Search dblp for Publications

export results for "toc:db/journals/ijipsi/ijipsi1.bht:"

 download as .bib file

@article{DBLP:journals/ijipsi/AbadieW13,
  author       = {Andre Abadie and
                  Duminda Wijesekera},
  title        = {An approach for risk assessment and mitigation in cognitive radio
                  technologies},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {1},
  number       = {4},
  pages        = {344--359},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJIPSI.2013.058208},
  doi          = {10.1504/IJIPSI.2013.058208},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/AbadieW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/AliA13,
  author       = {Syed Taqi Ali and
                  B. B. Amberker},
  title        = {A dynamic constant size attribute-based group signature scheme with
                  attribute anonymity},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {1},
  number       = {4},
  pages        = {312--343},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJIPSI.2013.058207},
  doi          = {10.1504/IJIPSI.2013.058207},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/AliA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/DoyalZ13,
  author       = {Alex Doyal and
                  Justin Zhan},
  title        = {Triple DoS: DDoS defence and traceback},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {1},
  number       = {4},
  pages        = {299--311},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJIPSI.2013.058206},
  doi          = {10.1504/IJIPSI.2013.058206},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/DoyalZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/ImranGRS13,
  author       = {Asif Imran and
                  Alim Ul Gias and
                  Rayhanur Rahman and
                  Kazi Sakib},
  title        = {ProvIntSec: a provenance cognition blueprint ensuring integrity and
                  security for real life open source cloud},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {1},
  number       = {4},
  pages        = {360--380},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJIPSI.2013.058226},
  doi          = {10.1504/IJIPSI.2013.058226},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/ImranGRS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/Sagheb-TehraniG13,
  author       = {Mehdi Sagheb{-}Tehrani and
                  Arbi Ghazarian},
  title        = {High development cost and software piracy: a study of motives},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {1},
  number       = {4},
  pages        = {381--402},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJIPSI.2013.058231},
  doi          = {10.1504/IJIPSI.2013.058231},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/Sagheb-TehraniG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/ArdagnaVFPS12,
  author       = {Claudio A. Ardagna and
                  Sabrina De Capitani di Vimercati and
                  Sara Foresti and
                  Stefano Paraboschi and
                  Pierangela Samarati},
  title        = {Minimising disclosure of client information in credential-based interactions},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {1},
  number       = {2/3},
  pages        = {205--233},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJIPSI.2012.046133},
  doi          = {10.1504/IJIPSI.2012.046133},
  timestamp    = {Mon, 21 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijipsi/ArdagnaVFPS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/ChaFKL12,
  author       = {Shi{-}Cho Cha and
                  Ya{-}Ping Fu and
                  Ren{-}Ting Ku and
                  Hao{-}Ping Lin},
  title        = {On considering enforcement while establishing {RFID} privacy policies},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {1},
  number       = {2/3},
  pages        = {234--252},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJIPSI.2012.046134},
  doi          = {10.1504/IJIPSI.2012.046134},
  timestamp    = {Thu, 13 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/ChaFKL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/ChenL12,
  author       = {Liqun Chen and
                  Jiangtao Li},
  title        = {{VLR} group signatures with indisputable exculpability and efficient
                  revocation},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {1},
  number       = {2/3},
  pages        = {129--159},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJIPSI.2012.046130},
  doi          = {10.1504/IJIPSI.2012.046130},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/ChenL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/LarsenH12,
  author       = {Michael D. Larsen and
                  Jennifer C. Huckett},
  title        = {Multimethod synthetic data generation for confidentiality and measurement
                  of disclosure risk},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {1},
  number       = {2/3},
  pages        = {184--204},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJIPSI.2012.046132},
  doi          = {10.1504/IJIPSI.2012.046132},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/LarsenH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/TaheriHH12,
  author       = {Somayeh Taheri and
                  Salke Hartung and
                  Dieter Hogrefe},
  title        = {{RDIS:} destination location privacy in MANETs},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {1},
  number       = {2/3},
  pages        = {253--277},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJIPSI.2012.046135},
  doi          = {10.1504/IJIPSI.2012.046135},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/TaheriHH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/YapYBUKKS12,
  author       = {Lee Fueng Yap and
                  Takeshi Yashiro and
                  Masahiro Bessho and
                  Tomonori Usaka and
                  M. Fahim Ferdous Khan and
                  Noboru Koshizuka and
                  Ken Sakamura},
  title        = {{SUCAS:} smart-card-based secure user-centric attestation framework
                  for location-based services},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {1},
  number       = {2/3},
  pages        = {160--183},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJIPSI.2012.046131},
  doi          = {10.1504/IJIPSI.2012.046131},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/YapYBUKKS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/ZhouH12,
  author       = {Zhibin Zhou and
                  Dijiang Huang},
  title        = {Gradual identity exposure using attribute-based encryption},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {1},
  number       = {2/3},
  pages        = {278--297},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJIPSI.2012.046136},
  doi          = {10.1504/IJIPSI.2012.046136},
  timestamp    = {Thu, 05 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/ZhouH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/Al-ArayedS11,
  author       = {Dalal Ahmed Al{-}Arayed and
                  Jo{\~{a}}o Pedro Sousa},
  title        = {A general model for trust management},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {1},
  number       = {1},
  pages        = {79--105},
  year         = {2011},
  url          = {https://doi.org/10.1504/IJIPSI.2011.043732},
  doi          = {10.1504/IJIPSI.2011.043732},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/Al-ArayedS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/BrickellL11,
  author       = {Ernie Brickell and
                  Jiangtao Li},
  title        = {Enhanced privacy {ID} from bilinear pairing for hardware authentication
                  and attestation},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {1},
  number       = {1},
  pages        = {3--33},
  year         = {2011},
  url          = {https://doi.org/10.1504/IJIPSI.2011.043729},
  doi          = {10.1504/IJIPSI.2011.043729},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/BrickellL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/JinTJ11,
  author       = {Lei Jin and
                  Hassan Takabi and
                  James B. D. Joshi},
  title        = {Analysing security and privacy issues of using e-mail address as identity},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {1},
  number       = {1},
  pages        = {34--58},
  year         = {2011},
  url          = {https://doi.org/10.1504/IJIPSI.2011.043730},
  doi          = {10.1504/IJIPSI.2011.043730},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/JinTJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/MasoumzadehJ11,
  author       = {Amirreza Masoumzadeh and
                  James Joshi},
  title        = {Ontology-based access control for social network systems},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {1},
  number       = {1},
  pages        = {59--78},
  year         = {2011},
  url          = {https://doi.org/10.1504/IJIPSI.2011.043731},
  doi          = {10.1504/IJIPSI.2011.043731},
  timestamp    = {Fri, 08 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/MasoumzadehJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/MeadMZ11,
  author       = {Nancy R. Mead and
                  Seiya Miyazaki and
                  Justin Zhan},
  title        = {Integrating privacy requirements considerations into a security requirements
                  engineering method and tool},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {1},
  number       = {1},
  pages        = {106--126},
  year         = {2011},
  url          = {https://doi.org/10.1504/IJIPSI.2011.043733},
  doi          = {10.1504/IJIPSI.2011.043733},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/MeadMZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics