services personalization},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {3},
  number       = {1/2},
  pages        = {49--70},
  year         = {2013},
  url          = {https://doi.org/10.22667/JISIS.2013.02.31.049},
  doi          = {10.22667/JISIS.2013.02.31.049},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/DabrowskiGMF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/DhurandherSW13,
  author       = {Sanjay Kumar Dhurandher and
                  Deepak Kumar Sharma and
                  Isaac Woungang},
  title        = {Energy-based Performance Evaluation of Various Routing Protocols in
                  Infrastructure-less Opportunistic Networks},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {3},
  number       = {1/2},
  pages        = {37--48},
  year         = {2013},
  url          = {https://doi.org/10.22667/JISIS.2013.02.31.037},
  doi          = {10.22667/JISIS.2013.02.31.037},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/DhurandherSW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/FloresAS13,
  author       = {Denys A. Flores and
                  Olga Angelopoulou and
                  Richard J. Self},
  title        = {An Anti-Money Laundering Methodology: Financial Regulations, Information
                  Security and Digital Forensics Working Together},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {3},
  number       = {1/2},
  pages        = {101--114},
  year         = {2013},
  url          = {https://doi.org/10.22667/JISIS.2013.02.31.101},
  doi          = {10.22667/JISIS.2013.02.31.101},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/FloresAS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/IvanovaPHK13,
  author       = {Marieta Georgieva Ivanova and
                  Christian W. Probst and
                  Ren{\'{e}} Rydhof Hansen and
                  Florian Kamm{\"{u}}ller},
  title        = {Externalizing Behaviour for Analysing System Models},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {3},
  number       = {3/4},
  pages        = {52--62},
  year         = {2013},
  url          = {https://doi.org/10.22667/JISIS.2013.11.31.052},
  doi          = {10.22667/JISIS.2013.11.31.052},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/IvanovaPHK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/KangK13,
  author       = {Ho{-}Seok Kang and
                  Sung{-}Ryul Kim},
  title        = {A New Logging-based {IP} Traceback Approach using Data Mining Techniques},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {3},
  number       = {3/4},
  pages        = {72--80},
  year         = {2013},
  url          = {https://doi.org/10.22667/JISIS.2013.11.31.072},
  doi          = {10.22667/JISIS.2013.11.31.072},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/KangK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/KimCCH13,
  author       = {Hyungdong Kim and
                  YongJe Choi and
                  Dooho Choi and
                  JaeCheol Ha},
  title        = {A New Exponentiation Algorithm Resistant to Combined Side Channel
                  Attack},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {3},
  number       = {3/4},
  pages        = {17--27},
  year         = {2013},
  url          = {https://doi.org/10.22667/JISIS.2013.11.31.017},
  doi          = {10.22667/JISIS.2013.11.31.017},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/KimCCH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/KimLLJVY13,
  author       = {Jaein Kim and
                  Youngjun Lee and
                  Kyungroul Lee and
                  Taeyoung Jung and
                  Dmitry Volokhov and
                  Kangbin Yim},
  title        = {Vulnerability to Flash Controller for Secure {USB} Drives},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {3},
  number       = {3/4},
  pages        = {136--145},
  year         = {2013},
  url          = {https://doi.org/10.22667/JISIS.2013.11.31.136},
  doi          = {10.22667/JISIS.2013.11.31.136},
  timestamp    = {Mon, 03 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/KimLLJVY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/LeePC13,
  author       = {Hwan{-}taek Lee and
                  Minkyu Park and
                  Seong{-}je Cho},
  title        = {Detection and prevention of LeNa Malware on Android},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {3},
  number       = {3/4},
  pages        = {63--71},
  year         = {2013},
  url          = {https://doi.org/10.22667/JISIS.2013.11.31.063},
  doi          = {10.22667/JISIS.2013.11.31.063},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/LeePC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/LeeSS13,
  author       = {Hyejoo Lee and
                  Changho Seo and
                  Sang{-}Uk Shin},
  title        = {{DRM} Cloud Architecture and Service Scenario for Content Protection},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {3},
  number       = {3/4},
  pages        = {94--105},
  year         = {2013},
  url          = {https://doi.org/10.22667/JISIS.2013.11.31.094},
  doi          = {10.22667/JISIS.2013.11.31.094},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/LeeSS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/RamosJMS13,
  author       = {Jos{\'{e}} Luis Hern{\'{a}}ndez Ramos and
                  Antonio J. Jara and
                  Leandro Mar{\'{\i}}n and
                  Antonio F. Skarmeta},
  title        = {Distributed Capability-based Access Control for the Internet of Things},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {3},
  number       = {3/4},
  pages        = {1--16},
  year         = {2013},
  url          = {https://doi.org/10.22667/JISIS.2013.11.31.001},
  doi          = {10.22667/JISIS.2013.11.31.001},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/RamosJMS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/SelviVPR13,
  author       = {S. Sharmila Deva Selvi and
                  S. Sree Vivek and
                  Vivek Krishna Pradhan and
                  C. Pandu Rangan},
  title        = {Efficient Certificateless Online/Offline Signature with tight security},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {3},
  number       = {1/2},
  pages        = {115--137},
  year         = {2013},
  url          = {https://doi.org/10.22667/JISIS.2013.02.31.115},
  doi          = {10.22667/JISIS.2013.02.31.115},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/SelviVPR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/ShimaK13,
  author       = {Shigeyoshi Shima and
                  Ayako Komatsu},
  title        = {Guidelines for the Prevention of Internal Improprieties in Japanese
                  Organization},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {3},
  number       = {3/4},
  pages        = {81--93},
  year         = {2013},
  url          = {https://doi.org/10.22667/JISIS.2013.11.31.081},
  doi          = {10.22667/JISIS.2013.11.31.081},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/ShimaK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/SinghPB13,
  author       = {Kunwar Singh and
                  C. Pandurangan and
                  A. K. Banerjee},
  title        = {Lattice Based Forward-Secure Identity Based Encryption Scheme with
                  Shorter Ciphertext},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {3},
  number       = {1/2},
  pages        = {5--19},
  year         = {2013},
  url          = {https://doi.org/10.22667/JISIS.2013.02.31.005},
  doi          = {10.22667/JISIS.2013.02.31.005},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/SinghPB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/SinghRB13,
  author       = {Kunwar Singh and
                  C. Pandu Rangan and
                  A. K. Banerjee},
  title        = {Lattice Based Identity Based Proxy Re-Encryption Scheme},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {3},
  number       = {3/4},
  pages        = {38--51},
  year         = {2013},
  url          = {https://doi.org/10.22667/JISIS.2013.11.31.038},
  doi          = {10.22667/JISIS.2013.11.31.038},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/SinghRB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/SunSYQ13,
  author       = {Liang Sun and
                  Fei Song and
                  Dong Yang and
                  Yajuan Qin},
  title        = {DHR-CCN, Distributed Hierarchical Routing for Content Centric Network},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {3},
  number       = {1/2},
  pages        = {71--82},
  year         = {2013},
  url          = {https://doi.org/10.22667/JISIS.2013.02.31.071},
  doi          = {10.22667/JISIS.2013.02.31.071},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/SunSYQ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/WuLYXW13,
  author       = {Guowei Wu and
                  Zuosong Liu and
                  Lin Yao and
                  Zhenzhen Xu and
                  Wei Wang},
  title        = {A Fuzzy-based Trust Management in WSNs},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {3},
  number       = {3/4},
  pages        = {124--135},
  year         = {2013},
  url          = {https://doi.org/10.22667/JISIS.2013.11.31.124},
  doi          = {10.22667/JISIS.2013.11.31.124},
  timestamp    = {Wed, 05 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisis/WuLYXW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/YeCM13,
  author       = {Jun Ye and
                  Xiaofeng Chen and
                  Jianfeng Ma},
  title        = {Constructing Verifiable Random Number in Finite Field},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {3},
  number       = {3/4},
  pages        = {106--115},
  year         = {2013},
  url          = {https://doi.org/10.22667/JISIS.2013.11.31.106},
  doi          = {10.22667/JISIS.2013.11.31.106},
  timestamp    = {Fri, 28 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/YeCM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/ZhaoWX13,
  author       = {Baokang Zhao and
                  Chunqing Wu and
                  Qin Xin},
  title        = {Guest Editorial: Special Issue on Advances in Internet Security and
                  Technology},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {3},
  number       = {1/2},
  pages        = {1--4},
  year         = {2013},
  url          = {https://doi.org/10.22667/JISIS.2013.02.31.001},
  doi          = {10.22667/JISIS.2013.02.31.001},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/ZhaoWX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/ZhouLMY13,
  author       = {Yonglin Zhou and
                  Qing{-}Shan Li and
                  Qidi Miao and
                  Kangbin Yim},
  title        = {DGA-Based Botnet Detection Using {DNS} Traffic},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {3},
  number       = {3/4},
  pages        = {116--123},
  year         = {2013},
  url          = {https://doi.org/10.22667/JISIS.2013.11.31.116},
  doi          = {10.22667/JISIS.2013.11.31.116},
  timestamp    = {Mon, 03 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/ZhouLMY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics