Search dblp for Publications

export results for "toc:db/journals/ijisec/ijisec3.bht:"

 download as .bib file

@article{DBLP:journals/ijisec/AbieSF04,
  author       = {Habtamu Abie and
                  P{\aa}l Spilling and
                  Bent Foyn},
  title        = {A distributed digital rights management model for secure information-distribution
                  systems},
  journal      = {Int. J. Inf. Sec.},
  volume       = {3},
  number       = {2},
  pages        = {113--128},
  year         = {2004},
  url          = {https://doi.org/10.1007/s10207-004-0058-4},
  doi          = {10.1007/S10207-004-0058-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/AbieSF04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/BackesP04,
  author       = {Michael Backes and
                  Birgit Pfitzmann},
  title        = {Computational probabilistic noninterference},
  journal      = {Int. J. Inf. Sec.},
  volume       = {3},
  number       = {1},
  pages        = {42--60},
  year         = {2004},
  url          = {https://doi.org/10.1007/s10207-004-0039-7},
  doi          = {10.1007/S10207-004-0039-7},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/BackesP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/BiskupB04,
  author       = {Joachim Biskup and
                  Piero A. Bonatti},
  title        = {Controlled query evaluation for enforcing confidentiality in complete
                  information systems},
  journal      = {Int. J. Inf. Sec.},
  volume       = {3},
  number       = {1},
  pages        = {14--27},
  year         = {2004},
  url          = {https://doi.org/10.1007/s10207-004-0032-1},
  doi          = {10.1007/S10207-004-0032-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/BiskupB04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/BurgessCE04,
  author       = {Mark Burgess and
                  Geoffrey Canright and
                  Kenth Eng{\o}{-}Monsen},
  title        = {A graph-theoretical model of computer security},
  journal      = {Int. J. Inf. Sec.},
  volume       = {3},
  number       = {2},
  pages        = {70--85},
  year         = {2004},
  url          = {https://doi.org/10.1007/s10207-004-0044-x},
  doi          = {10.1007/S10207-004-0044-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/BurgessCE04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/DazaHS04,
  author       = {Vanesa Daza and
                  Javier Herranz and
                  Germ{\'{a}}n S{\'{a}}ez},
  title        = {Protocols useful on the Internet from distributed signature schemes},
  journal      = {Int. J. Inf. Sec.},
  volume       = {3},
  number       = {2},
  pages        = {61--69},
  year         = {2004},
  url          = {https://doi.org/10.1007/s10207-004-0043-y},
  doi          = {10.1007/S10207-004-0043-Y},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/DazaHS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/HitchcockMCD04,
  author       = {Yvonne Hitchcock and
                  Paul Montague and
                  Gary Carter and
                  Ed Dawson},
  title        = {The efficiency of solving multiple discrete logarithm problems and
                  the implications for the security of fixed elliptic curves},
  journal      = {Int. J. Inf. Sec.},
  volume       = {3},
  number       = {2},
  pages        = {86--98},
  year         = {2004},
  url          = {https://doi.org/10.1007/s10207-004-0045-9},
  doi          = {10.1007/S10207-004-0045-9},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/HitchcockMCD04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/HopcroftL04,
  author       = {Philippa J. Hopcroft and
                  Gavin Lowe},
  title        = {Analysing a stream authentication protocol using model checking},
  journal      = {Int. J. Inf. Sec.},
  volume       = {3},
  number       = {1},
  pages        = {2--13},
  year         = {2004},
  url          = {https://doi.org/10.1007/s10207-004-0040-1},
  doi          = {10.1007/S10207-004-0040-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/HopcroftL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/ManaLOPT04,
  author       = {Antonio Mana and
                  Javier L{\'{o}}pez and
                  Juan J. Ortega and
                  Ernesto Pimentel and
                  Jos{\'{e}} M. Troya},
  title        = {A framework for secure execution of software},
  journal      = {Int. J. Inf. Sec.},
  volume       = {3},
  number       = {2},
  pages        = {99--112},
  year         = {2004},
  url          = {https://doi.org/10.1007/s10207-004-0048-6},
  doi          = {10.1007/S10207-004-0048-6},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/ManaLOPT04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/Smith04,
  author       = {Sean W. Smith},
  title        = {Outbound authentication for programmable secure coprocessors},
  journal      = {Int. J. Inf. Sec.},
  volume       = {3},
  number       = {1},
  pages        = {28--41},
  year         = {2004},
  url          = {https://doi.org/10.1007/s10207-004-0033-0},
  doi          = {10.1007/S10207-004-0033-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/Smith04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/Waidner04,
  author       = {Michael Waidner},
  title        = {Preface},
  journal      = {Int. J. Inf. Sec.},
  volume       = {3},
  number       = {1},
  pages        = {1},
  year         = {2004},
  url          = {https://doi.org/10.1007/s10207-004-0051-y},
  doi          = {10.1007/S10207-004-0051-Y},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/Waidner04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics