Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/ijisec/ijisec7.bht:"
@article{DBLP:journals/ijisec/AimeurBFO08, author = {Esma A{\"{\i}}meur and Gilles Brassard and Jos{\'{e}} M. Fernandez and Flavien Serge Mani Onana}, title = {Alambic : a privacy-preserving recommender system for electronic commerce}, journal = {Int. J. Inf. Sec.}, volume = {7}, number = {5}, pages = {307--334}, year = {2008}, url = {https://doi.org/10.1007/s10207-007-0049-3}, doi = {10.1007/S10207-007-0049-3}, timestamp = {Thu, 21 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/AimeurBFO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/AldiniP08, author = {Alessandro Aldini and Alessandra Di Pierro}, title = {Estimating the maximum information leakage}, journal = {Int. J. Inf. Sec.}, volume = {7}, number = {3}, pages = {219--242}, year = {2008}, url = {https://doi.org/10.1007/s10207-007-0050-x}, doi = {10.1007/S10207-007-0050-X}, timestamp = {Tue, 06 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/AldiniP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/ArmandoC08, author = {Alessandro Armando and Luca Compagna}, title = {SAT-based model-checking for security protocols analysis}, journal = {Int. J. Inf. Sec.}, volume = {7}, number = {1}, pages = {3--32}, year = {2008}, url = {https://doi.org/10.1007/s10207-007-0041-y}, doi = {10.1007/S10207-007-0041-Y}, timestamp = {Tue, 06 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/ArmandoC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/BackesDHK08, author = {Michael Backes and Markus D{\"{u}}rmuth and Dennis Hofheinz and Ralf K{\"{u}}sters}, title = {Conditional reactive simulatability}, journal = {Int. J. Inf. Sec.}, volume = {7}, number = {2}, pages = {155--169}, year = {2008}, url = {https://doi.org/10.1007/s10207-007-0046-6}, doi = {10.1007/S10207-007-0046-6}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/BackesDHK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/BackesP08, author = {Michael Backes and Birgit Pfitzmann}, title = {Limits of the {BRSIM/UC} soundness of Dolev-Yao-style {XOR}}, journal = {Int. J. Inf. Sec.}, volume = {7}, number = {1}, pages = {33--54}, year = {2008}, url = {https://doi.org/10.1007/s10207-007-0040-z}, doi = {10.1007/S10207-007-0040-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/BackesP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/BalopoulosGK08, author = {Theodoros Balopoulos and Stefanos Gritzalis and Sokratis K. Katsikas}, title = {Specifying and implementing privacy-preserving cryptographic protocols}, journal = {Int. J. Inf. Sec.}, volume = {7}, number = {6}, pages = {395--420}, year = {2008}, url = {https://doi.org/10.1007/s10207-008-0057-y}, doi = {10.1007/S10207-008-0057-Y}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/BalopoulosGK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/BiskupW08, author = {Joachim Biskup and Torben Weibert}, title = {Keeping secrets in incomplete databases}, journal = {Int. J. Inf. Sec.}, volume = {7}, number = {3}, pages = {199--217}, year = {2008}, url = {https://doi.org/10.1007/s10207-007-0037-7}, doi = {10.1007/S10207-007-0037-7}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/BiskupW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/BraccialiFT08, author = {Andrea Bracciali and Gianluigi Ferrari and Emilio Tuosto}, title = {A symbolic framework for multi-faceted security protocol analysis}, journal = {Int. J. Inf. Sec.}, volume = {7}, number = {1}, pages = {55--84}, year = {2008}, url = {https://doi.org/10.1007/s10207-007-0043-9}, doi = {10.1007/S10207-007-0043-9}, timestamp = {Fri, 23 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/BraccialiFT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/BryansKMR08, author = {Jeremy W. Bryans and Maciej Koutny and Laurent Mazar{\'{e}} and Peter Y. A. Ryan}, title = {Opacity generalised to transition systems}, journal = {Int. J. Inf. Sec.}, volume = {7}, number = {6}, pages = {421--435}, year = {2008}, url = {https://doi.org/10.1007/s10207-008-0058-x}, doi = {10.1007/S10207-008-0058-X}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/BryansKMR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/ChenL08, author = {Pei{-}Te Chen and Chi{-}Sung Laih}, title = {{IDSIC:} an intrusion detection system with identification capability}, journal = {Int. J. Inf. Sec.}, volume = {7}, number = {3}, pages = {185--197}, year = {2008}, url = {https://doi.org/10.1007/s10207-007-0024-z}, doi = {10.1007/S10207-007-0024-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/ChenL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/CorbettBC08, author = {Cherita L. Corbett and Raheem A. Beyah and John A. Copeland}, title = {Passive classification of wireless NICs during active scanning}, journal = {Int. J. Inf. Sec.}, volume = {7}, number = {5}, pages = {335--348}, year = {2008}, url = {https://doi.org/10.1007/s10207-007-0053-7}, doi = {10.1007/S10207-007-0053-7}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/CorbettBC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/CramptonK08, author = {Jason Crampton and Hemanth Khambhammettu}, title = {Delegation in role-based access control}, journal = {Int. J. Inf. Sec.}, volume = {7}, number = {2}, pages = {123--136}, year = {2008}, url = {https://doi.org/10.1007/s10207-007-0044-8}, doi = {10.1007/S10207-007-0044-8}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/CramptonK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/CuppensC08, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia}, title = {Modeling contextual security policies}, journal = {Int. J. Inf. Sec.}, volume = {7}, number = {4}, pages = {285--305}, year = {2008}, url = {https://doi.org/10.1007/s10207-007-0051-9}, doi = {10.1007/S10207-007-0051-9}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/CuppensC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/DeganoV08, author = {Pierpaolo Degano and Luca Vigan{\`{o}}}, title = {Preface}, journal = {Int. J. Inf. Sec.}, volume = {7}, number = {1}, pages = {1}, year = {2008}, url = {https://doi.org/10.1007/s10207-007-0038-6}, doi = {10.1007/S10207-007-0038-6}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/DeganoV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/Dent08, author = {Alexander W. Dent}, title = {A survey of certificateless encryption schemes and security models}, journal = {Int. J. Inf. Sec.}, volume = {7}, number = {5}, pages = {349--377}, year = {2008}, url = {https://doi.org/10.1007/s10207-008-0055-0}, doi = {10.1007/S10207-008-0055-0}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/Dent08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/Estevez-TapiadorACR08, author = {Juan M. Est{\'{e}}vez{-}Tapiador and Almudena Alcaide and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Arturo Ribagorda}, title = {Bayesian rational exchange}, journal = {Int. J. Inf. Sec.}, volume = {7}, number = {1}, pages = {85--100}, year = {2008}, url = {https://doi.org/10.1007/s10207-007-0039-5}, doi = {10.1007/S10207-007-0039-5}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/Estevez-TapiadorACR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/Fong08, author = {Philip W. L. Fong}, title = {Discretionary capability confinement}, journal = {Int. J. Inf. Sec.}, volume = {7}, number = {2}, pages = {137--154}, year = {2008}, url = {https://doi.org/10.1007/s10207-007-0047-5}, doi = {10.1007/S10207-007-0047-5}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/Fong08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/Garcia-AlfaroBC08, author = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Nora Boulahia{-}Cuppens and Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {Complete analysis of configuration rules to guarantee reliable network security policies}, journal = {Int. J. Inf. Sec.}, volume = {7}, number = {2}, pages = {103--122}, year = {2008}, url = {https://doi.org/10.1007/s10207-007-0045-7}, doi = {10.1007/S10207-007-0045-7}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/Garcia-AlfaroBC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/Gollmann08, author = {Dieter Gollmann}, title = {Editorial}, journal = {Int. J. Inf. Sec.}, volume = {7}, number = {2}, pages = {101}, year = {2008}, url = {https://doi.org/10.1007/s10207-007-0052-8}, doi = {10.1007/S10207-007-0052-8}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/Gollmann08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/HuangSMW08, author = {Xinyi Huang and Willy Susilo and Yi Mu and Wei Wu}, title = {Secure universal designated verifier signature without random oracles}, journal = {Int. J. Inf. Sec.}, volume = {7}, number = {3}, pages = {171--183}, year = {2008}, url = {https://doi.org/10.1007/s10207-007-0021-2}, doi = {10.1007/S10207-007-0021-2}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/HuangSMW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/ImamotoZS08, author = {Kenji Imamoto and Jianying Zhou and Kouichi Sakurai}, title = {Achieving evenhandedness in certified email system for contract signing}, journal = {Int. J. Inf. Sec.}, volume = {7}, number = {6}, pages = {383--394}, year = {2008}, url = {https://doi.org/10.1007/s10207-008-0056-z}, doi = {10.1007/S10207-008-0056-Z}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/ImamotoZS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/TartaryWP08, author = {Christophe Tartary and Huaxiong Wang and Josef Pieprzyk}, title = {A coding approach to the multicast stream authentication problem}, journal = {Int. J. Inf. Sec.}, volume = {7}, number = {4}, pages = {265--283}, year = {2008}, url = {https://doi.org/10.1007/s10207-007-0048-4}, doi = {10.1007/S10207-007-0048-4}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/TartaryWP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/WangR08, author = {XiaoFeng Wang and Michael K. Reiter}, title = {A multi-layer framework for puzzle-based denial-of-service defense}, journal = {Int. J. Inf. Sec.}, volume = {7}, number = {4}, pages = {243--263}, year = {2008}, url = {https://doi.org/10.1007/s10207-007-0042-x}, doi = {10.1007/S10207-007-0042-X}, timestamp = {Thu, 09 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/WangR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/ZhaoZH08, author = {Changan Zhao and Fangguo Zhang and Jiwu Huang}, title = {A note on the Ate pairing}, journal = {Int. J. Inf. Sec.}, volume = {7}, number = {6}, pages = {379--382}, year = {2008}, url = {https://doi.org/10.1007/s10207-008-0054-1}, doi = {10.1007/S10207-008-0054-1}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/ZhaoZH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.