Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/ijisec/ijisec3.bht:"
@article{DBLP:journals/ijisec/AbieSF04, author = {Habtamu Abie and P{\aa}l Spilling and Bent Foyn}, title = {A distributed digital rights management model for secure information-distribution systems}, journal = {Int. J. Inf. Sec.}, volume = {3}, number = {2}, pages = {113--128}, year = {2004}, url = {https://doi.org/10.1007/s10207-004-0058-4}, doi = {10.1007/S10207-004-0058-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/AbieSF04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/BackesP04, author = {Michael Backes and Birgit Pfitzmann}, title = {Computational probabilistic noninterference}, journal = {Int. J. Inf. Sec.}, volume = {3}, number = {1}, pages = {42--60}, year = {2004}, url = {https://doi.org/10.1007/s10207-004-0039-7}, doi = {10.1007/S10207-004-0039-7}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/BackesP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/BiskupB04, author = {Joachim Biskup and Piero A. Bonatti}, title = {Controlled query evaluation for enforcing confidentiality in complete information systems}, journal = {Int. J. Inf. Sec.}, volume = {3}, number = {1}, pages = {14--27}, year = {2004}, url = {https://doi.org/10.1007/s10207-004-0032-1}, doi = {10.1007/S10207-004-0032-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/BiskupB04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/BurgessCE04, author = {Mark Burgess and Geoffrey Canright and Kenth Eng{\o}{-}Monsen}, title = {A graph-theoretical model of computer security}, journal = {Int. J. Inf. Sec.}, volume = {3}, number = {2}, pages = {70--85}, year = {2004}, url = {https://doi.org/10.1007/s10207-004-0044-x}, doi = {10.1007/S10207-004-0044-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/BurgessCE04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/DazaHS04, author = {Vanesa Daza and Javier Herranz and Germ{\'{a}}n S{\'{a}}ez}, title = {Protocols useful on the Internet from distributed signature schemes}, journal = {Int. J. Inf. Sec.}, volume = {3}, number = {2}, pages = {61--69}, year = {2004}, url = {https://doi.org/10.1007/s10207-004-0043-y}, doi = {10.1007/S10207-004-0043-Y}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/DazaHS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/HitchcockMCD04, author = {Yvonne Hitchcock and Paul Montague and Gary Carter and Ed Dawson}, title = {The efficiency of solving multiple discrete logarithm problems and the implications for the security of fixed elliptic curves}, journal = {Int. J. Inf. Sec.}, volume = {3}, number = {2}, pages = {86--98}, year = {2004}, url = {https://doi.org/10.1007/s10207-004-0045-9}, doi = {10.1007/S10207-004-0045-9}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/HitchcockMCD04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/HopcroftL04, author = {Philippa J. Hopcroft and Gavin Lowe}, title = {Analysing a stream authentication protocol using model checking}, journal = {Int. J. Inf. Sec.}, volume = {3}, number = {1}, pages = {2--13}, year = {2004}, url = {https://doi.org/10.1007/s10207-004-0040-1}, doi = {10.1007/S10207-004-0040-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/HopcroftL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/ManaLOPT04, author = {Antonio Mana and Javier L{\'{o}}pez and Juan J. Ortega and Ernesto Pimentel and Jos{\'{e}} M. Troya}, title = {A framework for secure execution of software}, journal = {Int. J. Inf. Sec.}, volume = {3}, number = {2}, pages = {99--112}, year = {2004}, url = {https://doi.org/10.1007/s10207-004-0048-6}, doi = {10.1007/S10207-004-0048-6}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/ManaLOPT04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/Smith04, author = {Sean W. Smith}, title = {Outbound authentication for programmable secure coprocessors}, journal = {Int. J. Inf. Sec.}, volume = {3}, number = {1}, pages = {28--41}, year = {2004}, url = {https://doi.org/10.1007/s10207-004-0033-0}, doi = {10.1007/S10207-004-0033-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/Smith04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/Waidner04, author = {Michael Waidner}, title = {Preface}, journal = {Int. J. Inf. Sec.}, volume = {3}, number = {1}, pages = {1}, year = {2004}, url = {https://doi.org/10.1007/s10207-004-0051-y}, doi = {10.1007/S10207-004-0051-Y}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/Waidner04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.