Search dblp for Publications

export results for "toc:db/journals/ijisec/ijisec7.bht:"

 download as .bib file

@article{DBLP:journals/ijisec/AimeurBFO08,
  author       = {Esma A{\"{\i}}meur and
                  Gilles Brassard and
                  Jos{\'{e}} M. Fernandez and
                  Flavien Serge Mani Onana},
  title        = {Alambic : a privacy-preserving recommender system for electronic commerce},
  journal      = {Int. J. Inf. Sec.},
  volume       = {7},
  number       = {5},
  pages        = {307--334},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10207-007-0049-3},
  doi          = {10.1007/S10207-007-0049-3},
  timestamp    = {Thu, 21 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/AimeurBFO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/AldiniP08,
  author       = {Alessandro Aldini and
                  Alessandra Di Pierro},
  title        = {Estimating the maximum information leakage},
  journal      = {Int. J. Inf. Sec.},
  volume       = {7},
  number       = {3},
  pages        = {219--242},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10207-007-0050-x},
  doi          = {10.1007/S10207-007-0050-X},
  timestamp    = {Tue, 06 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/AldiniP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/ArmandoC08,
  author       = {Alessandro Armando and
                  Luca Compagna},
  title        = {SAT-based model-checking for security protocols analysis},
  journal      = {Int. J. Inf. Sec.},
  volume       = {7},
  number       = {1},
  pages        = {3--32},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10207-007-0041-y},
  doi          = {10.1007/S10207-007-0041-Y},
  timestamp    = {Tue, 06 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/ArmandoC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/BackesDHK08,
  author       = {Michael Backes and
                  Markus D{\"{u}}rmuth and
                  Dennis Hofheinz and
                  Ralf K{\"{u}}sters},
  title        = {Conditional reactive simulatability},
  journal      = {Int. J. Inf. Sec.},
  volume       = {7},
  number       = {2},
  pages        = {155--169},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10207-007-0046-6},
  doi          = {10.1007/S10207-007-0046-6},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/BackesDHK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/BackesP08,
  author       = {Michael Backes and
                  Birgit Pfitzmann},
  title        = {Limits of the {BRSIM/UC} soundness of Dolev-Yao-style {XOR}},
  journal      = {Int. J. Inf. Sec.},
  volume       = {7},
  number       = {1},
  pages        = {33--54},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10207-007-0040-z},
  doi          = {10.1007/S10207-007-0040-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/BackesP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/BalopoulosGK08,
  author       = {Theodoros Balopoulos and
                  Stefanos Gritzalis and
                  Sokratis K. Katsikas},
  title        = {Specifying and implementing privacy-preserving cryptographic protocols},
  journal      = {Int. J. Inf. Sec.},
  volume       = {7},
  number       = {6},
  pages        = {395--420},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10207-008-0057-y},
  doi          = {10.1007/S10207-008-0057-Y},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/BalopoulosGK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/BiskupW08,
  author       = {Joachim Biskup and
                  Torben Weibert},
  title        = {Keeping secrets in incomplete databases},
  journal      = {Int. J. Inf. Sec.},
  volume       = {7},
  number       = {3},
  pages        = {199--217},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10207-007-0037-7},
  doi          = {10.1007/S10207-007-0037-7},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/BiskupW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/BraccialiFT08,
  author       = {Andrea Bracciali and
                  Gianluigi Ferrari and
                  Emilio Tuosto},
  title        = {A symbolic framework for multi-faceted security protocol analysis},
  journal      = {Int. J. Inf. Sec.},
  volume       = {7},
  number       = {1},
  pages        = {55--84},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10207-007-0043-9},
  doi          = {10.1007/S10207-007-0043-9},
  timestamp    = {Fri, 23 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/BraccialiFT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/BryansKMR08,
  author       = {Jeremy W. Bryans and
                  Maciej Koutny and
                  Laurent Mazar{\'{e}} and
                  Peter Y. A. Ryan},
  title        = {Opacity generalised to transition systems},
  journal      = {Int. J. Inf. Sec.},
  volume       = {7},
  number       = {6},
  pages        = {421--435},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10207-008-0058-x},
  doi          = {10.1007/S10207-008-0058-X},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/BryansKMR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/ChenL08,
  author       = {Pei{-}Te Chen and
                  Chi{-}Sung Laih},
  title        = {{IDSIC:} an intrusion detection system with identification capability},
  journal      = {Int. J. Inf. Sec.},
  volume       = {7},
  number       = {3},
  pages        = {185--197},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10207-007-0024-z},
  doi          = {10.1007/S10207-007-0024-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/ChenL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/CorbettBC08,
  author       = {Cherita L. Corbett and
                  Raheem A. Beyah and
                  John A. Copeland},
  title        = {Passive classification of wireless NICs during active scanning},
  journal      = {Int. J. Inf. Sec.},
  volume       = {7},
  number       = {5},
  pages        = {335--348},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10207-007-0053-7},
  doi          = {10.1007/S10207-007-0053-7},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/CorbettBC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/CramptonK08,
  author       = {Jason Crampton and
                  Hemanth Khambhammettu},
  title        = {Delegation in role-based access control},
  journal      = {Int. J. Inf. Sec.},
  volume       = {7},
  number       = {2},
  pages        = {123--136},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10207-007-0044-8},
  doi          = {10.1007/S10207-007-0044-8},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/CramptonK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/CuppensC08,
  author       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia},
  title        = {Modeling contextual security policies},
  journal      = {Int. J. Inf. Sec.},
  volume       = {7},
  number       = {4},
  pages        = {285--305},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10207-007-0051-9},
  doi          = {10.1007/S10207-007-0051-9},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/CuppensC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/DeganoV08,
  author       = {Pierpaolo Degano and
                  Luca Vigan{\`{o}}},
  title        = {Preface},
  journal      = {Int. J. Inf. Sec.},
  volume       = {7},
  number       = {1},
  pages        = {1},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10207-007-0038-6},
  doi          = {10.1007/S10207-007-0038-6},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/DeganoV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/Dent08,
  author       = {Alexander W. Dent},
  title        = {A survey of certificateless encryption schemes and security models},
  journal      = {Int. J. Inf. Sec.},
  volume       = {7},
  number       = {5},
  pages        = {349--377},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10207-008-0055-0},
  doi          = {10.1007/S10207-008-0055-0},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/Dent08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/Estevez-TapiadorACR08,
  author       = {Juan M. Est{\'{e}}vez{-}Tapiador and
                  Almudena Alcaide and
                  Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and
                  Arturo Ribagorda},
  title        = {Bayesian rational exchange},
  journal      = {Int. J. Inf. Sec.},
  volume       = {7},
  number       = {1},
  pages        = {85--100},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10207-007-0039-5},
  doi          = {10.1007/S10207-007-0039-5},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/Estevez-TapiadorACR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/Fong08,
  author       = {Philip W. L. Fong},
  title        = {Discretionary capability confinement},
  journal      = {Int. J. Inf. Sec.},
  volume       = {7},
  number       = {2},
  pages        = {137--154},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10207-007-0047-5},
  doi          = {10.1007/S10207-007-0047-5},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/Fong08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/Garcia-AlfaroBC08,
  author       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Nora Boulahia{-}Cuppens and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  title        = {Complete analysis of configuration rules to guarantee reliable network
                  security policies},
  journal      = {Int. J. Inf. Sec.},
  volume       = {7},
  number       = {2},
  pages        = {103--122},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10207-007-0045-7},
  doi          = {10.1007/S10207-007-0045-7},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/Garcia-AlfaroBC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/Gollmann08,
  author       = {Dieter Gollmann},
  title        = {Editorial},
  journal      = {Int. J. Inf. Sec.},
  volume       = {7},
  number       = {2},
  pages        = {101},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10207-007-0052-8},
  doi          = {10.1007/S10207-007-0052-8},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/Gollmann08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/HuangSMW08,
  author       = {Xinyi Huang and
                  Willy Susilo and
                  Yi Mu and
                  Wei Wu},
  title        = {Secure universal designated verifier signature without random oracles},
  journal      = {Int. J. Inf. Sec.},
  volume       = {7},
  number       = {3},
  pages        = {171--183},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10207-007-0021-2},
  doi          = {10.1007/S10207-007-0021-2},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/HuangSMW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/ImamotoZS08,
  author       = {Kenji Imamoto and
                  Jianying Zhou and
                  Kouichi Sakurai},
  title        = {Achieving evenhandedness in certified email system for contract signing},
  journal      = {Int. J. Inf. Sec.},
  volume       = {7},
  number       = {6},
  pages        = {383--394},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10207-008-0056-z},
  doi          = {10.1007/S10207-008-0056-Z},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/ImamotoZS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/TartaryWP08,
  author       = {Christophe Tartary and
                  Huaxiong Wang and
                  Josef Pieprzyk},
  title        = {A coding approach to the multicast stream authentication problem},
  journal      = {Int. J. Inf. Sec.},
  volume       = {7},
  number       = {4},
  pages        = {265--283},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10207-007-0048-4},
  doi          = {10.1007/S10207-007-0048-4},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/TartaryWP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/WangR08,
  author       = {XiaoFeng Wang and
                  Michael K. Reiter},
  title        = {A multi-layer framework for puzzle-based denial-of-service defense},
  journal      = {Int. J. Inf. Sec.},
  volume       = {7},
  number       = {4},
  pages        = {243--263},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10207-007-0042-x},
  doi          = {10.1007/S10207-007-0042-X},
  timestamp    = {Thu, 09 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/WangR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/ZhaoZH08,
  author       = {Changan Zhao and
                  Fangguo Zhang and
                  Jiwu Huang},
  title        = {A note on the Ate pairing},
  journal      = {Int. J. Inf. Sec.},
  volume       = {7},
  number       = {6},
  pages        = {379--382},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10207-008-0054-1},
  doi          = {10.1007/S10207-008-0054-1},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/ZhaoZH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics