Valid HTML 4.0! Valid CSS!
%%% -*-BibTeX-*-
%%% ====================================================================
%%%  BibTeX-file{
%%%     author          = "Nelson H. F. Beebe",
%%%     version         = "1.03",
%%%     date            = "25 July 2018",
%%%     time            = "08:56:48 MDT",
%%%     filename        = "intjinfosec.bib",
%%%     address         = "University of Utah
%%%                        Department of Mathematics, 110 LCB
%%%                        155 S 1400 E RM 233
%%%                        Salt Lake City, UT 84112-0090
%%%                        USA",
%%%     telephone       = "+1 801 581 5254",
%%%     FAX             = "+1 801 581 4148",
%%%     URL             = "http://www.math.utah.edu/~beebe",
%%%     checksum        = "07758 10490 39172 430125",
%%%     email           = "beebe at math.utah.edu, beebe at acm.org,
%%%                        beebe at computer.org (Internet)",
%%%     codetable       = "ISO/ASCII",
%%%     keywords        = "bibliography; BibTeX; International Journal
%%%                        of Information Security",
%%%     license         = "public domain",
%%%     supported       = "yes",
%%%     docstring       = "This is a COMPLETE bibliography of the
%%%                        International Journal of Information Security
%%%                        (CODEN none, ISSN 1615-5262 (print),
%%%                        1615-5270 (electronic)), published by
%%%                        Springer-Verlag.  Publication began with
%%%                        volume 1, number 1, in August 2001.  Journal
%%%                        issues appeared four times a year through
%%%                        2006, and since then, six times a year, with
%%%                        one volume per year.
%%%
%%%                        At version 1.03, the COMPLETE year coverage
%%%                        looked like this:
%%%
%%%                             2001 (   5)    2007 (  28)    2013 (  27)
%%%                             2002 (  10)    2008 (  24)    2014 (  35)
%%%                             2003 (   9)    2009 (  31)    2015 (  39)
%%%                             2004 (  22)    2010 (  26)    2016 (  38)
%%%                             2005 (  22)    2011 (  28)    2017 (  37)
%%%                             2006 (  22)    2012 (  29)    2018 (  28)
%%%
%%%                             Article:        460
%%%
%%%                             Total entries:  460
%%%
%%%                        Data for this bibliography have been derived
%%%                        primarily from the publisher Web site, with
%%%                        contributions from the BibNet Project and TeX
%%%                        User Group bibliography archives.
%%%
%%%                        Numerous errors in the publisher metadata
%%%                        sources noted above have been corrected.
%%%                        Spelling has been verified with the UNIX
%%%                        spell and GNU ispell programs using the
%%%                        exception dictionary stored in the companion
%%%                        file with extension .sok.
%%%
%%%                        BibTeX citation tags are uniformly chosen
%%%                        as name:year:abbrev, where name is the
%%%                        family name of the first author or editor,
%%%                        year is a 4-digit number, and abbrev is a
%%%                        3-letter condensation of important title
%%%                        words. Citation tags were automatically
%%%                        generated by software developed for the
%%%                        BibNet Project.
%%%
%%%                        In this bibliography, journal entries are
%%%                        sorted in publication order, using
%%%                        bibsort -byvolume.
%%%
%%%                        The checksum field above contains a CRC-16
%%%                        checksum as the first value, followed by the
%%%                        equivalent of the standard UNIX wc (word
%%%                        count) utility output of lines, words, and
%%%                        characters.  This is produced by Robert
%%%                        Solovay's checksum utility.",
%%%  }
%%% ====================================================================
@Preamble{
 "\ifx \undefined \booktitle \def \booktitle#1{{{\em #1}}} \fi"
}

%%% ====================================================================
%%% Acknowledgement abbreviations:
@String{ack-nhfb = "Nelson H. F. Beebe,
                    University of Utah,
                    Department of Mathematics, 110 LCB,
                    155 S 1400 E RM 233,
                    Salt Lake City, UT 84112-0090, USA,
                    Tel: +1 801 581 5254,
                    FAX: +1 801 581 4148,
                    e-mail: \path|beebe@math.utah.edu|,
                            \path|beebe@acm.org|,
                            \path|beebe@computer.org| (Internet),
                    URL: \path|http://www.math.utah.edu/~beebe/|"}

%%% ====================================================================
%%% Journal abbreviations:
@String{j-INT-J-INFO-SEC        = "International Journal of Information
                                  Security"}

%%% ====================================================================
%%% Bibliography entries, in publication order, with ``bibsort -byvol'':
@Article{Gollman:2001:E,
  author =       "Dieter Gollman and Catherine A. Meadows and Eiji
                 Okamoto",
  title =        "Editorial",
  journal =      j-INT-J-INFO-SEC,
  volume =       "1",
  number =       "1",
  pages =        "1--2",
  month =        aug,
  year =         "2001",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s102070100004",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:21 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s102070100004",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Landwehr:2001:CS,
  author =       "Carl E. Landwehr",
  title =        "Computer security",
  journal =      j-INT-J-INFO-SEC,
  volume =       "1",
  number =       "1",
  pages =        "3--13",
  month =        aug,
  year =         "2001",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s102070100003",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:21 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s102070100003",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{McHugh:2001:IID,
  author =       "John McHugh",
  title =        "Intrusion and intrusion detection",
  journal =      j-INT-J-INFO-SEC,
  volume =       "1",
  number =       "1",
  pages =        "14--35",
  month =        aug,
  year =         "2001",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s102070100001",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:21 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s102070100001",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Johnson:2001:ECD,
  author =       "Don Johnson and Alfred Menezes and Scott Vanstone",
  title =        "The {Elliptic Curve Digital Signature Algorithm
                 (ECDSA)}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "1",
  number =       "1",
  pages =        "36--63",
  month =        aug,
  year =         "2001",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s102070100002",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:21 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s102070100002",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Blundo:2001:PDI,
  author =       "Carlo Blundo and Paolo D'Arco and Alfredo {De
                 Santis}",
  title =        "A $t$-private $k$-database information retrieval
                 scheme",
  journal =      j-INT-J-INFO-SEC,
  volume =       "1",
  number =       "1",
  pages =        "64--68",
  month =        aug,
  year =         "2001",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s102070100005",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:21 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s102070100005",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Monrose:2002:PHB,
  author =       "Fabian Monrose and Michael K. Reiter and Susanne
                 Wetzel",
  title =        "Password hardening based on keystroke dynamics",
  journal =      j-INT-J-INFO-SEC,
  volume =       "1",
  number =       "2",
  pages =        "69--83",
  month =        feb,
  year =         "2002",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s102070100006",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:21 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s102070100006",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Rodeh:2002:UAT,
  author =       "Ohad Rodeh and Kenneth P. Birman and Danny Dolev",
  title =        "Using {AVL} trees for fault-tolerant group key
                 management",
  journal =      j-INT-J-INFO-SEC,
  volume =       "1",
  number =       "2",
  pages =        "84--99",
  month =        feb,
  year =         "2002",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s102070100008",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:21 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s102070100008",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Damiani:2002:SSS,
  author =       "E. Damiani and S. {De Capitani di Vimercati} and S.
                 Paraboschi and P. Samarati",
  title =        "Securing {SOAP} e-services",
  journal =      j-INT-J-INFO-SEC,
  volume =       "1",
  number =       "2",
  pages =        "100--115",
  month =        feb,
  year =         "2002",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s102070100009",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:21 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s102070100009",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kudo:2002:PPB,
  author =       "Michiharu Kudo",
  title =        "{PBAC}: Provision-based access control model",
  journal =      j-INT-J-INFO-SEC,
  volume =       "1",
  number =       "2",
  pages =        "116--130",
  month =        feb,
  year =         "2002",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s102070100010",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:21 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s102070100010",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Mizuki:2002:CCF,
  author =       "Takaaki Mizuki and Hiroki Shizuya and Takao
                 Nishizeki",
  title =        "A complete characterization of a family of key
                 exchange protocols",
  journal =      j-INT-J-INFO-SEC,
  volume =       "1",
  number =       "2",
  pages =        "131--142",
  month =        feb,
  year =         "2002",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s102070100011",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:21 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s102070100011",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Steinwandt:2002:APB,
  author =       "Rainer Steinwandt and Willi Geiselmann and Regine
                 Endsuleit",
  title =        "Attacking a polynomial-based cryptosystem: {Polly}
                 Cracker",
  journal =      j-INT-J-INFO-SEC,
  volume =       "1",
  number =       "3",
  pages =        "143--148",
  month =        nov,
  year =         "2002",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-002-0012-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:21 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-002-0012-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Itakura:2002:PPI,
  author =       "Yukio Itakura and Masaki Hashiyada and Toshio
                 Nagashima and Shigeo Tsujii",
  title =        "Proposal on personal identifiers generated from the
                 {STR} information of {DNA}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "1",
  number =       "3",
  pages =        "149--160",
  month =        nov,
  year =         "2002",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-002-0013-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:21 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-002-0013-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Nieto:2002:KRC,
  author =       "J. M. Gonz{\'a}les Nieto and K. Viswanathan and C.
                 Boyd and A. Clark and E. Dawson",
  title =        "Key recovery for the commercial environment",
  journal =      j-INT-J-INFO-SEC,
  volume =       "1",
  number =       "3",
  pages =        "161--174",
  month =        nov,
  year =         "2002",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-002-0014-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:21 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-002-0014-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kim:2002:NEC,
  author =       "S. Kim and H. Oh",
  title =        "A new electronic check system with reusable refunds",
  journal =      j-INT-J-INFO-SEC,
  volume =       "1",
  number =       "3",
  pages =        "175--188",
  month =        nov,
  year =         "2002",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-002-0015-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:21 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-002-0015-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Dawson:2002:CCP,
  author =       "Ed Dawson and Kapali Viswanathan and Colin Boyd",
  title =        "Compliant cryptologic protocols",
  journal =      j-INT-J-INFO-SEC,
  volume =       "1",
  number =       "3",
  pages =        "189--202",
  month =        nov,
  year =         "2002",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-002-0016-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:21 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-002-0016-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Korzhik:2003:HAB,
  author =       "Valery Korzhik and Guillermo Morales-Luna",
  title =        "Hybrid authentication based on noisy channels",
  journal =      j-INT-J-INFO-SEC,
  volume =       "1",
  number =       "4",
  pages =        "203--210",
  month =        jul,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-002-0017-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:22 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-002-0017-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Ruan:2003:FGB,
  author =       "Chun Ruan and Vijay Varadharajan",
  title =        "A formal graph based framework for supporting
                 authorization delegations and conflict resolutions",
  journal =      j-INT-J-INFO-SEC,
  volume =       "1",
  number =       "4",
  pages =        "211--222",
  month =        jul,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-003-0018-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:22 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-003-0018-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kremer:2003:FMP,
  author =       "Steve Kremer and Olivier Markowitch",
  title =        "Fair multi-party non-repudiation protocols",
  journal =      j-INT-J-INFO-SEC,
  volume =       "1",
  number =       "4",
  pages =        "223--235",
  month =        jul,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-003-0019-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:22 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-003-0019-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Carminati:2003:MAC,
  author =       "Barbara Carminati and Elena Ferrari",
  title =        "Management of access control policies for {XML}
                 document sources",
  journal =      j-INT-J-INFO-SEC,
  volume =       "1",
  number =       "4",
  pages =        "236--260",
  month =        jul,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-003-0020-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:22 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-003-0020-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{MacKenzie:2003:NCD,
  author =       "Philip MacKenzie and Michael K. Reiter",
  title =        "Networked cryptographic devices resilient to capture",
  journal =      j-INT-J-INFO-SEC,
  volume =       "2",
  number =       "1",
  pages =        "1--20",
  month =        nov,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-003-0022-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:22 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-003-0022-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Gurgens:2003:ACP,
  author =       "Sigrid G{\"u}rgens and Javier Lopez and Ren{\'e}
                 Peralta",
  title =        "Analysis of e-commerce protocols: Adapting a
                 traditional technique",
  journal =      j-INT-J-INFO-SEC,
  volume =       "2",
  number =       "1",
  pages =        "21--36",
  month =        nov,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-003-0021-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:22 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-003-0021-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Baek:2003:ZSP,
  author =       "Joonsang Baek and Yuliang Zheng",
  title =        "{Zheng} and {Seberry}'s public key encryption scheme
                 revisited",
  journal =      j-INT-J-INFO-SEC,
  volume =       "2",
  number =       "1",
  pages =        "37--44",
  month =        nov,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-003-0023-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:22 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-003-0023-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bertino:2003:CBF,
  author =       "Elisa Bertino and Elena Ferrari and Andrea Perego",
  title =        "Content-based filtering of {Web} documents: the {MaX}
                 system and the {EUFORBIA} project",
  journal =      j-INT-J-INFO-SEC,
  volume =       "2",
  number =       "1",
  pages =        "45--58",
  month =        nov,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-003-0024-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:22 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-003-0024-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Geiselmann:2003:AIP,
  author =       "Willi Geiselmann and Willi Meier and Rainer
                 Steinwandt",
  title =        "An attack on the isomorphisms of polynomials problem
                 with one secret",
  journal =      j-INT-J-INFO-SEC,
  volume =       "2",
  number =       "1",
  pages =        "59--64",
  month =        nov,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-003-0025-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:22 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-003-0025-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Dawson:2004:PSI,
  author =       "E. Dawson",
  title =        "Preface to the special issue on {PKI}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "2",
  number =       "2",
  pages =        "65--65",
  month =        jan,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-003-0031-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:22 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-003-0031-7;
                 http://link.springer.com/content/pdf/10.1007/s10207-003-0031-7.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Blakley:2004:ASN,
  author =       "B. Blakley and G. R. Blakley",
  title =        "All sail, no anchor {II}: Acceptable high-end {PKI}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "2",
  number =       "2",
  pages =        "66--77",
  month =        jan,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-003-0029-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:22 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-003-0029-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Russell:2004:TBR,
  author =       "Selwyn Russell",
  title =        "Theory and benefits of recursive certificate
                 structures",
  journal =      j-INT-J-INFO-SEC,
  volume =       "2",
  number =       "2",
  pages =        "78--90",
  month =        jan,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-003-0028-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:22 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-003-0028-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Lopez:2004:PDB,
  author =       "Javier Lopez and Antonio Ma{\~n}a and Jose A.
                 Montenegro and Juan J. Ortega",
  title =        "{PKI} design based on the use of on-line certification
                 authorities",
  journal =      j-INT-J-INFO-SEC,
  volume =       "2",
  number =       "2",
  pages =        "91--102",
  month =        jan,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-003-0027-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:22 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-003-0027-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Laih:2004:GVR,
  author =       "C. S. Laih and K. Y. Chen",
  title =        "Generating visible {RSA} public keys for {PKI}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "2",
  number =       "2",
  pages =        "103--109",
  month =        jan,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-003-0030-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:22 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-003-0030-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Munoz:2004:CRS,
  author =       "Jose L. Mu{\~n}oz and Jordi Forne and Oscar Esparza
                 and Miguel Soriano",
  title =        "Certificate revocation system implementation based on
                 the {Merkle} hash tree",
  journal =      j-INT-J-INFO-SEC,
  volume =       "2",
  number =       "2",
  pages =        "110--124",
  month =        jan,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-003-0026-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:22 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/hash.bib;
                 http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-003-0026-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Priami:2004:PSI,
  author =       "Corrado Priami",
  title =        "Preface to the special issue on {Security in Global
                 Computing}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "2",
  number =       "3--4",
  pages =        "125--125",
  month =        aug,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0034-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:23 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0034-z;
                 http://link.springer.com/content/pdf/10.1007/s10207-004-0034-z.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Teller:2004:UAC,
  author =       "David Teller and Pascal Zimmer and Daniel Hirschkoff",
  title =        "Using ambients to control resources",
  journal =      j-INT-J-INFO-SEC,
  volume =       "2",
  number =       "3--4",
  pages =        "126--144",
  month =        aug,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0035-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:23 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0035-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Buchholtz:2004:CCF,
  author =       "Mikael Buchholtz and Hanne Riis Nielson and Flemming
                 Nielson",
  title =        "A calculus for control flow analysis of security
                 protocols",
  journal =      j-INT-J-INFO-SEC,
  volume =       "2",
  number =       "3--4",
  pages =        "145--167",
  month =        aug,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0036-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:23 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0036-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Gorrieri:2004:AAT,
  author =       "Roberto Gorrieri and Ruggero Lanotte and Andrea
                 Maggiolo-Schettini and Fabio Martinelli and Simone Tini
                 and Enrico Tronci",
  title =        "Automated analysis of timed security: a case study on
                 web privacy",
  journal =      j-INT-J-INFO-SEC,
  volume =       "2",
  number =       "3--4",
  pages =        "168--186",
  month =        aug,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0037-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:23 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0037-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bartoletti:2004:SIS,
  author =       "Massimo Bartoletti and Pierpaolo Degano and Gian Luigi
                 Ferrari",
  title =        "Stack inspection and secure program transformations",
  journal =      j-INT-J-INFO-SEC,
  volume =       "2",
  number =       "3--4",
  pages =        "187--217",
  month =        aug,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0038-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:23 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0038-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{MacKenzie:2004:TPG,
  author =       "Philip MacKenzie and Michael K. Reiter",
  title =        "Two-party generation of {DSA} signatures",
  journal =      j-INT-J-INFO-SEC,
  volume =       "2",
  number =       "3--4",
  pages =        "218--239",
  month =        aug,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0041-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:23 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0041-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Waidner:2004:P,
  author =       "Michael Waidner",
  title =        "Preface",
  journal =      j-INT-J-INFO-SEC,
  volume =       "3",
  number =       "1",
  pages =        "1--1",
  month =        oct,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0051-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:23 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0051-y;
                 http://link.springer.com/content/pdf/10.1007/s10207-004-0051-y.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Hopcroft:2004:ASA,
  author =       "Philippa Hopcroft and Gavin Lowe",
  title =        "Analysing a stream authentication protocol using model
                 checking",
  journal =      j-INT-J-INFO-SEC,
  volume =       "3",
  number =       "1",
  pages =        "2--13",
  month =        oct,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0040-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:23 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0040-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Biskup:2004:CQE,
  author =       "Joachim Biskup and Piero Bonatti",
  title =        "Controlled query evaluation for enforcing
                 confidentiality in complete information systems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "3",
  number =       "1",
  pages =        "14--27",
  month =        oct,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0032-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:23 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0032-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Smith:2004:OAP,
  author =       "Sean W. Smith",
  title =        "Outbound authentication for programmable secure
                 coprocessors",
  journal =      j-INT-J-INFO-SEC,
  volume =       "3",
  number =       "1",
  pages =        "28--41",
  month =        oct,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0033-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:23 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0033-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Backes:2004:CPN,
  author =       "Michael Backes and Birgit Pfitzmann",
  title =        "Computational probabilistic noninterference",
  journal =      j-INT-J-INFO-SEC,
  volume =       "3",
  number =       "1",
  pages =        "42--60",
  month =        oct,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0039-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:23 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0039-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Daza:2004:PUI,
  author =       "Vanesa Daza and Javier Herranz and Germ{\'a}n
                 S{\'a}ez",
  title =        "Protocols useful on the {Internet} from distributed
                 signature schemes",
  journal =      j-INT-J-INFO-SEC,
  volume =       "3",
  number =       "2",
  pages =        "61--69",
  month =        nov,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0043-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:23 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0043-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Burgess:2004:GTM,
  author =       "Mark Burgess and Geoffrey Canright and Kenth
                 Eng{\o}-Monsen",
  title =        "A graph-theoretical model of computer security",
  journal =      j-INT-J-INFO-SEC,
  volume =       "3",
  number =       "2",
  pages =        "70--85",
  month =        nov,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0044-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:23 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0044-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Hitchcock:2004:ESM,
  author =       "Yvonne Hitchcock and Paul Montague and Gary Carter and
                 Ed Dawson",
  title =        "The efficiency of solving multiple discrete logarithm
                 problems and the implications for the security of fixed
                 elliptic curves",
  journal =      j-INT-J-INFO-SEC,
  volume =       "3",
  number =       "2",
  pages =        "86--98",
  month =        nov,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0045-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:23 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0045-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Mana:2004:FSE,
  author =       "Antonio Ma{\~n}a and Javier Lopez and Juan J. Ortega
                 and Ernesto Pimentel and Jose M. Troya",
  title =        "A framework for secure execution of software",
  journal =      j-INT-J-INFO-SEC,
  volume =       "3",
  number =       "2",
  pages =        "99--112",
  month =        nov,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0048-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:23 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0048-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Abie:2004:DDR,
  author =       "Habtamu Abie and P{\aa}l Spilling and Bent Foyn",
  title =        "A distributed digital rights management model for
                 secure information-distribution systems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "3",
  number =       "2",
  pages =        "113--128",
  month =        nov,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0058-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:23 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0058-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Autexier:2005:PSI,
  author =       "Serge Autexier and Iliano Cervesato and Heiko Mantel",
  title =        "Preface to the special issue of selected papers from
                 {FCS\slash VERIFY 2002}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "4",
  number =       "1--2",
  pages =        "1--1",
  month =        feb,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0053-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:24 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0053-9;
                 http://link.springer.com/content/pdf/10.1007/s10207-004-0053-9.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Ligatti:2005:EAE,
  author =       "Jay Ligatti and Lujo Bauer and David Walker",
  title =        "Edit automata: enforcement mechanisms for run-time
                 security policies",
  journal =      j-INT-J-INFO-SEC,
  volume =       "4",
  number =       "1--2",
  pages =        "2--16",
  month =        feb,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0046-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:24 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0046-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bella:2005:OVS,
  author =       "Giampaolo Bella and Fabio Massacci and Lawrence C.
                 Paulson",
  title =        "An overview of the verification of {SET}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "4",
  number =       "1--2",
  pages =        "17--28",
  month =        feb,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0047-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:24 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0047-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Guttman:2005:RAN,
  author =       "Joshua D. Guttman and Amy L. Herzog",
  title =        "Rigorous automated network security management",
  journal =      j-INT-J-INFO-SEC,
  volume =       "4",
  number =       "1--2",
  pages =        "29--48",
  month =        feb,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0052-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:24 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0052-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kusters:2005:DCP,
  author =       "Ralf K{\"u}sters",
  title =        "On the decidability of cryptographic protocols with
                 open-ended data structures",
  journal =      j-INT-J-INFO-SEC,
  volume =       "4",
  number =       "1--2",
  pages =        "49--70",
  month =        feb,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0050-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:24 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0050-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Lye:2005:GSN,
  author =       "Kong-wei Lye and Jeannette M. Wing",
  title =        "Game strategies in network security",
  journal =      j-INT-J-INFO-SEC,
  volume =       "4",
  number =       "1--2",
  pages =        "71--86",
  month =        feb,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0060-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:24 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0060-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Skalka:2005:SUB,
  author =       "Christian Skalka and Scott Smith",
  title =        "Static use-based object confinement",
  journal =      j-INT-J-INFO-SEC,
  volume =       "4",
  number =       "1--2",
  pages =        "87--104",
  month =        feb,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0049-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:24 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0049-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Lhee:2005:DFB,
  author =       "Kyung-suk Lhee and Steve J. Chapin",
  title =        "Detection of file-based race conditions",
  journal =      j-INT-J-INFO-SEC,
  volume =       "4",
  number =       "1--2",
  pages =        "105--119",
  month =        feb,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0068-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:24 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0068-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bai:2005:SAP,
  author =       "Yun Bai and Yan Zhang and Vijay Varadharajan",
  title =        "On the sequence of authorization policy
                 transformations",
  journal =      j-INT-J-INFO-SEC,
  volume =       "4",
  number =       "1--2",
  pages =        "120--131",
  month =        feb,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0069-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:24 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0069-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Snekkenes:2005:PSI,
  author =       "Einar Snekkenes",
  title =        "Preface to the special issue on {ESORICS 2003}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "4",
  number =       "3",
  pages =        "133--134",
  month =        jun,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0054-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:24 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0054-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Backes:2005:SAS,
  author =       "Michael Backes and Birgit Pfitzmann and Michael
                 Waidner",
  title =        "Symmetric authentication in a simulatable
                 {Dolev--Yao}-style cryptographic library",
  journal =      j-INT-J-INFO-SEC,
  volume =       "4",
  number =       "3",
  pages =        "135--154",
  month =        jun,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0056-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:24 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0056-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{vonOheimb:2005:ASM,
  author =       "David von Oheimb and Volkmar Lotz and Georg Walter",
  title =        "Analyzing {SLE 88} memory management security using
                 {Interacting State Machines}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "4",
  number =       "3",
  pages =        "155--171",
  month =        jun,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0057-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:24 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0057-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Serjantov:2005:PAA,
  author =       "Andrei Serjantov and Peter Sewell",
  title =        "Passive-attack analysis for connection-based anonymity
                 systems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "4",
  number =       "3",
  pages =        "172--180",
  month =        jun,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0059-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:24 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0059-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Basin:2005:OSM,
  author =       "David Basin and Sebastian M{\"o}dersheim and Luca
                 Vigan{\`o}",
  title =        "{OFMC}: A symbolic model checker for security
                 protocols",
  journal =      j-INT-J-INFO-SEC,
  volume =       "4",
  number =       "3",
  pages =        "181--208",
  month =        jun,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0055-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:24 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0055-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Trostle:2005:TIS,
  author =       "Jonathan Trostle and Bill Gossman",
  title =        "Techniques for improving the security and
                 manageability of {IPsec} policy",
  journal =      j-INT-J-INFO-SEC,
  volume =       "4",
  number =       "3",
  pages =        "209--226",
  month =        jun,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0064-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:24 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0064-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Boyd:2005:PSI,
  author =       "Colin Boyd and Wenbo Mao",
  title =        "Preface to the special issue on {ISC 2003}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "4",
  number =       "4",
  pages =        "227--227",
  month =        oct,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0066-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:25 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0066-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Galindo:2005:FOH,
  author =       "David Galindo and Sebasti{\`a} Mart{\'\i}n and Paz
                 Morillo and Jorge L. Villar",
  title =        "{Fujisaki--Okamoto} hybrid encryption revisited",
  journal =      j-INT-J-INFO-SEC,
  volume =       "4",
  number =       "4",
  pages =        "228--241",
  month =        oct,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0042-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:25 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0042-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Backes:2005:RSS,
  author =       "Michael Backes and Birgit Pfitzmann and Michael
                 Waidner",
  title =        "Reactively secure signature schemes",
  journal =      j-INT-J-INFO-SEC,
  volume =       "4",
  number =       "4",
  pages =        "242--252",
  month =        oct,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0062-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:25 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0062-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Gurgens:2005:SFN,
  author =       "Sigrid G{\"u}rgens and Carsten Rudolph and Holger
                 Vogt",
  title =        "On the security of fair non-repudiation protocols",
  journal =      j-INT-J-INFO-SEC,
  volume =       "4",
  number =       "4",
  pages =        "253--262",
  month =        oct,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0063-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:25 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0063-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Baldwin:2005:ESA,
  author =       "Adrian Baldwin and Simon Shiu",
  title =        "Enabling shared audit data",
  journal =      j-INT-J-INFO-SEC,
  volume =       "4",
  number =       "4",
  pages =        "263--276",
  month =        oct,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0061-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:25 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0061-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Atallah:2005:SOS,
  author =       "Mikhail J. Atallah and Jiangtao Li",
  title =        "Secure outsourcing of sequence comparisons",
  journal =      j-INT-J-INFO-SEC,
  volume =       "4",
  number =       "4",
  pages =        "277--287",
  month =        oct,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-005-0070-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:25 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-005-0070-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Itakura:2005:PMB,
  author =       "Yukio Itakura and Shigeo Tsujii",
  title =        "Proposal on a multifactor biometric authentication
                 method based on cryptosystem keys containing biometric
                 signatures",
  journal =      j-INT-J-INFO-SEC,
  volume =       "4",
  number =       "4",
  pages =        "288--296",
  month =        oct,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0065-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:25 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0065-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Gritzalis:2006:PKI,
  author =       "Stefanos Gritzalis",
  title =        "{Public Key Infrastructure}: Research and
                 Applications",
  journal =      j-INT-J-INFO-SEC,
  volume =       "5",
  number =       "1",
  pages =        "1--2",
  month =        jan,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-005-0075-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:25 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-005-0075-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Vanrenen:2006:DSM,
  author =       "Gabriel Vanrenen and Sean Smith and John Marchesini",
  title =        "Distributing security-mediated {PKI}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "5",
  number =       "1",
  pages =        "3--17",
  month =        jan,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-005-0076-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:25 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-005-0076-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Lioy:2006:PPP,
  author =       "Antonio Lioy and Marius Marian and Natalia Moltchanova
                 and Massimiliano Pala",
  title =        "{PKI} past, present and future",
  journal =      j-INT-J-INFO-SEC,
  volume =       "5",
  number =       "1",
  pages =        "18--29",
  month =        jan,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-005-0077-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:25 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-005-0077-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bohli:2006:KSA,
  author =       "Jens-Matthias Bohli and Stefan R{\"o}hrich and Rainer
                 Steinwandt",
  title =        "Key substitution attacks revisited: Taking into
                 account malicious signers",
  journal =      j-INT-J-INFO-SEC,
  volume =       "5",
  number =       "1",
  pages =        "30--36",
  month =        jan,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-005-0071-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:25 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-005-0071-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Zhou:2006:MTI,
  author =       "Jianying Zhou and Feng Bao and Robert Deng",
  title =        "Minimizing {TTP}'s involvement in signature
                 validation",
  journal =      j-INT-J-INFO-SEC,
  volume =       "5",
  number =       "1",
  pages =        "37--47",
  month =        jan,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-005-0072-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:25 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-005-0072-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Li:2006:USS,
  author =       "Ninghui Li and John C. Mitchell",
  title =        "Understanding {SPKI\slash SDSI} using first-order
                 logic",
  journal =      j-INT-J-INFO-SEC,
  volume =       "5",
  number =       "1",
  pages =        "48--64",
  month =        jan,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-005-0073-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:25 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-005-0073-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Zhou:2006:P,
  author =       "Jianying Zhou and Javier Lopez",
  title =        "Preface",
  journal =      j-INT-J-INFO-SEC,
  volume =       "5",
  number =       "2",
  pages =        "65--66",
  month =        apr,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-006-0087-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:25 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-006-0087-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Young:2006:CEU,
  author =       "Adam L. Young",
  title =        "Cryptoviral extortion using {Microsoft}'s Crypto
                 {API}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "5",
  number =       "2",
  pages =        "67--76",
  month =        apr,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-006-0082-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:25 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-006-0082-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Sidiroglou:2006:ETD,
  author =       "Stelios Sidiroglou and Angelos D. Keromytis",
  title =        "Execution transactions for defending against software
                 failures: use and evaluation",
  journal =      j-INT-J-INFO-SEC,
  volume =       "5",
  number =       "2",
  pages =        "77--91",
  month =        apr,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-006-0083-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:25 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-006-0083-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Nali:2006:HTB,
  author =       "Deholo Nali and Carlisle Adams and Ali Miri",
  title =        "Hierarchical time-based information release",
  journal =      j-INT-J-INFO-SEC,
  volume =       "5",
  number =       "2",
  pages =        "92--104",
  month =        apr,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-006-0084-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:25 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-006-0084-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Chakrabarti:2006:KPD,
  author =       "Dibyendu Chakrabarti and Subhamoy Maitra and Bimal
                 Roy",
  title =        "A key pre-distribution scheme for wireless sensor
                 networks: merging blocks in combinatorial design",
  journal =      j-INT-J-INFO-SEC,
  volume =       "5",
  number =       "2",
  pages =        "105--114",
  month =        apr,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-006-0085-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:25 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-006-0085-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Yeo:2006:SWE,
  author =       "Gary S.-W. Yeo and Raphael C.-W. Phan",
  title =        "On the security of the {WinRAR} encryption feature",
  journal =      j-INT-J-INFO-SEC,
  volume =       "5",
  number =       "2",
  pages =        "115--123",
  month =        apr,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-006-0086-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:25 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-006-0086-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Mayer:2006:OFA,
  author =       "Alain Mayer and Avishai Wool and Elisha Ziskind",
  title =        "Offline firewall analysis",
  journal =      j-INT-J-INFO-SEC,
  volume =       "5",
  number =       "3",
  pages =        "125--144",
  month =        jul,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-005-0074-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:26 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-005-0074-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Crescini:2006:PSD,
  author =       "Vino Fernando Crescini and Yan Zhang",
  title =        "{PolicyUpdater}: a system for dynamic access control",
  journal =      j-INT-J-INFO-SEC,
  volume =       "5",
  number =       "3",
  pages =        "145--165",
  month =        jul,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-005-0078-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:26 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-005-0078-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Tsunoo:2006:ICA,
  author =       "Yukiyasu Tsunoo and Etsuko Tsujihara and Maki Shigeri
                 and Hiroyasu Kubo and Kazuhiko Minematsu",
  title =        "Improving cache attacks by considering cipher
                 structure",
  journal =      j-INT-J-INFO-SEC,
  volume =       "5",
  number =       "3",
  pages =        "166--176",
  month =        jul,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-005-0079-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:26 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-005-0079-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Okeya:2006:SAC,
  author =       "Katsuyuki Okeya and Tsuyoshi Takagi",
  title =        "Security analysis of {CRT}-based cryptosystems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "5",
  number =       "3",
  pages =        "177--185",
  month =        jul,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-005-0080-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:26 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-005-0080-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{vanOorschot:2006:MSD,
  author =       "Paul C. van Oorschot and Jean-Marc Robert and Miguel
                 Vargas Martin",
  title =        "A monitoring system for detecting repeated packets
                 with applications to computer worms",
  journal =      j-INT-J-INFO-SEC,
  volume =       "5",
  number =       "3",
  pages =        "186--199",
  month =        jul,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-006-0081-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:26 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-006-0081-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Brandt:2006:HOF,
  author =       "Felix Brandt",
  title =        "How to obtain full privacy in auctions",
  journal =      j-INT-J-INFO-SEC,
  volume =       "5",
  number =       "4",
  pages =        "201--216",
  month =        oct,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-006-0001-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:26 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-006-0001-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Al-Riyami:2006:EFE,
  author =       "S. S. Al-Riyami and J. Malone-Lee and N. P. Smart",
  title =        "Escrow-free encryption supporting cryptographic
                 workflow",
  journal =      j-INT-J-INFO-SEC,
  volume =       "5",
  number =       "4",
  pages =        "217--229",
  month =        oct,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-006-0002-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:26 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-006-0002-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Ding:2006:CNT,
  author =       "Jintai Ding and Dieter Schmidt and Zhijun Yin",
  title =        "Cryptanalysis of the new {TTS} scheme in {CHES 2004}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "5",
  number =       "4",
  pages =        "231--240",
  month =        oct,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-006-0003-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:26 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-006-0003-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Nguyen:2006:VSF,
  author =       "Lan Nguyen and Rei Safavi-Naini and Kaoru Kurosawa",
  title =        "Verifiable shuffles: a formal model and a
                 Paillier-based three-round construction with provable
                 security",
  journal =      j-INT-J-INFO-SEC,
  volume =       "5",
  number =       "4",
  pages =        "241--255",
  month =        oct,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-006-0004-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:26 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-006-0004-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Giorgini:2006:RET,
  author =       "Paolo Giorgini and Fabio Massacci and John Mylopoulos
                 and Nicola Zannone",
  title =        "Requirements engineering for trust management: model,
                 methodology, and reasoning",
  journal =      j-INT-J-INFO-SEC,
  volume =       "5",
  number =       "4",
  pages =        "257--274",
  month =        oct,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-006-0005-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:26 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-006-0005-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Clarke:2007:AMP,
  author =       "N. L. Clarke and S. M. Furnell",
  title =        "Authenticating mobile phone users using keystroke
                 analysis",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "1",
  pages =        "1--14",
  month =        jan,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-006-0006-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:26 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-006-0006-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Blundo:2007:LRC,
  author =       "Carlo Blundo and Clemente Galdi and Giuseppe
                 Persiano",
  title =        "Low-randomness constant-round private {XOR}
                 computations",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "1",
  pages =        "15--26",
  month =        jan,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-006-0007-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:26 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-006-0007-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Wang:2007:HDA,
  author =       "Shujing Wang and Yan Zhang",
  title =        "Handling distributed authorization with delegation
                 through answer set programming",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "1",
  pages =        "27--46",
  month =        jan,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-006-0008-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:26 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-006-0008-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Konstantinou:2007:EGS,
  author =       "Elisavet Konstantinou and Yannis C. Stamatiou and
                 Christos Zaroliagis",
  title =        "Efficient generation of secure elliptic curves",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "1",
  pages =        "47--63",
  month =        jan,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-006-0009-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:26 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-006-0009-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Dimitrakos:2007:GEP,
  author =       "Theo Dimitrakos and Fabio Martinelli and Peter Y. A.
                 Ryan and Steve Schneider",
  title =        "{Guest Editors}' Preface",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "2--3",
  pages =        "65--66",
  month =        mar,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0012-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:27 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0012-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Zheng:2007:DSL,
  author =       "Lantian Zheng and Andrew C. Myers",
  title =        "Dynamic security labels and static information flow
                 control",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "2--3",
  pages =        "67--84",
  month =        mar,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0019-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:27 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0019-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{DeFrancesco:2007:ILS,
  author =       "Nicoletta {De Francesco} and Luca Martini",
  title =        "Instruction-level security typing by abstract
                 interpretation",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "2--3",
  pages =        "85--106",
  month =        mar,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0015-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:27 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0015-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kopf:2007:TTU,
  author =       "Boris K{\"o}pf and Heiko Mantel",
  title =        "Transformational typing and unification for
                 automatically correcting insecure programs",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "2--3",
  pages =        "107--131",
  month =        mar,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0016-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:27 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0016-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Cederquist:2007:ABC,
  author =       "J. G. Cederquist and R. Corin and M. A. C. Dekker and
                 S. Etalle and J. I. den Hartog and G. Lenzini",
  title =        "Audit-based compliance control",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "2--3",
  pages =        "133--151",
  month =        mar,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0017-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:27 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0017-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Krukow:2007:TS,
  author =       "Karl Krukow and Mogens Nielsen",
  title =        "Trust structures",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "2--3",
  pages =        "153--181",
  month =        mar,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0014-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:27 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0014-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Delicata:2007:AAV,
  author =       "Rob Delicata and Steve Schneider",
  title =        "An algebraic approach to the verification of a class
                 of {Diffie--Hellman} protocols",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "2--3",
  pages =        "183--196",
  month =        mar,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0013-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:27 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0013-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Gritzalis:2007:PMO,
  author =       "S. Gritzalis and A. N. Yannacopoulos and C.
                 Lambrinoudakis and P. Hatzopoulos and S. K. Katsikas",
  title =        "A probabilistic model for optimal insurance contracts
                 against security risks and privacy violation in {IT}
                 outsourcing environments",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "4",
  pages =        "197--211",
  month =        jul,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-006-0010-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:27 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-006-0010-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Chen:2007:IBK,
  author =       "L. Chen and Z. Cheng and N. P. Smart",
  title =        "Identity-based key agreement protocols from pairings",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "4",
  pages =        "213--241",
  month =        jul,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-006-0011-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:27 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-006-0011-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bohli:2007:SGK,
  author =       "Jens-Matthias Bohli and Mar{\'\i}a Isabel Gonz{\'a}lez
                 Vasco and Rainer Steinwandt",
  title =        "Secure group key establishment revisited",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "4",
  pages =        "243--254",
  month =        jul,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0018-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:27 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0018-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bertino:2007:SSP,
  author =       "Elisa Bertino and Elena Ferrari and Federica Paci and
                 Loredana Parasiliti Provenza",
  title =        "A system for securing push-based distribution of {XML}
                 documents",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "4",
  pages =        "255--284",
  month =        jul,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0020-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:27 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0020-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Knight:2007:IJI,
  author =       "Scott Knight and Scott Buffett and Patrick C. K.
                 Hung",
  title =        "The {{\booktitle{International Journal of Information
                 Security}}} Special Issue on privacy, security and
                 trust technologies and E-business services",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "5",
  pages =        "285--286",
  month =        sep,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0036-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:27 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0036-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Wu:2007:RFT,
  author =       "Zhengping Wu and Alfred C. Weaver",
  title =        "Requirements of federated trust management for
                 service-oriented architectures",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "5",
  pages =        "287--296",
  month =        sep,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0027-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:27 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0027-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Liu:2007:ICR,
  author =       "Jinshan Liu and Val{\'e}rie Issarny",
  title =        "An incentive compatible reputation mechanism for
                 ubiquitous computing environments",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "5",
  pages =        "297--311",
  month =        sep,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0029-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:27 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0029-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Levin:2007:WSL,
  author =       "Avner Levin",
  title =        "Is workplace surveillance legal in {Canada}?",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "5",
  pages =        "313--321",
  month =        sep,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0026-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:27 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0026-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Lauer:2007:BOT,
  author =       "Thomas W. Lauer and Xiaodong Deng",
  title =        "Building online trust through privacy practices",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "5",
  pages =        "323--331",
  month =        sep,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0028-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:27 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0028-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Zhang:2007:FBT,
  author =       "Jie Zhang and Ali A. Ghorbani and Robin Cohen",
  title =        "A familiarity-based trust model for effective
                 selection of sellers in multiagent e-commerce systems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "5",
  pages =        "333--344",
  month =        sep,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0025-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:27 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0025-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Zulkernine:2007:ISS,
  author =       "Mohammad Zulkernine and Mathews Graves and Muhammad
                 Umair Ahmed Khan",
  title =        "Integrating software specifications into intrusion
                 detection",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "5",
  pages =        "345--357",
  month =        sep,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0023-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:27 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0023-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Backes:2007:P,
  author =       "Michael Backes and Stefanos Gritzalis and Bart
                 Preneel",
  title =        "Preface",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "6",
  pages =        "359--360",
  month =        oct,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0034-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:28 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0034-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Anagnostakis:2007:CDR,
  author =       "Kostas G. Anagnostakis and Michael B. Greenwald and
                 Sotiris Ioannidis and Angelos D. Keromytis",
  title =        "{COVERAGE}: detecting and reacting to worm epidemics
                 using cooperation and validation",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "6",
  pages =        "361--378",
  month =        oct,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0032-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:28 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0032-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bononi:2007:IDS,
  author =       "Luciano Bononi and Carlo Tacconi",
  title =        "Intrusion detection for secure clustering and routing
                 in {Mobile Multi-hop Wireless Networks}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "6",
  pages =        "379--392",
  month =        oct,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0035-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:28 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0035-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Danezis:2007:BFM,
  author =       "George Danezis",
  title =        "Breaking four mix-related schemes based on {Universal
                 Re-encryption}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "6",
  pages =        "393--402",
  month =        oct,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0033-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:28 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0033-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
  keywords =     "Anonymous communications; El-Gamal encryption; rWonGoo
                 anonymous channel; Traffic analysis; Universal
                 re-encryption",
  remark =       "From the abstract: ``Universal Re-encryption allows
                 El-Gamal ciphertexts to be re-encrypted without
                 knowledge of their corresponding public keys. This has
                 made it an enticing building block for anonymous
                 communications protocols. \ldots{} [we] find serious
                 weaknesses in all of them.''",
}

@Article{Esponda:2007:PDP,
  author =       "Fernando Esponda and Elena S. Ackley and Paul Helman
                 and Haixia Jia and Stephanie Forrest",
  title =        "Protecting data privacy through hard-to-reverse
                 negative databases",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "6",
  pages =        "403--415",
  month =        oct,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0030-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:28 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0030-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Klinkoff:2007:ENS,
  author =       "Patrick Klinkoff and Engin Kirda and Christopher
                 Kruegel and Giovanni Vigna",
  title =        "Extending {.NET} security to unmanaged code",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "6",
  pages =        "417--428",
  month =        oct,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0031-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:28 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0031-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Degano:2008:P,
  author =       "Pierpaolo Degano and Luca Vigan{\`o}",
  title =        "Preface",
  journal =      j-INT-J-INFO-SEC,
  volume =       "7",
  number =       "1",
  pages =        "1--1",
  month =        jan,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0038-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:28 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0038-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Armando:2008:SBM,
  author =       "Alessandro Armando and Luca Compagna",
  title =        "{SAT}-based model-checking for security protocols
                 analysis",
  journal =      j-INT-J-INFO-SEC,
  volume =       "7",
  number =       "1",
  pages =        "3--32",
  month =        jan,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0041-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:28 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0041-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Backes:2008:LBU,
  author =       "Michael Backes and Birgit Pfitzmann",
  title =        "Limits of the {BRSIM\slash UC} soundness of
                 {Dolev--Yao}-style {XOR}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "7",
  number =       "1",
  pages =        "33--54",
  month =        jan,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0040-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:28 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0040-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bracciali:2008:SFM,
  author =       "Andrea Bracciali and Gianluigi Ferrari and Emilio
                 Tuosto",
  title =        "A symbolic framework for multi-faceted security
                 protocol analysis",
  journal =      j-INT-J-INFO-SEC,
  volume =       "7",
  number =       "1",
  pages =        "55--84",
  month =        jan,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0043-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:28 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0043-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Estevez-Tapiador:2008:BRE,
  author =       "Juan M. Estevez-Tapiador and Almudena Alcaide and
                 Julio C. Hernandez-Castro and Arturo Ribagorda",
  title =        "{Bayesian} rational exchange",
  journal =      j-INT-J-INFO-SEC,
  volume =       "7",
  number =       "1",
  pages =        "85--100",
  month =        jan,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0039-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:28 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0039-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Gollmann:2008:E,
  author =       "Dieter Gollmann",
  title =        "Editorial",
  journal =      j-INT-J-INFO-SEC,
  volume =       "7",
  number =       "2",
  pages =        "101--101",
  month =        apr,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0052-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:28 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0052-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Alfaro:2008:CAC,
  author =       "J. G. Alfaro and N. Boulahia-Cuppens and F. Cuppens",
  title =        "Complete analysis of configuration rules to guarantee
                 reliable network security policies",
  journal =      j-INT-J-INFO-SEC,
  volume =       "7",
  number =       "2",
  pages =        "103--122",
  month =        apr,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0045-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:28 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0045-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Crampton:2008:DRB,
  author =       "Jason Crampton and Hemanth Khambhammettu",
  title =        "Delegation in role-based access control",
  journal =      j-INT-J-INFO-SEC,
  volume =       "7",
  number =       "2",
  pages =        "123--136",
  month =        apr,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0044-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:28 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0044-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Fong:2008:DCC,
  author =       "Philip W. L. Fong",
  title =        "Discretionary capability confinement",
  journal =      j-INT-J-INFO-SEC,
  volume =       "7",
  number =       "2",
  pages =        "137--154",
  month =        apr,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0047-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:28 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0047-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Backes:2008:CRS,
  author =       "Michael Backes and Markus D{\"u}rmuth and Dennis
                 Hofheinz and Ralf K{\"u}sters",
  title =        "Conditional reactive simulatability",
  journal =      j-INT-J-INFO-SEC,
  volume =       "7",
  number =       "2",
  pages =        "155--169",
  month =        apr,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0046-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:28 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0046-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Huang:2008:SUD,
  author =       "Xinyi Huang and Willy Susilo and Yi Mu and Wei Wu",
  title =        "Secure universal designated verifier signature without
                 random oracles",
  journal =      j-INT-J-INFO-SEC,
  volume =       "7",
  number =       "3",
  pages =        "171--183",
  month =        jun,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0021-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:29 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0021-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Chen:2008:IID,
  author =       "Pei-Te Chen and Chi-Sung Laih",
  title =        "{IDSIC}: an intrusion detection system with
                 identification capability",
  journal =      j-INT-J-INFO-SEC,
  volume =       "7",
  number =       "3",
  pages =        "185--197",
  month =        jun,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0024-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:29 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0024-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Biskup:2008:KSI,
  author =       "Joachim Biskup and Torben Weibert",
  title =        "Keeping secrets in incomplete databases",
  journal =      j-INT-J-INFO-SEC,
  volume =       "7",
  number =       "3",
  pages =        "199--217",
  month =        jun,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0037-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:29 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0037-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Aldini:2008:EMI,
  author =       "Alessandro Aldini and Alessandra {Di Pierro}",
  title =        "Estimating the maximum information leakage",
  journal =      j-INT-J-INFO-SEC,
  volume =       "7",
  number =       "3",
  pages =        "219--242",
  month =        jun,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0050-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:29 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0050-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Wang:2008:MLF,
  author =       "XiaoFeng Wang and Michael K. Reiter",
  title =        "A multi-layer framework for puzzle-based
                 denial-of-service defense",
  journal =      j-INT-J-INFO-SEC,
  volume =       "7",
  number =       "4",
  pages =        "243--263",
  month =        aug,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0042-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:29 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0042-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Tartary:2008:CAM,
  author =       "Christophe Tartary and Huaxiong Wang and Josef
                 Pieprzyk",
  title =        "A coding approach to the multicast stream
                 authentication problem",
  journal =      j-INT-J-INFO-SEC,
  volume =       "7",
  number =       "4",
  pages =        "265--283",
  month =        aug,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0048-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:29 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0048-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Cuppens:2008:MCS,
  author =       "Fr{\'e}d{\'e}ric Cuppens and Nora Cuppens-Boulahia",
  title =        "Modeling contextual security policies",
  journal =      j-INT-J-INFO-SEC,
  volume =       "7",
  number =       "4",
  pages =        "285--305",
  month =        aug,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0051-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:29 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0051-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Aimeur:2008:LPP,
  author =       "Esma A{\"\i}meur and Gilles Brassard and Jos{\'e} M.
                 Fernandez and Flavien Serge Mani Onana",
  title =        "{{\sc Alambic}}: a privacy-preserving recommender
                 system for electronic commerce",
  journal =      j-INT-J-INFO-SEC,
  volume =       "7",
  number =       "5",
  pages =        "307--334",
  month =        oct,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0049-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:29 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0049-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Corbett:2008:PCW,
  author =       "Cherita L. Corbett and Raheem A. Beyah and John A.
                 Copeland",
  title =        "Passive classification of wireless {NICs} during
                 active scanning",
  journal =      j-INT-J-INFO-SEC,
  volume =       "7",
  number =       "5",
  pages =        "335--348",
  month =        oct,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0053-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:29 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0053-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Dent:2008:SCE,
  author =       "Alexander W. Dent",
  title =        "A survey of certificateless encryption schemes and
                 security models",
  journal =      j-INT-J-INFO-SEC,
  volume =       "7",
  number =       "5",
  pages =        "349--377",
  month =        oct,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-008-0055-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:29 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-008-0055-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Zhao:2008:NAP,
  author =       "Chang-An Zhao and Fangguo Zhang and Jiwu Huang",
  title =        "A note on the {Ate} pairing",
  journal =      j-INT-J-INFO-SEC,
  volume =       "7",
  number =       "6",
  pages =        "379--382",
  month =        nov,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-008-0054-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:30 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-008-0054-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Imamoto:2008:AEC,
  author =       "Kenji Imamoto and Jianying Zhou and Kouichi Sakurai",
  title =        "Achieving evenhandedness in certified email system for
                 contract signing",
  journal =      j-INT-J-INFO-SEC,
  volume =       "7",
  number =       "6",
  pages =        "383--394",
  month =        nov,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-008-0056-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:30 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-008-0056-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Balopoulos:2008:SIP,
  author =       "Theodoros Balopoulos and Stefanos Gritzalis and
                 Sokratis K. Katsikas",
  title =        "Specifying and implementing privacy-preserving
                 cryptographic protocols",
  journal =      j-INT-J-INFO-SEC,
  volume =       "7",
  number =       "6",
  pages =        "395--420",
  month =        nov,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-008-0057-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:30 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-008-0057-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bryans:2008:OGT,
  author =       "Jeremy W. Bryans and Maciej Koutny and Laurent
                 Mazar{\'e} and Peter Y. A. Ryan",
  title =        "Opacity generalised to transition systems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "7",
  number =       "6",
  pages =        "421--435",
  month =        nov,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-008-0058-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:30 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-008-0058-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Lu:2009:RKR,
  author =       "Jiqiang Lu",
  title =        "Related-key rectangle attack on 36 rounds of the
                 {XTEA} block cipher",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "1",
  pages =        "1--11",
  month =        feb,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-008-0059-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:30 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-008-0059-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Yoshino:2009:BMM,
  author =       "Masayuki Yoshino and Katsuyuki Okeya and Camille
                 Vuillaume",
  title =        "Bipartite modular multiplication with twice the
                 bit-length of multipliers",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "1",
  pages =        "13--23",
  month =        feb,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-008-0060-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:30 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-008-0060-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Tian:2009:LSN,
  author =       "Daxin Tian and Yanheng Liu and Yang Xiang",
  title =        "Large-scale network intrusion detection based on
                 distributed learning algorithm",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "1",
  pages =        "25--35",
  month =        feb,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-008-0061-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:30 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-008-0061-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Cheng:2009:CKA,
  author =       "Jiin-Chiou Cheng and Chi-Sung Laih",
  title =        "Conference key agreement protocol with non-interactive
                 fault-tolerance over broadcast network",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "1",
  pages =        "37--48",
  month =        feb,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-008-0062-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:30 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-008-0062-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Mashatan:2009:ITC,
  author =       "Atefeh Mashatan and Douglas R. Stinson",
  title =        "Interactive two-channel message authentication based
                 on {Interactive--Collision Resistant} hash functions",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "1",
  pages =        "49--60",
  month =        feb,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-008-0063-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:30 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2000.bib;
                 http://www.math.utah.edu/pub/tex/bib/hash.bib;
                 http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-008-0063-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
  keywords =     "Interactive--Collision Resistant (ICR) hash function",
}

@Article{Narasimha:2009:PPR,
  author =       "M. Narasimha and J. Solis and G. Tsudik",
  title =        "Privacy-preserving revocation checking",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "1",
  pages =        "61--75",
  month =        feb,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-008-0064-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:30 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-008-0064-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Elmufti:2009:MWS,
  author =       "Kalid Elmufti and Dasun Weerasinghe and M. Rajarajan
                 and Veselin Rakocevic and Sanowar Khan and John A.
                 MacDonald",
  title =        "Mobile {Web} services authentication using {SAML} and
                 {3GPP} generic bootstrapping architecture",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "2",
  pages =        "77--87",
  month =        apr,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-008-0065-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:30 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-008-0065-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Li:2009:DSA,
  author =       "Jiangtao Li and Ninghui Li and XiaoFeng Wang and Ting
                 Yu",
  title =        "Denial of service attacks and defenses in
                 decentralized trust management",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "2",
  pages =        "89--101",
  month =        apr,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-008-0068-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:30 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-008-0068-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Quinn:2009:AAE,
  author =       "Karl Quinn and David Lewis and Declan O'Sullivan and
                 Vincent P. Wade",
  title =        "An analysis of accuracy experiments carried out over
                 of a multi-faceted model of trust",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "2",
  pages =        "103--119",
  month =        apr,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-008-0069-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:30 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-008-0069-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Vasserman:2009:IKN,
  author =       "Eugene Y. Vasserman and Nicholas Hopper and James
                 Tyra",
  title =        "{{\sc SilentKnock}}: practical, provably undetectable
                 authentication",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "2",
  pages =        "121--135",
  month =        apr,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-008-0070-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:30 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-008-0070-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Chadwick:2009:ASX,
  author =       "David W. Chadwick and Sassa Otenko and Tuan Anh
                 Nguyen",
  title =        "Adding support to {XACML} for multi-domain user to
                 user dynamic delegation of authority",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "2",
  pages =        "137--152",
  month =        apr,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-008-0073-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:30 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-008-0073-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Wu:2009:IDV,
  author =       "Yu-Sung Wu and Vinita Apte and Saurabh Bagchi and
                 Sachin Garg and Navjot Singh",
  title =        "Intrusion detection in voice over {IP} environments",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "3",
  pages =        "153--172",
  month =        jun,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-008-0071-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:31 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-008-0071-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kuper:2009:GXS,
  author =       "Gabriel Kuper and Fabio Massacci and Nataliya
                 Rassadko",
  title =        "Generalized {XML} security views",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "3",
  pages =        "173--203",
  month =        jun,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-008-0074-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:31 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-008-0074-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Harn:2009:EIB,
  author =       "Lein Harn and Jian Ren and Changlu Lin",
  title =        "Efficient identity-based {GQ} multisignatures",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "3",
  pages =        "205--210",
  month =        jun,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-008-0072-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:31 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-008-0072-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Cook:2009:EBC,
  author =       "Debra L. Cook and Moti Yung and Angelos D. Keromytis",
  title =        "Elastic block ciphers: method, security and
                 instantiations",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "3",
  pages =        "211--231",
  month =        jun,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-008-0075-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:31 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-008-0075-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Sourour:2009:ESD,
  author =       "Meharouech Sourour and Bouhoula Adel and Abbes Tarek",
  title =        "Ensuring security in depth based on heterogeneous
                 network security technologies",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "4",
  pages =        "233--246",
  month =        aug,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-009-0077-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:31 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-009-0077-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Desoky:2009:LLB,
  author =       "Abdelrahman Desoky",
  title =        "{Listega}: list-based steganography methodology",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "4",
  pages =        "247--261",
  month =        aug,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-009-0079-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:31 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-009-0079-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
  keywords =     "List-Based Steganography Methodology (Listega)",
}

@Article{Lee:2009:RTB,
  author =       "Sangho Lee and Jong Kim and Sung Je Hong",
  title =        "Redistributing time-based rights between consumer
                 devices for content sharing in {DRM} system",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "4",
  pages =        "263--273",
  month =        aug,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-009-0082-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:31 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-009-0082-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Shay:2009:CST,
  author =       "Richard Shay and Elisa Bertino",
  title =        "A comprehensive simulation tool for the analysis of
                 password policies",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "4",
  pages =        "275--289",
  month =        aug,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-009-0084-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:31 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-009-0084-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Koshutanski:2009:EGS,
  author =       "Hristo Koshutanski and Aliaksandr Lazouski and Fabio
                 Martinelli and Paolo Mori",
  title =        "Enhancing grid security by fine-grained behavioral
                 control and negotiation-based authorization",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "4",
  pages =        "291--314",
  month =        aug,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-009-0083-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:31 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-009-0083-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Brickell:2009:SSN,
  author =       "Ernie Brickell and Liqun Chen and Jiangtao Li",
  title =        "Simplified security notions of direct anonymous
                 attestation and a concrete scheme from pairings",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "5",
  pages =        "315--330",
  month =        oct,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-009-0076-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:31 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-009-0076-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Esponda:2009:NRI,
  author =       "Fernando Esponda and Stephanie Forrest and Paul
                 Helman",
  title =        "Negative representations of information",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "5",
  pages =        "331--345",
  month =        oct,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-009-0078-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:31 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-009-0078-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Hasegawa:2009:PFC,
  author =       "Shingo Hasegawa and Shuji Isobe and Hiroki Shizuya and
                 Katsuhiro Tashiro",
  title =        "On the pseudo-freeness and the {CDH} assumption",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "5",
  pages =        "347--355",
  month =        oct,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-009-0087-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:31 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-009-0087-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Geron:2009:CCR,
  author =       "Erel Geron and Avishai Wool",
  title =        "{CRUST}: cryptographic remote untrusted storage
                 without public keys",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "5",
  pages =        "357--377",
  month =        oct,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-009-0081-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:31 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-009-0081-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Qin:2009:SSS,
  author =       "Huawang Qin and Yuewei Dai and Zhiquan Wang",
  title =        "A secret sharing scheme based on $ (t, n) $ threshold
                 and adversary structure",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "5",
  pages =        "379--385",
  month =        oct,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-009-0085-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:31 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-009-0085-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Chiasson:2009:UID,
  author =       "Sonia Chiasson and Alain Forget and Robert Biddle and
                 P. C. van Oorschot",
  title =        "User interface design affects security: patterns in
                 click-based graphical passwords",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "6",
  pages =        "387--398",
  month =        dec,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-009-0080-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:32 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-009-0080-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Hammer:2009:FSC,
  author =       "Christian Hammer and Gregor Snelting",
  title =        "Flow-sensitive, context-sensitive, and
                 object-sensitive information flow control based on
                 program dependence graphs",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "6",
  pages =        "399--422",
  month =        dec,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-009-0086-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:32 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-009-0086-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{An:2009:UIC,
  author =       "Xiangdong An and Dawn Jutla and Nick Cercone and
                 Charnyote Pluempitiwiriyawej and Hai Wang",
  title =        "Uncertain inference control in privacy protection",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "6",
  pages =        "423--431",
  month =        dec,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-009-0088-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:32 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-009-0088-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Sajedi:2009:SSB,
  author =       "Hedieh Sajedi and Mansour Jamzad",
  title =        "Secure steganography based on embedding capacity",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "6",
  pages =        "433--445",
  month =        dec,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-009-0089-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:32 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-009-0089-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Plaga:2009:BKS,
  author =       "Rainer Plaga",
  title =        "Biometric keys: suitable use cases and achievable
                 information content",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "6",
  pages =        "447--454",
  month =        dec,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-009-0090-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:32 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-009-0090-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kozina:2009:MIW,
  author =       "Mario Kozina and Marin Golub and Stjepan Gros",
  title =        "A method for identifying {Web} applications",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "6",
  pages =        "455--467",
  month =        dec,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-009-0092-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:32 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-009-0092-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Zheng:2010:AAB,
  author =       "Ruijuan Zheng and Mingchuan Zhang and Qingtao Wu and
                 Shibao Sun and Jiexin Pu",
  title =        "Analysis and application of {Bio-Inspired Multi-Net
                 Security Model}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "9",
  number =       "1",
  pages =        "1--17",
  month =        feb,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-009-0091-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:32 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-009-0091-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Han:2010:CBI,
  author =       "Shui-Hua Han and Chao-Hsien Chu",
  title =        "Content-based image authentication: current status,
                 issues, and challenges",
  journal =      j-INT-J-INFO-SEC,
  volume =       "9",
  number =       "1",
  pages =        "19--32",
  month =        feb,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-009-0093-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:32 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-009-0093-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Goldschlag:2010:THB,
  author =       "David M. Goldschlag and Stuart G. Stubblebine and Paul
                 F. Syverson",
  title =        "Temporarily hidden bit commitment and lottery
                 applications",
  journal =      j-INT-J-INFO-SEC,
  volume =       "9",
  number =       "1",
  pages =        "33--50",
  month =        feb,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-009-0094-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:32 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-009-0094-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Chakraborty:2010:CDB,
  author =       "Anindya Chakraborty and Arun K. Majumdar and Shamik
                 Sural",
  title =        "A column dependency-based approach for static and
                 dynamic recovery of databases from malicious
                 transactions",
  journal =      j-INT-J-INFO-SEC,
  volume =       "9",
  number =       "1",
  pages =        "51--67",
  month =        feb,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-009-0095-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:32 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-009-0095-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bayly:2010:FBS,
  author =       "Duncan Bayly and Maurice Castro and Arathi Arakala and
                 Jason Jeffers and Kathy Horadam",
  title =        "Fractional biometrics: safeguarding privacy in
                 biometric applications",
  journal =      j-INT-J-INFO-SEC,
  volume =       "9",
  number =       "1",
  pages =        "69--82",
  month =        feb,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-009-0096-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:32 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-009-0096-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bella:2010:PGA,
  author =       "Giampaolo Bella",
  title =        "The principle of guarantee availability for security
                 protocol analysis",
  journal =      j-INT-J-INFO-SEC,
  volume =       "9",
  number =       "2",
  pages =        "83--97",
  month =        apr,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-009-0097-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:32 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-009-0097-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{deAlbuquerque:2010:FVA,
  author =       "Jo{\~a}o Porto de Albuquerque and Heiko Krumm and
                 Paulo L{\'\i}cio de Geus",
  title =        "Formal validation of automated policy refinement in
                 the management of network security systems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "9",
  number =       "2",
  pages =        "99--125",
  month =        apr,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-010-0101-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:32 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-010-0101-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Knudsen:2010:CEA,
  author =       "Lars R. Knudsen and Charlotte V. Miolane",
  title =        "Counting equations in algebraic attacks on block
                 ciphers",
  journal =      j-INT-J-INFO-SEC,
  volume =       "9",
  number =       "2",
  pages =        "127--135",
  month =        apr,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-009-0099-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:32 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-009-0099-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Gauravaram:2010:HFU,
  author =       "Praveen Gauravaram and John Kelsey and Lars R. Knudsen
                 and S{\o}ren S. Thomsen",
  title =        "On hash functions using checksums",
  journal =      j-INT-J-INFO-SEC,
  volume =       "9",
  number =       "2",
  pages =        "137--151",
  month =        apr,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-009-0100-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:32 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/hash.bib;
                 http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-009-0100-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
  remark =       "From the abstract: ``We analyse the security of
                 iterated hash functions that compute an input dependent
                 checksum which is processed as part of the hash
                 computation. We show that a large class of such
                 schemes, including those using non-linear or even
                 one-way checksum functions, is not secure against the
                 second preimage attack of Kelsey and Schneier, the
                 herding attack of Kelsey and Kohno and the
                 multicollision attack of Joux. Our attacks also apply
                 to a large class of cascaded hash functions.''",
}

@Article{Lin:2010:MTE,
  author =       "Ching Lin and Vijay Varadharajan",
  title =        "{MobileTrust}: a trust enhanced security architecture
                 for mobile agent systems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "9",
  number =       "3",
  pages =        "153--178",
  month =        jun,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-009-0098-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:33 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-009-0098-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kundu:2010:DID,
  author =       "Amlan Kundu and Shamik Sural and A. K. Majumdar",
  title =        "Database intrusion detection using sequence
                 alignment",
  journal =      j-INT-J-INFO-SEC,
  volume =       "9",
  number =       "3",
  pages =        "179--191",
  month =        jun,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-010-0102-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:33 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-010-0102-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Buhan:2010:ERC,
  author =       "Ileana Buhan and Jeroen Doumen and Pieter Hartel and
                 Qian Tang and Raymond Veldhuis",
  title =        "Embedding renewable cryptographic keys into noisy
                 data",
  journal =      j-INT-J-INFO-SEC,
  volume =       "9",
  number =       "3",
  pages =        "193--208",
  month =        jun,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-010-0103-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:33 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-010-0103-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Ben-Ghorbel-Talbi:2010:DME,
  author =       "Meriam Ben-Ghorbel-Talbi and Fr{\'e}d{\'e}ric Cuppens
                 and Nora Cuppens-Boulahia and Adel Bouhoula",
  title =        "A delegation model for extended {RBAC}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "9",
  number =       "3",
  pages =        "209--236",
  month =        jun,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-010-0104-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:33 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-010-0104-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Ding:2010:NHA,
  author =       "Xuhua Ding and Yanjiang Yang and Robert H. Deng and
                 Shuhong Wang",
  title =        "A new hardware-assisted {PIR} with {$ O(n) $} shuffle
                 cost",
  journal =      j-INT-J-INFO-SEC,
  volume =       "9",
  number =       "4",
  pages =        "237--252",
  month =        aug,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-010-0105-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:33 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-010-0105-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
  keywords =     "private information retrieval (PIR)",
}

@Article{Lin:2010:ECE,
  author =       "Dan Lin and Prathima Rao and Elisa Bertino and Ninghui
                 Li and Jorge Lobo",
  title =        "{EXAM}: a comprehensive environment for the analysis
                 of access control policies",
  journal =      j-INT-J-INFO-SEC,
  volume =       "9",
  number =       "4",
  pages =        "253--273",
  month =        aug,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-010-0106-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:33 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-010-0106-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Pais:2010:NPR,
  author =       "Alwyn R. Pais and Shankar Joshi",
  title =        "A new probabilistic rekeying method for secure
                 multicast groups",
  journal =      j-INT-J-INFO-SEC,
  volume =       "9",
  number =       "4",
  pages =        "275--286",
  month =        aug,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-010-0108-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:33 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-010-0108-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Liu:2010:EOO,
  author =       "Joseph K. Liu and Joonsang Baek and Jianying Zhou and
                 Yanjiang Yang and Jun Wen Wong",
  title =        "Efficient online\slash offline identity-based
                 signature for wireless sensor network",
  journal =      j-INT-J-INFO-SEC,
  volume =       "9",
  number =       "4",
  pages =        "287--296",
  month =        aug,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-010-0109-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:33 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-010-0109-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Yuen:2010:HCI,
  author =       "Tsz Hon Yuen and Willy Susilo and Yi Mu",
  title =        "How to construct identity-based signatures without the
                 key escrow problem",
  journal =      j-INT-J-INFO-SEC,
  volume =       "9",
  number =       "4",
  pages =        "297--311",
  month =        aug,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-010-0110-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:33 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-010-0110-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Dupasquier:2010:AIL,
  author =       "Beno{\^\i}t Dupasquier and Stefan Burschka and Kieran
                 McLaughlin and Sakir Sezer",
  title =        "Analysis of information leakage from encrypted {Skype}
                 conversations",
  journal =      j-INT-J-INFO-SEC,
  volume =       "9",
  number =       "5",
  pages =        "313--325",
  month =        oct,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-010-0111-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:33 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-010-0111-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Skoric:2010:FDS,
  author =       "Boris Skori{\'c} and Marc X. Makkes",
  title =        "Flowchart description of security primitives for
                 controlled physical unclonable functions",
  journal =      j-INT-J-INFO-SEC,
  volume =       "9",
  number =       "5",
  pages =        "327--335",
  month =        oct,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-010-0113-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:33 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-010-0113-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Sajedi:2010:UCT,
  author =       "Hedieh Sajedi and Mansour Jamzad",
  title =        "Using contourlet transform and cover selection for
                 secure steganography",
  journal =      j-INT-J-INFO-SEC,
  volume =       "9",
  number =       "5",
  pages =        "337--352",
  month =        oct,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-010-0112-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:33 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-010-0112-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Chen:2010:HSS,
  author =       "Haiyong Chen and Hailiang Chen",
  title =        "A hybrid scheme for securing fingerprint templates",
  journal =      j-INT-J-INFO-SEC,
  volume =       "9",
  number =       "5",
  pages =        "353--361",
  month =        oct,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-010-0114-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:33 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-010-0114-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Baek:2010:RAR,
  author =       "Yoo-Jin Baek",
  title =        "Regular $ 2^w$-ary right-to-left exponentiation
                 algorithm with very efficient {DPA} and {FA}
                 countermeasures",
  journal =      j-INT-J-INFO-SEC,
  volume =       "9",
  number =       "5",
  pages =        "363--370",
  month =        oct,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-010-0118-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:33 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-010-0118-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Damgaard:2010:GPP,
  author =       "Ivan Damg{\aa}rd and Mads Jurik and Jesper Buus
                 Nielsen",
  title =        "A generalization of {Paillier}'s public-key system
                 with applications to electronic voting",
  journal =      j-INT-J-INFO-SEC,
  volume =       "9",
  number =       "6",
  pages =        "371--385",
  month =        dec,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-010-0119-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:34 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-010-0119-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{MacKenzie:2010:PAK,
  author =       "Philip MacKenzie and Sarvar Patel and Ram
                 Swaminathan",
  title =        "Password-authenticated key exchange based on {RSA}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "9",
  number =       "6",
  pages =        "387--410",
  month =        dec,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-010-0120-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:34 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-010-0120-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Naor:2010:ETR,
  author =       "Moni Naor and Benny Pinkas",
  title =        "Efficient trace and revoke schemes",
  journal =      j-INT-J-INFO-SEC,
  volume =       "9",
  number =       "6",
  pages =        "411--424",
  month =        dec,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-010-0121-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:34 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-010-0121-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Baumgarten:2011:CSH,
  author =       "Alex Baumgarten and Michael Steffen and Matthew
                 Clausman and Joseph Zambreno",
  title =        "A case study in hardware {Trojan} design and
                 implementation",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "1",
  pages =        "1--14",
  month =        feb,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-010-0115-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:34 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-010-0115-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Lim:2011:IBC,
  author =       "Hoon Wei Lim and Kenneth G. Paterson",
  title =        "Identity-based cryptography for grid security",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "1",
  pages =        "15--32",
  month =        feb,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-010-0116-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:34 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-010-0116-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Peng:2011:MOS,
  author =       "Kun Peng and Ed Dawson and Feng Bao",
  title =        "Modification and optimisation of a shuffling scheme:
                 stronger security, formal analysis and higher
                 efficiency",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "1",
  pages =        "33--47",
  month =        feb,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-010-0117-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:34 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-010-0117-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Peng:2011:GEC,
  author =       "Kun Peng",
  title =        "A general and efficient countermeasure to relation
                 attacks in mix-based e-voting",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "1",
  pages =        "49--60",
  month =        feb,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-010-0122-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:34 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-010-0122-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Anonymous:2011:P,
  author =       "Anonymous",
  title =        "Preface",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "2",
  pages =        "61--61",
  month =        jun,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0134-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:35 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0134-5;
                 http://link.springer.com/content/pdf/10.1007/s10207-011-0134-5.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Coker:2011:PRA,
  author =       "George Coker and Joshua Guttman and Peter Loscocco and
                 Amy Herzog and Jonathan Millen and Brian O'Hanlon and
                 John Ramsdell and Ariel Segall and Justin Sheehy and
                 Brian Sniffen",
  title =        "Principles of remote attestation",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "2",
  pages =        "63--81",
  month =        jun,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0124-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:35 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0124-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{DiPierro:2011:PTC,
  author =       "Alessandra {Di Pierro} and Chris Hankin and Herbert
                 Wiklicky",
  title =        "Probabilistic timing covert channels: to close or not
                 to close?",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "2",
  pages =        "83--106",
  month =        jun,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-010-0107-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:35 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-010-0107-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Backes:2011:CSS,
  author =       "Michael Backes and Iliano Cervesato and Aaron D.
                 Jaggard and Andre Scedrov and Joe-Kai Tsay",
  title =        "Cryptographically sound security proofs for basic and
                 public-key {Kerberos}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "2",
  pages =        "107--134",
  month =        jun,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0125-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:35 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0125-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Anonymous:2011:SIS,
  author =       "Anonymous",
  title =        "Special issue on ``{SCADA} and control system
                 security''",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "2",
  pages =        "135--136",
  month =        jun,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0128-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:35 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0128-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Crampton:2011:UFC,
  author =       "Jason Crampton and Hoon Wei Lim and Kenneth G.
                 Paterson and Geraint Price",
  title =        "User-friendly and certificate-free grid security
                 infrastructure",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "3",
  pages =        "137--153",
  month =        jun,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0123-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:35 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0123-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Zhu:2011:SLA,
  author =       "Wen Tao Zhu and Yang Xiang and Jianying Zhou and
                 Robert H. Deng and Feng Bao",
  title =        "Secure localization with attack detection in wireless
                 sensor networks",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "3",
  pages =        "155--171",
  month =        jun,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0127-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:35 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0127-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Roelse:2011:DST,
  author =       "Peter Roelse",
  title =        "Dynamic subtree tracing and its application in
                 pay-{TV} systems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "3",
  pages =        "173--187",
  month =        jun,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0126-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:35 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  note =         "See erratum \cite{Roelse:2011:EDS}.",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0126-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kate:2011:GCB,
  author =       "Aniket Kate and Ian Goldberg",
  title =        "Generalizing cryptosystems based on the subset sum
                 problem",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "3",
  pages =        "189--199",
  month =        jun,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0129-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:35 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0129-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Ustaoglu:2011:IIB,
  author =       "Berkant Ustao{\u{g}}lu",
  title =        "Integrating identity-based and certificate-based
                 authenticated key exchange protocols",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "4",
  pages =        "201--212",
  month =        aug,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0136-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:35 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0136-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Saxena:2011:DRE,
  author =       "Nitesh Saxena and Jonathan Voris",
  title =        "Data remanence effects on memory-based entropy
                 collection for {RFID} systems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "4",
  pages =        "213--222",
  month =        aug,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0139-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:35 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0139-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bouzida:2011:CAB,
  author =       "Yacine Bouzida and Luigi Logrippo and Serge
                 Mankovski",
  title =        "Concrete- and abstract-based access control",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "4",
  pages =        "223--238",
  month =        aug,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0138-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:35 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0138-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bielova:2011:DYR,
  author =       "Nataliia Bielova and Fabio Massacci",
  title =        "Do you really mean what you actually enforced?",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "4",
  pages =        "239--254",
  month =        aug,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0137-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:35 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0137-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Hanley:2011:UTD,
  author =       "Neil Hanley and Michael Tunstall and William P.
                 Marnane",
  title =        "Using templates to distinguish multiplications from
                 squaring operations",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "4",
  pages =        "255--266",
  month =        aug,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0135-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:35 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0135-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Jajodia:2011:MGE,
  author =       "Sushil Jajodia and Jianying Zhou",
  title =        "Message from the {Guest Editors}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "5",
  pages =        "267--268",
  month =        oct,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0131-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:36 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0131-8;
                 http://link.springer.com/content/pdf/10.1007/s10207-011-0131-8.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kong:2011:SSA,
  author =       "Deguang Kong and Yoon-Chan Jhi and Tao Gong and Sencun
                 Zhu and Peng Liu and Hongsheng Xi",
  title =        "{SAS}: semantics aware signature generation for
                 polymorphic worm detection",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "5",
  pages =        "269--283",
  month =        oct,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0132-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:36 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0132-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Chang:2011:EHS,
  author =       "Ee-Chien Chang and Liming Lu and Yongzheng Wu and
                 Roland H. C. Yap and Jie Yu",
  title =        "Enhancing host security using external environment
                 sensors",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "5",
  pages =        "285--299",
  month =        oct,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0130-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:36 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0130-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Marconi:2011:CPE,
  author =       "Luciana Marconi and Mauro Conti and Roberto {Di
                 Pietro}",
  title =        "{CASSANDRA}: a probabilistic, efficient, and
                 privacy-preserving solution to compute set
                 intersection",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "5",
  pages =        "301--319",
  month =        oct,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0133-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:36 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0133-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Gyorffy:2011:TBG,
  author =       "John Charles Gyorffy and Andrew F. Tappenden and James
                 Miller",
  title =        "Token-based graphical password authentication",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "6",
  pages =        "321--336",
  month =        nov,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0147-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:36 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0147-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Glisson:2011:ERW,
  author =       "William Bradley Glisson and Tim Storer and Gavin
                 Mayall and Iain Moug and George Grispos",
  title =        "Electronic retention: what does your mobile phone
                 reveal about you?",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "6",
  pages =        "337--349",
  month =        nov,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0144-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:36 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0144-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Garcia:2011:SID,
  author =       "Sergio S{\'a}nchez Garc{\'\i}a and Ana G{\'o}mez Oliva
                 and Emilia P{\'e}rez Belleboni and Iv{\'a}n Pau de la
                 Cruz",
  title =        "Solving identity delegation problem in the
                 e-government environment",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "6",
  pages =        "351--372",
  month =        nov,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0140-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:36 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0140-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Huang:2011:ESD,
  author =       "Qiong Huang and Guomin Yang and Duncan S. Wong and
                 Willy Susilo",
  title =        "Efficient strong designated verifier signature schemes
                 without random oracle or with non-delegatability",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "6",
  pages =        "373--385",
  month =        nov,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0146-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:36 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0146-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Miret:2011:CAH,
  author =       "Josep M. Miret and Francesc Seb{\'e}",
  title =        "Cryptanalysis of an ad-hoc cryptosystem for mix-based
                 e-voting robust against relation attacks",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "6",
  pages =        "387--389",
  month =        nov,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0145-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:36 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0145-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Roelse:2011:EDS,
  author =       "Peter Roelse",
  title =        "Erratum to: {Dynamic subtree tracing and its
                 application in pay-TV systems}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "6",
  pages =        "391--391",
  month =        nov,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0141-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:36 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  note =         "See \cite{Roelse:2011:DST}.",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0141-6;
                 http://link.springer.com/content/pdf/10.1007/s10207-011-0141-6.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Fiore:2012:RBS,
  author =       "D. Fiore and R. Gennaro and N. P. Smart",
  title =        "Relations between the security models for
                 certificateless encryption and {ID}-based key
                 agreement",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "1",
  pages =        "1--22",
  month =        feb,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0149-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:36 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0149-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Peng:2012:TDA,
  author =       "Kun Peng",
  title =        "Threshold distributed access control with public
                 verification: a practical application of {PVSS}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "1",
  pages =        "23--31",
  month =        feb,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0151-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:36 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0151-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Ates:2012:WHI,
  author =       "Mika{\"e}l Ates and Francesco Buccafurri and Jacques
                 Fayolle and Gianluca Lax",
  title =        "A warning on how to implement anonymous credential
                 protocols into the information card framework",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "1",
  pages =        "33--40",
  month =        feb,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0150-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:36 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0150-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Wang:2012:SGN,
  author =       "Yuanzhuo Wang and Min Yu and Jingyuan Li and Kun Meng
                 and Chuang Lin and Xueqi Cheng",
  title =        "Stochastic game net and applications in security
                 analysis for enterprise network",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "1",
  pages =        "41--52",
  month =        feb,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0148-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:36 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0148-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Huang:2012:NEO,
  author =       "Qiong Huang and Guomin Yang and Duncan S. Wong and
                 Willy Susilo",
  title =        "A new efficient optimistic fair exchange protocol
                 without random oracles",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "1",
  pages =        "53--63",
  month =        feb,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0152-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:36 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0152-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Guerra-Casanova:2012:AMD,
  author =       "J. Guerra-Casanova and C. S{\'a}nchez-{\'A}vila and G.
                 Bailador and A. de Santos Sierra",
  title =        "Authentication in mobile devices through hand gesture
                 recognition",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "2",
  pages =        "65--83",
  month =        apr,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0154-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:37 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0154-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Nuida:2012:SCS,
  author =       "Koji Nuida",
  title =        "Short collusion-secure fingerprint codes against three
                 pirates",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "2",
  pages =        "85--102",
  month =        apr,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0155-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:37 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0155-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Andreeva:2012:SAS,
  author =       "Elena Andreeva and Andrey Bogdanov and Bart Mennink
                 and Bart Preneel and Christian Rechberger",
  title =        "On security arguments of the second round {SHA-3}
                 candidates",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "2",
  pages =        "103--120",
  month =        apr,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0156-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:37 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/hash.bib;
                 http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0156-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
  keywords =     "Classification; Differential attacks; Hash functions;
                 Security reductions; SHA-3 competition; US National
                 Institute for Standards and Technology (NIST)
                 cryptographic hash algorithm design competition",
}

@Article{Gritzalis:2012:FAR,
  author =       "Dimitris Gritzalis and Panagiotis Katsaros and
                 Stylianos Basagiannis and Yannis Soupionis",
  title =        "Formal analysis for robust anti-{SPIT} protection
                 using model checking",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "2",
  pages =        "121--135",
  month =        apr,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0159-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:37 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0159-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Niebuhr:2012:SPS,
  author =       "Robert Niebuhr and Mohammed Meziani and Stanislav
                 Bulygin and Johannes Buchmann",
  title =        "Selecting parameters for secure {McEliece}-based
                 cryptosystems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "3",
  pages =        "137--147",
  month =        jun,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0153-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:37 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0153-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Andreeva:2012:PFG,
  author =       "Elena Andreeva and Bart Mennink and Bart Preneel",
  title =        "The parazoa family: generalizing the sponge hash
                 functions",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "3",
  pages =        "149--165",
  month =        jun,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0157-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:37 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/hash.bib;
                 http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0157-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Dewri:2012:OSH,
  author =       "Rinku Dewri and Indrajit Ray and Nayot Poolsappasit
                 and Darrell Whitley",
  title =        "Optimal security hardening on attack tree models of
                 networks: a cost-benefit analysis",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "3",
  pages =        "167--188",
  month =        jun,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0160-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:37 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0160-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Das:2012:RKE,
  author =       "Ashok Kumar Das",
  title =        "A random key establishment scheme for multi-phase
                 deployment in large-scale distributed sensor networks",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "3",
  pages =        "189--211",
  month =        jun,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0162-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:37 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0162-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Ahmed:2012:MGE,
  author =       "Irfan Ahmed and Martin Naedele and Bradley Schatz and
                 Ryoichi Sasaki and Andrew West",
  title =        "Message from the guest editors",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "4",
  pages =        "213--213",
  month =        aug,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0168-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:37 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0168-3;
                 http://link.springer.com/content/pdf/10.1007/s10207-012-0168-3.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Reaves:2012:OVT,
  author =       "Bradley Reaves and Thomas Morris",
  title =        "An open virtual testbed for industrial control system
                 security research",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "4",
  pages =        "215--229",
  month =        aug,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0164-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:37 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0164-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Hadziosmanovic:2012:LMA,
  author =       "Dina Hadziosmanovi{\'c} and Damiano Bolzoni and Pieter
                 H. Hartel",
  title =        "A log mining approach for process monitoring in
                 {SCADA}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "4",
  pages =        "231--251",
  month =        aug,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0163-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:37 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0163-8;
                 http://link.springer.com/content/pdf/10.1007/s10207-012-0163-8.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Sole:2012:EMT,
  author =       "Marc Sol{\'e} and Victor Munt{\'e}s-Mulero and Jordi
                 Nin",
  title =        "Efficient microaggregation techniques for large
                 numerical data volumes",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "4",
  pages =        "253--267",
  month =        aug,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0158-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:37 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0158-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Yaseen:2012:ITM,
  author =       "Qussai Yaseen and Brajendra Panda",
  title =        "Insider threat mitigation: preventing unauthorized
                 knowledge acquisition",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "4",
  pages =        "269--280",
  month =        aug,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0165-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:37 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0165-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Huber:2012:PSS,
  author =       "Michael Huber",
  title =        "Perfect secrecy systems immune to spoofing attacks",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "4",
  pages =        "281--289",
  month =        aug,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0166-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:37 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0166-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Zhou:2012:MGE,
  author =       "Jianying Zhou and Xuejia Lai and Hui Li",
  title =        "Message from the {Guest Editors}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "5",
  pages =        "291--292",
  month =        oct,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0172-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:38 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0172-7;
                 http://link.springer.com/content/pdf/10.1007/s10207-012-0172-7.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Xin:2012:RAA,
  author =       "Zhi Xin and Huiyu Chen and Xinche Wang and Peng Liu
                 and Sencun Zhu and Bing Mao and Li Xie",
  title =        "Replacement attacks: automatically evading
                 behavior-based software birthmark",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "5",
  pages =        "293--304",
  month =        oct,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0170-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:38 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0170-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Chen:2012:DHP,
  author =       "Liqun Chen and Yu Chen",
  title =        "The $n$-{Diffie--Hellman} problem and multiple-key
                 encryption",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "5",
  pages =        "305--320",
  month =        oct,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0171-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:38 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0171-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kontaxis:2012:MID,
  author =       "Georgios Kontaxis and Michalis Polychronakis and
                 Evangelos P. Markatos",
  title =        "Minimizing information disclosure to third parties in
                 social login platforms",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "5",
  pages =        "321--332",
  month =        oct,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0173-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:38 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0173-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Golic:2012:NAM,
  author =       "Jovan Dj. Goli{\'c}",
  title =        "A new authentication model for ad hoc networks",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "5",
  pages =        "333--347",
  month =        oct,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0167-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:38 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0167-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Camacho:2012:SAC,
  author =       "Philippe Camacho and Alejandro Hevia and Marcos Kiwi
                 and Roberto Opazo",
  title =        "Strong accumulators from collision-resistant hashing",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "5",
  pages =        "349--363",
  month =        oct,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0169-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:38 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/hash.bib;
                 http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0169-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Perez-Mendez:2012:CLS,
  author =       "Alejandro P{\'e}rez-M{\'e}ndez and Fernando
                 Pere{\~n}{\'\i}guez-Garc{\'\i}a and Rafael
                 Mar{\'\i}n-L{\'o}pez and Gabriel L{\'o}pez-Mill{\'a}n",
  title =        "A cross-layer {SSO} solution for federating access to
                 kerberized services in the {eduroam\slash DAMe}
                 network",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "6",
  pages =        "365--388",
  month =        nov,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0174-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:38 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0174-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Han:2012:NCO,
  author =       "Jinguang Han and Willy Susilo and Yi Mu and Jun Yan",
  title =        "New constructions of {OSBE} schemes and their
                 applications in oblivious access control",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "6",
  pages =        "389--401",
  month =        nov,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0176-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:38 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0176-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bogdanov:2012:HPS,
  author =       "Dan Bogdanov and Margus Niitsoo and Tomas Toft and Jan
                 Willemson",
  title =        "High-performance secure multi-party computation for
                 data mining applications",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "6",
  pages =        "403--418",
  month =        nov,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0177-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:38 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0177-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bagheri:2012:SFP,
  author =       "Nasour Bagheri and Praveen Gauravaram and Lars R.
                 Knudsen and Erik Zenner",
  title =        "The suffix-free-prefix-free hash function construction
                 and its indifferentiability security analysis",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "6",
  pages =        "419--434",
  month =        nov,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0175-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:38 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/hash.bib;
                 http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0175-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{DArco:2013:TTR,
  author =       "Paolo D'Arco and Angel Perez del Pozo",
  title =        "Toward tracing and revoking schemes secure against
                 collusion and any form of secret information leakage",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "1",
  pages =        "1--17",
  month =        feb,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0186-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:38 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0186-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Abe:2013:DTA,
  author =       "Masayuki Abe and Sherman S. M. Chow and Kristiyan
                 Haralambiev and Miyako Ohkubo",
  title =        "Double-trapdoor anonymous tags for traceable
                 signatures",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "1",
  pages =        "19--31",
  month =        feb,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0184-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:38 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0184-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Catalano:2013:FNI,
  author =       "Dario Catalano and Mario {Di Raimondo} and Dario Fiore
                 and Rosario Gennaro and Orazio Puglisi",
  title =        "Fully non-interactive onion routing with forward
                 secrecy",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "1",
  pages =        "33--47",
  month =        feb,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0185-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:38 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0185-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{DeCristofaro:2013:PDC,
  author =       "Emiliano {De Cristofaro} and Mark Manulis and Bertram
                 Poettering",
  title =        "Private discovery of common social contacts",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "1",
  pages =        "49--65",
  month =        feb,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0183-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:38 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0183-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Marmol:2013:PEA,
  author =       "F{\'e}lix G{\'o}mez M{\'a}rmol and Christoph Sorge and
                 Ronald Petrlic and Osman Ugus and Dirk Westhoff and
                 Gregorio Mart{\'\i}nez P{\'e}rez",
  title =        "Privacy-enhanced architecture for smart metering",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "2",
  pages =        "67--82",
  month =        apr,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0181-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:39 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0181-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Asghar:2013:CCH,
  author =       "Hassan Jameel Asghar and Shujun Li and Josef Pieprzyk
                 and Huaxiong Wang",
  title =        "Cryptanalysis of the convex hull click human
                 identification protocol",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "2",
  pages =        "83--96",
  month =        apr,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0161-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:39 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0161-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Alsaleh:2013:EAA,
  author =       "Mansour Alsaleh and P. C. van Oorschot",
  title =        "Evaluation in the absence of absolute ground truth:
                 toward reliable evaluation methodology for scan
                 detectors",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "2",
  pages =        "97--110",
  month =        apr,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0178-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:39 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0178-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Abbadi:2013:FET,
  author =       "Imad M. Abbadi",
  title =        "A framework for establishing trust in Cloud
                 provenance",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "2",
  pages =        "111--128",
  month =        apr,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0179-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:39 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0179-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Rebollo-Monedero:2013:MPA,
  author =       "David Rebollo-Monedero and Javier Parra-Arnau and
                 Claudia Diaz and Jordi Forn{\'e}",
  title =        "On the measurement of privacy as an attacker's
                 estimation error",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "2",
  pages =        "129--149",
  month =        apr,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0182-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:39 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0182-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Rizomiliotis:2013:SAP,
  author =       "Panagiotis Rizomiliotis and Stefanos Gritzalis",
  title =        "On the security of {AUTH}, a provably secure
                 authentication protocol based on the subspace {LPN}
                 problem",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "2",
  pages =        "151--154",
  month =        apr,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0188-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:39 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0188-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Xu:2013:VBP,
  author =       "Wenjuan Xu and Mohamed Shehab and Gail-Joon Ahn",
  title =        "Visualization-based policy analysis for {SELinux}:
                 framework and user study",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "3",
  pages =        "155--171",
  month =        jun,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0180-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:39 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0180-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Tormo:2013:DAI,
  author =       "Gin{\'e}s D{\'o}lera Tormo and Gabriel L{\'o}pez
                 Mill{\'a}n and Gregorio Mart{\'\i}nez P{\'e}rez",
  title =        "Definition of an advanced identity management
                 infrastructure",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "3",
  pages =        "173--200",
  month =        jun,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0189-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:39 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0189-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Vrakas:2013:IDP,
  author =       "Nikos Vrakas and Costas Lambrinoudakis",
  title =        "An intrusion detection and prevention system for {IMS}
                 and {VoIP} services",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "3",
  pages =        "201--217",
  month =        jun,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0187-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:39 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0187-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bernhard:2013:AAU,
  author =       "D. Bernhard and G. Fuchsbauer and E. Ghadafi and N. P.
                 Smart and B. Warinschi",
  title =        "Anonymous attestation with user-controlled
                 linkability",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "3",
  pages =        "219--249",
  month =        jun,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0191-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:39 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0191-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Phan:2013:ACB,
  author =       "Duong-Hieu Phan and David Pointcheval and Siamak F.
                 Shahandashti and Mario Strefler",
  title =        "Adaptive {CCA} broadcast encryption with constant-size
                 secret keys and ciphertexts",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "4",
  pages =        "251--265",
  month =        aug,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0190-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:39 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0190-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Brzuska:2013:LMR,
  author =       "C. Brzuska and M. Fischlin and N. P. Smart and B.
                 Warinschi and S. C. Williams",
  title =        "Less is more: relaxed yet composable security notions
                 for key exchange",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "4",
  pages =        "267--297",
  month =        aug,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0192-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:39 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0192-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Draper-Gil:2013:OFE,
  author =       "G. Draper-Gil and J. Zhou and J. L. Ferrer-Gomila and
                 M. F. Hinarejos",
  title =        "An optimistic fair exchange protocol with active
                 intermediaries",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "4",
  pages =        "299--318",
  month =        aug,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0194-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:39 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0194-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Beauquier:2013:SPE,
  author =       "Dani{\`e}le Beauquier and Jo{\"e}lle Cohen and Ruggero
                 Lanotte",
  title =        "Security policies enforcement using finite and
                 pushdown edit automata",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "4",
  pages =        "319--336",
  month =        aug,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0195-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:39 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0195-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Peng:2013:SAH,
  author =       "Kun Peng",
  title =        "A shuffle to achieve high efficiency through
                 pre-computation and batch verification",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "4",
  pages =        "337--345",
  month =        aug,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0193-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:39 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0193-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Boteanu:2013:CSQ,
  author =       "Daniel Boteanu and Jos{\'e} M. Fernandez",
  title =        "A comprehensive study of queue management as a {DoS}
                 counter-measure",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "5",
  pages =        "347--382",
  month =        oct,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0197-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:40 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0197-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Wang:2013:USM,
  author =       "Pu Wang and Marta C. Gonz{\'a}lez and Ronaldo Menezes
                 and Albert-L{\'a}szl{\'o} Barab{\'a}si",
  title =        "Understanding the spread of malicious mobile-phone
                 programs and their damage potential",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "5",
  pages =        "383--392",
  month =        oct,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0203-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:40 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0203-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Schreuders:2013:FBA,
  author =       "Z. Cliffe Schreuders and Christian Payne and Tanya
                 McGill",
  title =        "The functionality-based application confinement
                 model",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "5",
  pages =        "393--422",
  month =        oct,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0199-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:40 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0199-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Zakerzadeh:2013:DSA,
  author =       "Hessam Zakerzadeh and Sylvia L. Osborn",
  title =        "Delay-sensitive approaches for anonymizing numerical
                 streaming data",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "5",
  pages =        "423--437",
  month =        oct,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0196-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:40 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0196-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bresson:2013:LLS,
  author =       "Emmanuel Bresson and Dario Catalano and Mario {Di
                 Raimondo} and Dario Fiore and Rosario Gennaro",
  title =        "Off-line\slash on-line signatures revisited: a general
                 unifying paradigm, efficient threshold variants and
                 experimental results",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "6",
  pages =        "439--465",
  month =        nov,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0200-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:40 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0200-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kundu:2013:PPA,
  author =       "Ashish Kundu and Elisa Bertino",
  title =        "Privacy-preserving authentication of trees and
                 graphs",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "6",
  pages =        "467--494",
  month =        nov,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0198-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:40 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0198-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Chen:2013:AMA,
  author =       "Yu-Shian Chen and Chin-Laung Lei",
  title =        "Aggregate message authentication codes {(AMACs)} with
                 on-the-fly verification",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "6",
  pages =        "495--504",
  month =        nov,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0202-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:40 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0202-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Pereniguez-Garcia:2013:KPA,
  author =       "F. Pere{\~n}{\'\i}guez-Garc{\'\i}a and R.
                 Mar{\'\i}n-L{\'o}pez and G. Kambourakis and A.
                 Ruiz-Mart{\'\i}nez and S. Gritzalis and A. F.
                 Skarmeta-G{\'o}mez",
  title =        "{KAMU}: providing advanced user privacy in {Kerberos}
                 multi-domain scenarios",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "6",
  pages =        "505--525",
  month =        nov,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0201-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:40 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0201-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Liao:2014:POC,
  author =       "Qi Liao and Zhen Li",
  title =        "Portfolio optimization of computer and mobile
                 botnets",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "1",
  pages =        "1--14",
  month =        feb,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0206-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:41 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0206-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Mizuki:2014:FCB,
  author =       "Takaaki Mizuki and Hiroki Shizuya",
  title =        "A formalization of card-based cryptographic protocols
                 via abstract machine",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "1",
  pages =        "15--23",
  month =        feb,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0219-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:41 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0219-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Manulis:2014:PAI,
  author =       "Mark Manulis and Bertram Poettering and Douglas
                 Stebila",
  title =        "Plaintext awareness in identity-based key
                 encapsulation",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "1",
  pages =        "25--49",
  month =        feb,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0218-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:41 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0218-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Emura:2014:GSI,
  author =       "Keita Emura and Goichiro Hanaoka and Yusuke Sakai and
                 Jacob C. N. Schuldt",
  title =        "Group signature implies public-key encryption with
                 non-interactive opening",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "1",
  pages =        "51--62",
  month =        feb,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0204-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:41 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0204-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Granadillo:2014:RBC,
  author =       "Gustavo Gonzalez Granadillo and Malek Belhaouane and
                 Herv{\'e} Debar and Gr{\'e}goire Jacob",
  title =        "{RORI}-based countermeasure selection using the
                 {OrBAC} formalism",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "1",
  pages =        "63--79",
  month =        feb,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0207-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:41 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0207-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Saikia:2014:PHF,
  author =       "Navajit Saikia and Prabin K. Bora",
  title =        "Perceptual hash function for scalable video",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "1",
  pages =        "81--93",
  month =        feb,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0211-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:41 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/hash.bib;
                 http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0211-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Anonymous:2014:SCC,
  author =       "Anonymous",
  title =        "Security in cloud computing",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "2",
  pages =        "95--96",
  month =        apr,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0232-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:41 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0232-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Gouglidis:2014:SPV,
  author =       "Antonios Gouglidis and Ioannis Mavridis and Vincent C.
                 Hu",
  title =        "Security policy verification for multi-domains in
                 cloud systems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "2",
  pages =        "97--111",
  month =        apr,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0205-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:41 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0205-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Fernandes:2014:SIC,
  author =       "Diogo A. B. Fernandes and Liliana F. B. Soares and
                 Jo{\~a}o V. Gomes and M{\'a}rio M. Freire and Pedro R.
                 M. In{\'a}cio",
  title =        "Security issues in cloud environments: a survey",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "2",
  pages =        "113--170",
  month =        apr,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0208-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:41 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0208-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bates:2014:DCR,
  author =       "Adam Bates and Benjamin Mood and Joe Pletcher and
                 Hannah Pruse and Masoud Valafar and Kevin Butler",
  title =        "On detecting co-resident cloud instances using network
                 flow watermarking techniques",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "2",
  pages =        "171--189",
  month =        apr,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0210-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:41 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0210-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Albeshri:2014:EGI,
  author =       "Aiiad Albeshri and Colin Boyd and Juan Gonz{\'a}lez
                 Nieto",
  title =        "Enhanced {GeoProof}: improved geographic assurance for
                 data in the cloud",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "2",
  pages =        "191--198",
  month =        apr,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0217-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:41 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0217-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Nunez:2014:BPP,
  author =       "David Nu{\~n}ez and Isaac Agudo",
  title =        "{BlindIdM}: A privacy-preserving approach for identity
                 management as a service",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "2",
  pages =        "199--215",
  month =        apr,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0230-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:41 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0230-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Mavrogiannopoulos:2014:TSK,
  author =       "Nikos Mavrogiannopoulos and Andreas Pashalidis and
                 Bart Preneel",
  title =        "Toward a secure {Kerberos} key exchange with smart
                 cards",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "3",
  pages =        "217--228",
  month =        jun,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0213-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:41 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0213-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Li:2014:AAM,
  author =       "Fudong Li and Nathan Clarke and Maria Papadaki and
                 Paul Dowland",
  title =        "Active authentication for mobile devices utilising
                 behaviour profiling",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "3",
  pages =        "229--244",
  month =        jun,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0209-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:41 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0209-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Wu:2014:SSP,
  author =       "Tzong-Sun Wu and Ming-Lun Lee and Han-Yu Lin and
                 Chao-Yuan Wang",
  title =        "Shoulder-surfing-proof graphical password
                 authentication scheme",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "3",
  pages =        "245--254",
  month =        jun,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0216-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:41 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0216-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Mu:2014:RBD,
  author =       "Chengpo Mu and Meng Yu and Yingjiu Li and Wanyu Zang",
  title =        "Risk balance defense approach against intrusions for
                 network server",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "3",
  pages =        "255--269",
  month =        jun,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0214-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:41 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0214-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Lian:2014:PSC,
  author =       "Bin Lian and Gongliang Chen and Jianhua Li",
  title =        "Provably secure E-cash system with practical and
                 efficient complete tracing",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "3",
  pages =        "271--289",
  month =        jun,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0240-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:41 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0240-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{McEvoy:2014:ANT,
  author =       "Robert P. McEvoy and Michael Tunstall and Claire
                 Whelan and Colin C. Murphy and William P. Marnane",
  title =        "{All-or-Nothing Transforms} as a countermeasure to
                 differential side-channel analysis",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "3",
  pages =        "291--304",
  month =        jun,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0212-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:41 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0212-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kim:2014:EVE,
  author =       "Kee Sung Kim and Ik Rae Jeong",
  title =        "Efficient verifiably encrypted signatures from
                 lattices",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "4",
  pages =        "305--314",
  month =        aug,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0226-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:42 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0226-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Sepahi:2014:LBC,
  author =       "Reza Sepahi and Ron Steinfeld and Josef Pieprzyk",
  title =        "Lattice-based certificateless public-key encryption in
                 the standard model",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "4",
  pages =        "315--333",
  month =        aug,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0215-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:42 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0215-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bertoni:2014:SCS,
  author =       "Guido Bertoni and Joan Daemen and Micha{\"e}l Peeters
                 and Gilles {Van Assche}",
  title =        "Sufficient conditions for sound tree and sequential
                 hashing modes",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "4",
  pages =        "335--353",
  month =        aug,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0220-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:42 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/hash.bib;
                 http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0220-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Alabrah:2014:ESC,
  author =       "Amerah Alabrah and Jeffrey Cashion and Mostafa
                 Bassiouni",
  title =        "Enhancing security of cookie-based sessions in mobile
                 networks using sparse caching",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "4",
  pages =        "355--366",
  month =        aug,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0223-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:42 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0223-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Shameli-Sendi:2014:ACA,
  author =       "Alireza Shameli-Sendi and Michel Dagenais",
  title =        "{ARITO}: Cyber-attack response system using accurate
                 risk impact tolerance",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "4",
  pages =        "367--390",
  month =        aug,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0222-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:42 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0222-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Mousazadeh:2014:RGA,
  author =       "Mousa Mousazadeh and Behrouz Tork Ladani",
  title =        "Randomized gossip algorithms under attack",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "4",
  pages =        "391--402",
  month =        aug,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0221-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:42 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0221-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Garcia:2014:WLS,
  author =       "Flavio D. Garcia and Gerhard de Koning Gans and Roel
                 Verdult",
  title =        "Wirelessly lockpicking a smart card reader",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "5",
  pages =        "403--420",
  month =        oct,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0234-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:42 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0234-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Catuogno:2014:ATF,
  author =       "Luigi Catuogno and Clemente Galdi",
  title =        "Analysis of a two-factor graphical password scheme",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "5",
  pages =        "421--437",
  month =        oct,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0228-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:42 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0228-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Zhang:2014:DFA,
  author =       "Meng Zhang and Anand Raghunathan and Niraj K. Jha",
  title =        "A defense framework against malware and vulnerability
                 exploits",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "5",
  pages =        "439--452",
  month =        oct,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0233-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:42 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0233-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Yasmin:2014:PSP,
  author =       "Rehana Yasmin and Eike Ritter and Guilin Wang",
  title =        "Provable security of a pairing-free one-pass
                 authenticated key establishment protocol for wireless
                 sensor networks",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "5",
  pages =        "453--465",
  month =        oct,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0224-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:42 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0224-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Gao:2014:TTR,
  author =       "Weizheng Gao and Kashi Neupane and Rainer Steinwandt",
  title =        "Tuning a two-round group key agreement",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "5",
  pages =        "467--476",
  month =        oct,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0225-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:42 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0225-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Shin:2014:AAA,
  author =       "Sooyeon Shin and Taekyoung Kwon",
  title =        "{AAnA}: Anonymous authentication and authorization
                 based on short traceable signatures",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "5",
  pages =        "477--495",
  month =        oct,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0227-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:42 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0227-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Herranz:2014:SEA,
  author =       "Javier Herranz and Jordi Nin",
  title =        "Secure and efficient anonymization of distributed
                 confidential databases",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "6",
  pages =        "497--512",
  month =        nov,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0237-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:42 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0237-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Lee:2014:AGU,
  author =       "Ming-Feng Lee and Nigel P. Smart and Bogdan Warinschi
                 and Gaven J. Watson",
  title =        "Anonymity guarantees of the {UMTS\slash LTE}
                 authentication and connection protocol",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "6",
  pages =        "513--527",
  month =        nov,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0231-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:42 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0231-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Veeningen:2014:DMC,
  author =       "Meilof Veeningen and Benne de Weger and Nicola
                 Zannone",
  title =        "Data minimisation in communication protocols: a formal
                 analysis framework and application to identity
                 management",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "6",
  pages =        "529--569",
  month =        nov,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0235-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:42 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0235-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Jovanovikj:2014:CMS,
  author =       "Vladimir Jovanovikj and Dusan Gabrijelcic and Tomaz
                 Klobucar",
  title =        "A conceptual model of security context",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "6",
  pages =        "571--581",
  month =        nov,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0229-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:42 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0229-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Sen:2014:UIW,
  author =       "Sevil Sen",
  title =        "Using instance-weighted naive {Bayes} for adapting
                 concept drift in masquerade detection",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "6",
  pages =        "583--590",
  month =        nov,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0238-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:42 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0238-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Han:2015:MAU,
  author =       "Kyoung Soo Han and Jae Hyun Lim and Boojoong Kang and
                 Eul Gyu Im",
  title =        "Malware analysis using visualized images and entropy
                 graphs",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "1",
  pages =        "1--14",
  month =        feb,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0242-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:43 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0242-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Nappa:2015:MDI,
  author =       "Antonio Nappa and M. Zubair Rafique and Juan
                 Caballero",
  title =        "The {MALICIA} dataset: identification and analysis of
                 drive-by download operations",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "1",
  pages =        "15--33",
  month =        feb,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0248-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:43 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0248-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Silva:2015:RMP,
  author =       "Helber Silva and Aldri Santos and Michele Nogueira",
  title =        "Routing management for performance and security
                 tradeoff in wireless mesh networks",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "1",
  pages =        "35--46",
  month =        feb,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0246-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:43 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0246-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Dolzhenko:2015:MRE,
  author =       "Egor Dolzhenko and Jay Ligatti and Srikar Reddy",
  title =        "Modeling runtime enforcement with mandatory results
                 automata",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "1",
  pages =        "47--60",
  month =        feb,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0239-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:43 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0239-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Valenzuela:2015:MAO,
  author =       "Michael Valenzuela and Ferenc Szidarovszky and Jerzy
                 Rozenblit",
  title =        "A multiresolution approach for optimal defense against
                 random attacks",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "1",
  pages =        "61--72",
  month =        feb,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0245-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:43 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0245-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Tonicelli:2015:ITS,
  author =       "Rafael Tonicelli and Anderson C. A. Nascimento and
                 Rafael Dowsley and J{\"o}rn M{\"u}ller-Quade and Hideki
                 Imai and Goichiro Hanaoka and Akira Otsuka",
  title =        "Information-theoretically secure oblivious polynomial
                 evaluation in the commodity-based model",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "1",
  pages =        "73--84",
  month =        feb,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0247-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:43 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0247-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Arbit:2015:IPK,
  author =       "Alex Arbit and Yoel Livne and Yossef Oren and Avishai
                 Wool",
  title =        "Implementing public-key cryptography on passive {RFID}
                 tags is practical",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "1",
  pages =        "85--99",
  month =        feb,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0236-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:43 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0236-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bella:2015:SIS,
  author =       "Giampaolo Bella and Helge Janicke",
  title =        "Special issue on the {Security Track at the ACM
                 Symposium on Applied Computing 2013}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "2",
  pages =        "101--102",
  month =        apr,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0280-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:43 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0280-2;
                 http://link.springer.com/content/pdf/10.1007/s10207-015-0280-2.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Martina:2015:ATM,
  author =       "Jean Everson Martina and Eduardo dos Santos and
                 Marcelo Carlomagno Carlos and Geraint Price and Ricardo
                 Felipe Cust{\'o}dio",
  title =        "An adaptive threat model for security ceremonies",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "2",
  pages =        "103--121",
  month =        apr,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0253-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:43 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0253-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Armando:2015:FMA,
  author =       "Alessandro Armando and Gabriele Costa and Alessio
                 Merlo and Luca Verderame",
  title =        "Formal modeling and automatic enforcement of {Bring
                 Your Own Device} policies",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "2",
  pages =        "123--140",
  month =        apr,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0252-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:43 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0252-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Spreitzenbarth:2015:MSC,
  author =       "Michael Spreitzenbarth and Thomas Schreck and Florian
                 Echtler and Daniel Arp and Johannes Hoffmann",
  title =        "{Mobile-Sandbox}: combining static and dynamic
                 analysis with machine-learning techniques",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "2",
  pages =        "141--153",
  month =        apr,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0250-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:43 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0250-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Riecker:2015:LEC,
  author =       "Michael Riecker and Sebastian Biedermann and Rachid
                 {El Bansarkhani} and Matthias Hollick",
  title =        "Lightweight energy consumption-based intrusion
                 detection system for wireless sensor networks",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "2",
  pages =        "155--167",
  month =        apr,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0241-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:43 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0241-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Egners:2015:MOW,
  author =       "Andr{\'e} Egners and Patrick Herrmann and Ulrike
                 Meyer",
  title =        "Multi-operator wireless mesh networks secured by an
                 all-encompassing security architecture",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "2",
  pages =        "169--186",
  month =        apr,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0244-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:43 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0244-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Martina:2015:VMB,
  author =       "Jean Everson Martina and Lawrence Charles Paulson",
  title =        "Verifying multicast-based security protocols using the
                 inductive method",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "2",
  pages =        "187--204",
  month =        apr,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0251-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:43 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0251-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Chakravarty:2015:DAE,
  author =       "Sambuddho Chakravarty and Georgios Portokalidis and
                 Michalis Polychronakis and Angelos D. Keromytis",
  title =        "Detection and analysis of eavesdropping in anonymous
                 communication networks",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "3",
  pages =        "205--220",
  month =        jun,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0256-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:43 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0256-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Seifi:2015:ATA,
  author =       "Younes Seifi and Suriadi Suriadi and Ernest Foo and
                 Colin Boyd",
  title =        "Analysis of two authorization protocols using {Colored
                 Petri Nets}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "3",
  pages =        "221--247",
  month =        jun,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0243-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:43 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0243-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{James:2015:AIP,
  author =       "Joshua I. James and Pavel Gladyshev",
  title =        "Automated inference of past action instances in
                 digital investigations",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "3",
  pages =        "249--261",
  month =        jun,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0249-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:43 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0249-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Giffhorn:2015:NAL,
  author =       "Dennis Giffhorn and Gregor Snelting",
  title =        "A new algorithm for low-deterministic security",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "3",
  pages =        "263--287",
  month =        jun,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0257-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:43 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0257-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Vasiliadis:2015:GAM,
  author =       "Giorgos Vasiliadis and Michalis Polychronakis and
                 Sotiris Ioannidis",
  title =        "{GPU}-assisted malware",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "3",
  pages =        "289--297",
  month =        jun,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0262-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:43 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0262-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Pitropakis:2015:BRP,
  author =       "Nikolaos Pitropakis and Aggelos Pikrakis and Costas
                 Lambrinoudakis",
  title =        "Behaviour reflects personality: detecting co-residence
                 attacks on {Xen}-based cloud environments",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "4",
  pages =        "299--305",
  month =        aug,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0255-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:44 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0255-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Yu:2015:EPR,
  author =       "Yong Yu and Man Ho Au and Yi Mu and Shaohua Tang and
                 Jian Ren and Willy Susilo and Liju Dong",
  title =        "Enhanced privacy of a remote data integrity-checking
                 protocol for secure cloud storage",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "4",
  pages =        "307--318",
  month =        aug,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0263-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:44 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0263-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Casassa-Mont:2015:TSI,
  author =       "Marco Casassa-Mont and Ilaria Matteucci and Marinella
                 Petrocchi and Marco Luca Sbodio",
  title =        "Towards safer information sharing in the cloud",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "4",
  pages =        "319--334",
  month =        aug,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0258-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:44 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0258-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Isern-Deya:2015:PUG,
  author =       "Andreu Pere Isern-Dey{\`a} and Lloren{\c{c}}
                 Huguet-Rotger and M. Magdalena Payeras-Capell{\`a} and
                 Maci{\`a} Mut-Puigserver",
  title =        "On the practicability of using group signatures on
                 mobile devices: implementation and performance analysis
                 on the {Android} platform",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "4",
  pages =        "335--345",
  month =        aug,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0259-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:44 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0259-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Mustafa:2015:UIA,
  author =       "Tanveer Mustafa and Karsten Sohr",
  title =        "Understanding the implemented access control policy of
                 {Android} system services with slicing and extended
                 static checking",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "4",
  pages =        "347--366",
  month =        aug,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0260-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:44 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0260-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{ElHassani:2015:ION,
  author =       "Abdeljebar Ameziane {El Hassani} and Anas Abou {El
                 Kalam} and Adel Bouhoula and Ryma Abassi and Abdellah
                 Ait Ouahman",
  title =        "{Integrity-OrBAC}: a new model to preserve {Critical
                 Infrastructures} integrity",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "4",
  pages =        "367--385",
  month =        aug,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0254-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:44 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0254-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Al-Saleh:2015:IDC,
  author =       "Mohammed I. Al-Saleh and Fatima M. AbuHjeela and Ziad
                 A. Al-Sharif",
  title =        "Investigating the detection capabilities of
                 antiviruses under concurrent attacks",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "4",
  pages =        "387--396",
  month =        aug,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0261-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:44 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0261-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Wei:2015:TPE,
  author =       "Lei Wei and Michael K. Reiter",
  title =        "Toward practical encrypted email that supports
                 private, regular-expression searches",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "5",
  pages =        "397--416",
  month =        oct,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0268-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:44 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib;
                 http://www.math.utah.edu/pub/tex/bib/string-matching.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0268-3;
                 http://link.springer.com/content/pdf/10.1007/s10207-014-0268-3.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
  keywords =     "Cloud security; Private search on encrypted data;
                 Regular-expression search",
}

@Article{Zhou:2015:GCR,
  author =       "Lan Zhou and Vijay Varadharajan and Michael Hitchens",
  title =        "Generic constructions for role-based encryption",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "5",
  pages =        "417--430",
  month =        oct,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0267-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:44 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0267-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Lin:2015:RNR,
  author =       "Han-Yu Lin",
  title =        "{RPCAE}: a novel revocable proxy convertible
                 authenticated encryption scheme",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "5",
  pages =        "431--441",
  month =        oct,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0269-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:44 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0269-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Halevi:2015:KAS,
  author =       "Tzipora Halevi and Nitesh Saxena",
  title =        "Keyboard acoustic side channel attacks: exploring
                 realistic and security-sensitive scenarios",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "5",
  pages =        "443--456",
  month =        oct,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0264-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:44 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0264-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Li:2015:TMM,
  author =       "Tao Li and Aiqun Hu",
  title =        "Trusted mobile model based on {DTE} technology",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "5",
  pages =        "457--469",
  month =        oct,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0266-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:44 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0266-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Azkia:2015:DPA,
  author =       "Hanieh Azkia and Nora Cuppens-Boulahia and
                 Fr{\'e}d{\'e}ric Cuppens and Gouenou Coatrieux and Said
                 Oulmakhzoune",
  title =        "Deployment of a posteriori access control using {IHE
                 ATNA}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "5",
  pages =        "471--483",
  month =        oct,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0265-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:44 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0265-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bertino:2015:SPE,
  author =       "Elisa Bertino and Robert H. Deng and Xinyi Huang and
                 Jianying Zhou",
  title =        "Security and privacy of electronic health information
                 systems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "6",
  pages =        "485--486",
  month =        nov,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0303-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:44 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0303-z;
                 http://link.springer.com/content/pdf/10.1007/s10207-015-0303-z.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Qian:2015:PPP,
  author =       "Huiling Qian and Jiguo Li and Yichen Zhang and
                 Jinguang Han",
  title =        "Privacy-preserving personal health record using
                 multi-authority attribute-based encryption with
                 revocation",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "6",
  pages =        "487--497",
  month =        nov,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0270-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:44 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0270-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Qin:2015:FAB,
  author =       "Bo Qin and Hua Deng and Qianhong Wu and Josep
                 Domingo-Ferrer and David Naccache and Yunya Zhou",
  title =        "Flexible attribute-based encryption applicable to
                 secure e-healthcare records",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "6",
  pages =        "499--511",
  month =        nov,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0272-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:44 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0272-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Hadavi:2015:SSS,
  author =       "Mohammad Ali Hadavi and Rasool Jalili and Ernesto
                 Damiani and Stelvio Cimato",
  title =        "Security and searchability in secret sharing-based
                 data outsourcing",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "6",
  pages =        "513--529",
  month =        nov,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0277-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:44 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0277-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kamm:2015:SFP,
  author =       "Liina Kamm and Jan Willemson",
  title =        "Secure floating point arithmetic and private satellite
                 collision analysis",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "6",
  pages =        "531--548",
  month =        nov,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0271-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:44 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0271-8;
                 http://link.springer.com/content/pdf/10.1007/s10207-014-0271-8.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Hoang:2015:GAM,
  author =       "Thang Hoang and Deokjai Choi and Thuc Nguyen",
  title =        "Gait authentication on mobile phone using biometric
                 cryptosystem and fuzzy commitment scheme",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "6",
  pages =        "549--560",
  month =        nov,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0273-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:44 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0273-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kozakevicius:2015:UQS,
  author =       "Alice Kozakevicius and Cristian Cappo and Bruno A.
                 Mozzaquatro and Raul Ceretta Nunes and Christian E.
                 Schaerer",
  title =        "{URL} query string anomaly sensor designed with the
                 bidimensional {Haar} wavelet transform",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "6",
  pages =        "561--581",
  month =        nov,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0276-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:44 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0276-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Liu:2016:STP,
  author =       "Liang Liu and Xiaofeng Chen and Wenjing Lou",
  title =        "Secure three-party computational protocols for
                 triangle area",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "1",
  pages =        "1--13",
  month =        feb,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0284-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:45 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0284-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Chen:2016:SOK,
  author =       "Yu Chen and Qiong Huang and Zongyang Zhang",
  title =        "{Sakai--Ohgishi--Kasahara} identity-based
                 non-interactive key exchange revisited and more",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "1",
  pages =        "15--33",
  month =        feb,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0274-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:45 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0274-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Liu:2016:PCC,
  author =       "Weiran Liu and Jianwei Liu and Qianhong Wu and Bo Qin
                 and Yan Li",
  title =        "Practical chosen-ciphertext secure {Hierarchical
                 Identity-Based Broadcast Encryption}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "1",
  pages =        "35--50",
  month =        feb,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0287-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:45 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0287-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Susil:2016:SSA,
  author =       "Petr Susil and Pouyan Sepehrdad and Serge Vaudenay and
                 Nicolas Courtois",
  title =        "On selection of samples in algebraic attacks and a new
                 technique to find hidden low degree equations",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "1",
  pages =        "51--65",
  month =        feb,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0295-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:45 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0295-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Wang:2016:SSE,
  author =       "Yuyu Wang and Keisuke Tanaka",
  title =        "Strongly simulation-extractable leakage-resilient
                 {NIZK}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "1",
  pages =        "67--79",
  month =        feb,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0291-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:45 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0291-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Rao:2016:EAB,
  author =       "Y. Sreenivasa Rao and Ratna Dutta",
  title =        "Efficient attribute-based signature and signcryption
                 realizing expressive access structures",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "1",
  pages =        "81--109",
  month =        feb,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0289-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:45 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0289-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{DeKeulenaer:2016:LTS,
  author =       "Ronald {De Keulenaer} and Jonas Maebe and Koen {De
                 Bosschere} and Bjorn {De Sutter}",
  title =        "Link-time smart card code hardening",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "2",
  pages =        "111--130",
  month =        apr,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0282-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:45 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0282-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Chikha:2016:BBA,
  author =       "Randa Jabeur Ben Chikha and Tarek Abbes and Wassim Ben
                 Chikha and Adel Bouhoula",
  title =        "Behavior-based approach to detect spam over {IP}
                 telephony attacks",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "2",
  pages =        "131--143",
  month =        apr,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0281-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:45 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0281-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Karimi:2016:UAA,
  author =       "Vahid R. Karimi and Paulo S. C. Alencar and Donald D.
                 Cowan",
  title =        "A uniform approach for access control and business
                 models with explicit rule realization",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "2",
  pages =        "145--171",
  month =        apr,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0275-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:45 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0275-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Raad:2016:PSR,
  author =       "Elie Raad and Bechara {Al Bouna} and Richard Chbeir",
  title =        "Preventing sensitive relationships disclosure for
                 better social media preservation",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "2",
  pages =        "173--194",
  month =        apr,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0278-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:45 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0278-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Celdran:2016:RPP,
  author =       "Alberto Huertas Celdr{\'a}n and Gin{\'e}s D{\'o}lera
                 Tormo and F{\'e}lix G{\'o}mez M{\'a}rmol and Manuel Gil
                 P{\'e}rez and Gregorio Mart{\'\i}nez P{\'e}rez",
  title =        "Resolving privacy-preserving relationships over
                 outsourced encrypted data storages",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "2",
  pages =        "195--209",
  month =        apr,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0283-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:45 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0283-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Mateu:2016:HAV,
  author =       "V{\'\i}ctor Mateu and Josep M. Miret and Francesc
                 Seb{\'e}",
  title =        "A hybrid approach to vector-based homomorphic tallying
                 remote voting",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "2",
  pages =        "211--221",
  month =        apr,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0279-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:45 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0279-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Yang:2016:MGE,
  author =       "Guomin Yang and Willy Susilo and Yi Mu",
  title =        "Message from the {Guest Editors}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "2",
  pages =        "223--224",
  month =        apr,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0315-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:45 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0315-3;
                 http://link.springer.com/content/pdf/10.1007/s10207-016-0315-3.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Rashwan:2016:UTP,
  author =       "Hatem A. Rashwan and Agusti Solanas and Dom{\`e}nec
                 Puig and Antoni Mart{\'\i}nez-Ballest{\'e}",
  title =        "Understanding trust in privacy-aware video
                 surveillance systems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "3",
  pages =        "225--234",
  month =        jun,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0286-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:45 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0286-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kurek:2016:TBC,
  author =       "Tytus Kurek and Marcin Niemiec and Artur Lason",
  title =        "Taking back control of privacy: a novel framework for
                 preserving cloud-based firewall policy
                 confidentiality",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "3",
  pages =        "235--250",
  month =        jun,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0292-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:45 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0292-y;
                 http://link.springer.com/content/pdf/10.1007/s10207-015-0292-y.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Orencik:2016:MKS,
  author =       "Cengiz Orencik and Ayse Selcuk and Erkay Savas and
                 Murat Kantarcio{\u{g}}lu",
  title =        "Multi-keyword search over encrypted data with scoring
                 and search pattern obfuscation",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "3",
  pages =        "251--269",
  month =        jun,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0294-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:45 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib;
                 http://www.math.utah.edu/pub/tex/bib/string-matching.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0294-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
  keywords =     "Efficiency Scoring; Encrypted cloud data; Privacy
                 preservation; Secure search",
}

@Article{Gritti:2016:BED,
  author =       "Cl{\'e}mentine Gritti and Willy Susilo and Thomas
                 Plantard and Kaitai Liang and Duncan S. Wong",
  title =        "Broadcast encryption with dealership",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "3",
  pages =        "271--283",
  month =        jun,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0285-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:45 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0285-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Mennink:2016:EPH,
  author =       "Bart Mennink and Bart Preneel",
  title =        "Efficient parallelizable hashing using small
                 non-compressing primitives",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "3",
  pages =        "285--300",
  month =        jun,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0288-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:45 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/hash.bib;
                 http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0288-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Abbes:2016:DFC,
  author =       "Tarek Abbes and Adel Bouhoula and Micha{\"e}l
                 Rusinowitch",
  title =        "Detection of firewall configuration errors with
                 updatable tree",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "3",
  pages =        "301--317",
  month =        jun,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0290-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:45 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0290-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Salini:2016:EPA,
  author =       "P. Salini and S. Kanmani",
  title =        "Effectiveness and performance analysis of
                 model-oriented security requirements engineering to
                 elicit security requirements: a systematic solution for
                 developing secure software systems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "3",
  pages =        "319--334",
  month =        jun,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0305-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:45 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0305-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Khayati:2016:PPP,
  author =       "Leyli Javid Khayati and Cengiz Orencik and Erkay Savas
                 and Berkant Ustao{\u{g}}lu",
  title =        "A practical privacy-preserving targeted advertising
                 scheme for {IPTV} users",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "4",
  pages =        "335--360",
  month =        aug,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0296-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:46 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0296-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Miao:2016:MDU,
  author =       "Qiguang Miao and Jiachen Liu and Ying Cao and Jianfeng
                 Song",
  title =        "Malware detection using bilayer behavior abstraction
                 and improved one-class support vector machines",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "4",
  pages =        "361--379",
  month =        aug,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0297-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:46 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0297-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Skoric:2016:FBR,
  author =       "Boris Skori{\'c} and Sebastiaan J. A. de Hoogh and
                 Nicola Zannone",
  title =        "Flow-based reputation with uncertainty: evidence-based
                 subjective logic",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "4",
  pages =        "381--402",
  month =        aug,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0298-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:46 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0298-5;
                 http://link.springer.com/content/pdf/10.1007/s10207-015-0298-5.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Vajda:2016:ATA,
  author =       "Istv{\'a}n Vajda",
  title =        "On the analysis of time-aware protocols in universal
                 composability framework",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "4",
  pages =        "403--412",
  month =        aug,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0300-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:46 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0300-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Diaz-Santiago:2016:CST,
  author =       "Sandra D{\'\i}az-Santiago and Lil Mar{\'\i}a
                 Rodr{\'\i}guez-Henr{\'\i}quez and Debrup Chakraborty",
  title =        "A cryptographic study of tokenization systems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "4",
  pages =        "413--432",
  month =        aug,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0313-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:46 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0313-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Malhi:2016:PPA,
  author =       "Avleen Malhi and Shalini Batra",
  title =        "Privacy-preserving authentication framework using
                 {Bloom} filter for secure vehicular communications",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "4",
  pages =        "433--453",
  month =        aug,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0299-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:46 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0299-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Anagnostopoulos:2016:NFM,
  author =       "Marios Anagnostopoulos and Georgios Kambourakis and
                 Stefanos Gritzalis",
  title =        "New facets of mobile botnet: architecture and
                 evaluation",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "5",
  pages =        "455--473",
  month =        oct,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0310-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:46 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0310-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Almaatouq:2016:IIL,
  author =       "Abdullah Almaatouq and Erez Shmueli and Mariam Nouh
                 and Ahmad Alabdulkareem and Vivek K. Singh and Mansour
                 Alsaleh and Abdulrahman Alarifi and Anas Alfaris and
                 Alex `Sandy' Pentland",
  title =        "If it looks like a spammer and behaves like a spammer,
                 it must be a spammer: analysis and detection of
                 microblogging spam accounts",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "5",
  pages =        "475--491",
  month =        oct,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0321-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:46 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0321-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Blanton:2016:POS,
  author =       "Marina Blanton and Everaldo Aguiar",
  title =        "Private and oblivious set and multiset operations",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "5",
  pages =        "493--518",
  month =        oct,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0301-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:46 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0301-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kiraz:2016:EVA,
  author =       "Mehmet Sabir Kiraz and Osmanbey Uzunkol",
  title =        "Efficient and verifiable algorithms for secure
                 outsourcing of cryptographic computations",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "5",
  pages =        "519--537",
  month =        oct,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0308-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:46 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0308-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Hu:2016:EWS,
  author =       "Changhui Hu and Lidong Han",
  title =        "Efficient wildcard search over encrypted data",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "5",
  pages =        "539--547",
  month =        oct,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0302-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:46 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib;
                 http://www.math.utah.edu/pub/tex/bib/string-matching.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0302-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
  keywords =     "Cloud computing; Searchable symmetric encryption;
                 Wildcard search",
}

@Article{Kasamatsu:2016:TSE,
  author =       "Kohei Kasamatsu and Takahiro Matsuda and Keita Emura
                 and Nuttapong Attrapadung and Goichiro Hanaoka and
                 Hideki Imai",
  title =        "Time-specific encryption from forward-secure
                 encryption: generic and direct constructions",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "5",
  pages =        "549--571",
  month =        oct,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0304-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:46 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0304-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Chen:2016:MGE,
  author =       "Liqun Chen and Chris Mitchell",
  title =        "Message from the guest editors",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "6",
  pages =        "573--574",
  month =        nov,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0353-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:46 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0353-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Rowe:2016:MPS,
  author =       "Paul D. Rowe and Joshua D. Guttman and Moses D.
                 Liskov",
  title =        "Measuring protocol strength with security goals",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "6",
  pages =        "575--596",
  month =        nov,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0319-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:46 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0319-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Manulis:2016:SMP,
  author =       "Mark Manulis and Douglas Stebila and Franziskus Kiefer
                 and Nick Denham",
  title =        "Secure modular password authentication for the web
                 using channel bindings",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "6",
  pages =        "597--620",
  month =        nov,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0348-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:46 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0348-7;
                 http://link.springer.com/content/pdf/10.1007/s10207-016-0348-7.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Brown:2016:API,
  author =       "Christopher W. Brown and Michael Jenkins",
  title =        "Analyzing proposals for improving authentication on
                 the {TLS-\slash SSL}-protected {Web}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "6",
  pages =        "621--635",
  month =        nov,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0316-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:46 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0316-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Degabriele:2016:UPC,
  author =       "Jean Paul Degabriele and Victoria Fehr and Marc
                 Fischlin and Tommaso Gagliardoni and Felix G{\"u}nther
                 and Giorgia Azzurra Marson and Arno Mittelbach and
                 Kenneth G. Paterson",
  title =        "Unpicking {PLAID}: a cryptographic analysis of an
                 {ISO}-standards-track authentication protocol",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "6",
  pages =        "637--657",
  month =        nov,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0309-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:46 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0309-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Cremers:2016:III,
  author =       "Cas Cremers and Marko Horvat",
  title =        "Improving the {ISO\slash IEC 11770} standard for key
                 management techniques",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "6",
  pages =        "659--673",
  month =        nov,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0306-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:46 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0306-9;
                 http://link.springer.com/content/pdf/10.1007/s10207-015-0306-9.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Poettering:2017:DAP,
  author =       "Bertram Poettering and Douglas Stebila",
  title =        "Double-authentication-preventing signatures",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "1",
  pages =        "1--22",
  month =        feb,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0307-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:47 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0307-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Li:2017:WOO,
  author =       "Lichun Li and Anwitaman Datta",
  title =        "Write-only oblivious {RAM}-based privacy-preserved
                 access of outsourced data",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "1",
  pages =        "23--42",
  month =        feb,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0329-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:47 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0329-x;
                 http://link.springer.com/content/pdf/10.1007/s10207-016-0329-x.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Karimi:2017:FMA,
  author =       "Vahid R. Karimi and Paulo S. C. Alencar and Donald D.
                 Cowan",
  title =        "A formal modeling and analysis approach for access
                 control rules, policies, and their combinations",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "1",
  pages =        "43--74",
  month =        feb,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0314-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:47 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0314-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Albertini:2017:EAC,
  author =       "Davide Alberto Albertini and Barbara Carminati and
                 Elena Ferrari",
  title =        "An extended access control mechanism exploiting data
                 dependencies",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "1",
  pages =        "75--89",
  month =        feb,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0322-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:47 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0322-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Shaikh:2017:DCM,
  author =       "Riaz Ahmed Shaikh and Kamel Adi and Luigi Logrippo",
  title =        "A Data Classification Method for Inconsistency and
                 Incompleteness Detection in Access Control Policy
                 Sets",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "1",
  pages =        "91--113",
  month =        feb,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0317-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:47 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0317-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Stevanovic:2017:MIC,
  author =       "Matija Stevanovic and Jens Myrup Pedersen and
                 Alessandro D'Alconzo and Stefan Ruehrup",
  title =        "A method for identifying compromised clients based on
                 {DNS} traffic analysis",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "2",
  pages =        "115--132",
  month =        apr,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0331-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:47 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0331-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Mehrnezhad:2017:PCI,
  author =       "Maryam Mehrnezhad and Abbas Ghaemi Bafghi and Ahad
                 Harati and Ehsan Toreini",
  title =        "{PiSHi}: click the images and {I} tell if you are a
                 human",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "2",
  pages =        "133--149",
  month =        apr,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0311-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:47 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0311-z;
                 http://link.springer.com/content/pdf/10.1007/s10207-015-0311-z.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Boyd:2017:AAK,
  author =       "Colin Boyd and Cas Cremers and Mich{\`e}le Feltz and
                 Kenneth G. Paterson and Bertram Poettering and Douglas
                 Stebila",
  title =        "{ASICS}: authenticated key exchange security
                 incorporating certification systems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "2",
  pages =        "151--171",
  month =        apr,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0312-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:47 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0312-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Tiloca:2017:IRD,
  author =       "Marco Tiloca and Christian Gehrmann and Ludwig Seitz",
  title =        "On improving resistance to {Denial of Service} and key
                 provisioning scalability of the {DTLS} handshake",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "2",
  pages =        "173--193",
  month =        apr,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0326-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:47 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0326-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Singh:2017:RUA,
  author =       "Ankit Singh and Hervais C. Simo Fhom",
  title =        "Restricted usage of anonymous credentials in vehicular
                 ad hoc networks for misbehavior detection",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "2",
  pages =        "195--211",
  month =        apr,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0328-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:47 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0328-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Mann:2017:TFA,
  author =       "Christopher Mann and Daniel Loebenberger",
  title =        "Two-factor authentication for the {Bitcoin} protocol",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "2",
  pages =        "213--226",
  month =        apr,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0325-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Thu Nov 30 16:02:10 MST 2017",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0325-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bat-Erdene:2017:EAC,
  author =       "Munkhbayar Bat-Erdene and Hyundo Park and Hongzhe Li
                 and Heejo Lee and Mahn-Soo Choi",
  title =        "Entropy analysis to classify unknown packing
                 algorithms for malware detection",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "3",
  pages =        "227--248",
  month =        jun,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0330-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:47 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0330-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bernardini:2017:MRP,
  author =       "Riccardo Bernardini and Roberto Rinaldo",
  title =        "Making random permutations from physically unclonable
                 constants",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "3",
  pages =        "249--261",
  month =        jun,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0324-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:47 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib;
                 http://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0324-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
  keywords =     "Physically unclonable functions; Privacy and security;
                 Random permutations",
}

@Article{Kim:2017:MES,
  author =       "Minchul Kim and Younghoon Jung and Junghwan Song",
  title =        "A modified exhaustive search on a password system
                 using {SHA-1}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "3",
  pages =        "263--269",
  month =        jun,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0332-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:47 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/hash.bib;
                 http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib;
                 http://www.math.utah.edu/pub/tex/bib/string-matching.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0332-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
  keywords =     "Exhaustive search; Microsoft Office; Password
                 cracking; Security evaluation; SHA-1",
}

@Article{Ragab-Hassen:2017:KMS,
  author =       "Hani Ragab-Hassen and Esma Lounes",
  title =        "A key management scheme evaluation using {Markov}
                 processes",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "3",
  pages =        "271--280",
  month =        jun,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0323-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:47 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0323-3;
                 http://link.springer.com/content/pdf/10.1007/s10207-016-0323-3.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Gunther:2017:LMT,
  author =       "Felix G{\"u}nther and Bertram Poettering",
  title =        "Linkable message tagging: solving the key distribution
                 problem of signature schemes",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "3",
  pages =        "281--297",
  month =        jun,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0327-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:47 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0327-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Lai:2017:EIB,
  author =       "Jianchang Lai and Yi Mu and Fuchun Guo",
  title =        "Efficient identity-based online\slash offline
                 encryption and signcryption with short ciphertext",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "3",
  pages =        "299--311",
  month =        jun,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0320-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:47 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0320-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kotzanikolaou:2017:BAR,
  author =       "Panayiotis Kotzanikolaou and George Chatzisofroniou
                 and Mike Burmester",
  title =        "Broadcast anonymous routing {(BAR)}: scalable
                 real-time anonymous communication",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "3",
  pages =        "313--326",
  month =        jun,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0318-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:47 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0318-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Catalano:2017:CAO,
  author =       "Dario Catalano and Dario Fiore and Rosario Gennaro",
  title =        "A certificateless approach to onion routing",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "3",
  pages =        "327--343",
  month =        jun,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0337-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:47 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0337-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Lazouski:2017:SDU,
  author =       "Aliaksandr Lazouski and Fabio Martinelli and Paolo
                 Mori and Andrea Saracino",
  title =        "Stateful Data Usage Control for {Android} Mobile
                 Devices",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "4",
  pages =        "345--369",
  month =        aug,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0336-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:48 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0336-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Ruiz-Heras:2017:AAB,
  author =       "A. Ruiz-Heras and P. Garc{\'\i}a-Teodoro and L.
                 S{\'a}nchez-Casado",
  title =        "{ADroid}: anomaly-based detection of malicious events
                 in {Android} platforms",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "4",
  pages =        "371--384",
  month =        aug,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0333-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:48 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0333-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Garg:2017:NBD,
  author =       "Shree Garg and Sateesh K. Peddoju and Anil K. Sarje",
  title =        "Network-based detection of {Android} malicious apps",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "4",
  pages =        "385--400",
  month =        aug,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0343-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:48 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0343-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kolias:2017:TDS,
  author =       "Constantinos Kolias and Vasilis Kolias and Georgios
                 Kambourakis",
  title =        "{TermID}: a distributed swarm intelligence-based
                 approach for wireless intrusion detection",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "4",
  pages =        "401--416",
  month =        aug,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0335-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:48 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0335-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Sampangi:2017:HSR,
  author =       "Raghav V. Sampangi and Srinivas Sampalli",
  title =        "{HiveSec}: security in resource-constrained wireless
                 networks inspired by beehives and bee swarms",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "4",
  pages =        "417--433",
  month =        aug,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0341-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:48 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0341-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Antunes:2017:DVT,
  author =       "Nuno Antunes and Marco Vieira",
  title =        "Designing vulnerability testing tools for web
                 services: approach, components, and tools",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "4",
  pages =        "435--457",
  month =        aug,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0334-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:48 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0334-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Sisaat:2017:STM,
  author =       "Khamphao Sisaat and Surin Kittitornkun and Hiroaki
                 Kikuchi and Chaxiong Yukonhiatou and Masato Terada and
                 Hiroshi Ishii",
  title =        "A spatio-temporal malware and country clustering
                 algorithm: {2012 IIJ MITF} case study",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "5",
  pages =        "459--473",
  month =        oct,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0342-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:48 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0342-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Duessel:2017:DZD,
  author =       "Patrick Duessel and Christian Gehl and Ulrich Flegel
                 and Sven Dietrich and Michael Meier",
  title =        "Detecting zero-day attacks using context-aware anomaly
                 detection at the application-layer",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "5",
  pages =        "475--490",
  month =        oct,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0344-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:48 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0344-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Arapinis:2017:APM,
  author =       "Myrto Arapinis and Loretta Ilaria Mancini and Eike
                 Ritter and Mark Dermot Ryan",
  title =        "Analysis of privacy in mobile telephony systems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "5",
  pages =        "491--523",
  month =        oct,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0338-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:48 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0338-9;
                 http://link.springer.com/content/pdf/10.1007/s10207-016-0338-9.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Huang:2017:MAP,
  author =       "Cheng-Ta Huang and Yu-Hong Zhang and Li-Chiun Lin and
                 Wei-Jen Wang and Shiuh-Jeng Wang",
  title =        "Mutual authentications to parties with {QR}-code
                 applications in mobile systems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "5",
  pages =        "525--540",
  month =        oct,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0349-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:48 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0349-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Alawatugoda:2017:GCM,
  author =       "Janaka Alawatugoda",
  title =        "Generic construction of an {eCK}-secure key exchange
                 protocol in the standard model",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "5",
  pages =        "541--557",
  month =        oct,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0346-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:48 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0346-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Zhang:2017:CIB,
  author =       "Lei Zhang and Qianhong Wu and Bo Qin and Hua Deng and
                 Jiangtao Li and Jianwei Liu and Wenchang Shi",
  title =        "Certificateless and identity-based authenticated
                 asymmetric group key agreement",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "5",
  pages =        "559--576",
  month =        oct,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0339-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:48 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0339-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Aliasgari:2017:SCH,
  author =       "Mehrdad Aliasgari and Marina Blanton and Fattaneh
                 Bayatbabolghani",
  title =        "Secure computation of hidden {Markov} models and
                 secure floating-point arithmetic in the malicious
                 model",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "6",
  pages =        "577--601",
  month =        nov,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0350-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:49 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/fparith.bib;
                 http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0350-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
  keywords =     "Floating point; Gaussian mixture models; Hidden Markov
                 models; Secure computation",
}

@Article{Li:2017:RRS,
  author =       "Lichun Li and Michael Militzer and Anwitaman Datta",
  title =        "{rPIR}: ramp secret sharing-based
                 communication-efficient private information retrieval",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "6",
  pages =        "603--625",
  month =        nov,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0347-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:49 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0347-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Esfahani:2017:EHM,
  author =       "Alireza Esfahani and Georgios Mantas and Jonathan
                 Rodriguez and Jos{\'e} Carlos Neves",
  title =        "An efficient homomorphic {MAC}-based scheme against
                 data and tag pollution attacks in network
                 coding-enabled wireless networks",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "6",
  pages =        "627--639",
  month =        nov,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0351-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:49 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0351-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kananizadeh:2017:DDP,
  author =       "Shahrzad Kananizadeh and Kirill Kononenko",
  title =        "Development of dynamic protection against timing
                 channels",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "6",
  pages =        "641--651",
  month =        nov,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0356-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:49 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0356-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Malatras:2017:EUI,
  author =       "Apostolos Malatras and Dimitris Geneiatakis and
                 Ioannis Vakalis",
  title =        "On the efficiency of user identification: a
                 system-based approach",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "6",
  pages =        "653--671",
  month =        nov,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0340-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:49 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0340-2;
                 http://link.springer.com/content/pdf/10.1007/s10207-016-0340-2.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Joh:2017:PSV,
  author =       "HyunChul Joh and Yashwant K. Malaiya",
  title =        "Periodicity in software vulnerability discovery,
                 patching and exploitation",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "6",
  pages =        "673--690",
  month =        nov,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0345-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:49 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0345-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Rial:2018:PPS,
  author =       "Alfredo Rial and George Danezis and Markulf
                 Kohlweiss",
  title =        "Privacy-preserving smart metering revisited",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "1",
  pages =        "1--31",
  month =        feb,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0355-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:49 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0355-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Deng:2018:SPT,
  author =       "Hua Deng and Yunya Zhou and Qianhong Wu and Bo Qin and
                 Jianwei Liu",
  title =        "Secure {pay-TV} for chained hotels",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "1",
  pages =        "33--42",
  month =        feb,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0354-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:49 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0354-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Yoneyama:2018:FMR,
  author =       "Kazuki Yoneyama",
  title =        "Formal modeling of random oracle programmability and
                 verification of signature unforgeability using
                 task-{PIOAs}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "1",
  pages =        "43--66",
  month =        feb,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0352-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:49 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0352-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bernardini:2018:GES,
  author =       "Riccardo Bernardini and Roberto Rinaldo",
  title =        "Generalized {Elias} schemes for efficient harvesting
                 of truly random bits",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "1",
  pages =        "67--81",
  month =        feb,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0358-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:49 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib;
                 http://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0358-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
  keywords =     "Gaussian random variables; Geometric random variables;
                 Random number conditioning; Random number generation;
                 Vector quantization",
}

@Article{Ayed:2018:ADS,
  author =       "Samiha Ayed and Muhammad Sabir Idrees and Nora Cuppens
                 and Frederic Cuppens",
  title =        "Achieving dynamicity in security policies enforcement
                 using aspects",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "1",
  pages =        "83--103",
  month =        feb,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0357-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:49 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0357-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Deepa:2018:BBD,
  author =       "G. Deepa and P. Santhi Thilagam and Furqan Ahmed Khan
                 and Amit Praseed and Alwyn R. Pais and Nushafreen
                 Palsetia",
  title =        "Black-box detection of {XQuery} injection and
                 parameter tampering vulnerabilities in web
                 applications",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "1",
  pages =        "105--120",
  month =        feb,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0359-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:49 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0359-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Shah:2018:MMM,
  author =       "Ankit Shah and Rajesh Ganesan and Sushil Jajodia and
                 Hasan Cam",
  title =        "A methodology to measure and monitor level of
                 operational effectiveness of a {CSOC}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "2",
  pages =        "121--134",
  month =        apr,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0365-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Mar 3 09:41:24 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0365-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Akiyama:2018:HDC,
  author =       "Mitsuaki Akiyama and Takeshi Yagi and Takeo Hariu and
                 Youki Kadobayashi",
  title =        "{HoneyCirculator}: distributing credential honeytoken
                 for introspection of web-based attack cycle",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "2",
  pages =        "135--151",
  month =        apr,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0361-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Mar 3 09:41:24 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0361-5;
                 http://link.springer.com/content/pdf/10.1007/s10207-017-0361-5.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kirubavathi:2018:SAD,
  author =       "G. Kirubavathi and R. Anitha",
  title =        "Structural analysis and detection of {Android} botnets
                 using machine learning techniques",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "2",
  pages =        "153--167",
  month =        apr,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0363-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Mar 3 09:41:24 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0363-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Gruber:2018:UTB,
  author =       "A. Gruber and I. Ben-Gal",
  title =        "Using targeted {Bayesian} network learning for suspect
                 identification in communication networks",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "2",
  pages =        "169--181",
  month =        apr,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0362-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Mar 3 09:41:24 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0362-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kuo:2018:DRA,
  author =       "Tsung-Min Kuo and Sung-Ming Yen and Meng-Che Han",
  title =        "Dynamic reversed accumulator",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "2",
  pages =        "183--191",
  month =        apr,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0360-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Mar 3 09:41:24 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0360-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
  keywords =     "Dynamic accumulator; Revocation; Zero-knowledge
                 proof",
}

@Article{Seo:2018:AOF,
  author =       "Jae Hong Seo and Keita Emura and Keita Xagawa and
                 Kazuki Yoneyama",
  title =        "Accumulable optimistic fair exchange from verifiably
                 encrypted homomorphic signatures",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "2",
  pages =        "193--220",
  month =        apr,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0367-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Mar 3 09:41:24 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0367-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Laszka:2018:GTA,
  author =       "Aron Laszka and Yevgeniy Vorobeychik and Xenofon
                 Koutsoukos",
  title =        "A game-theoretic approach for integrity assurance in
                 resource-bounded systems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "2",
  pages =        "221--242",
  month =        apr,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0364-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Mar 3 09:41:24 MST 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0364-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Domingo-Ferrer:2018:DGS,
  author =       "Josep Domingo-Ferrer and Alberto Blanco-Justicia and
                 Carla R{\`a}fols",
  title =        "Dynamic group size accreditation and group discounts
                 preserving anonymity",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "3",
  pages =        "243--260",
  month =        jun,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0368-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Mon Apr 16 12:27:34 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0368-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Luo:2018:ASI,
  author =       "Ying Luo and Sen-ching S. Cheung and Riccardo
                 Lazzeretti and Tommaso Pignata and Mauro Barni",
  title =        "Anonymous subject identification and privacy
                 information management in video surveillance",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "3",
  pages =        "261--278",
  month =        jun,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0380-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Mon Apr 16 12:27:34 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0380-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Martinez-Balleste:2018:DIS,
  author =       "Antoni Mart{\'\i}nez-Ballest{\'e} and Hatem Rashwan
                 and Domenec Puig and Agusti Solanas",
  title =        "Design and implementation of a secure and trustworthy
                 platform for privacy-aware video surveillance",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "3",
  pages =        "279--290",
  month =        jun,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0370-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Mon Apr 16 12:27:34 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0370-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Mehrnezhad:2018:SPM,
  author =       "Maryam Mehrnezhad and Ehsan Toreini and Siamak F.
                 Shahandashti and Feng Hao",
  title =        "Stealing {PINs} via mobile sensors: actual risk versus
                 user perception",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "3",
  pages =        "291--313",
  month =        jun,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0369-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Mon Apr 16 12:27:34 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0369-x;
                 http://link.springer.com/content/pdf/10.1007/s10207-017-0369-x.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Roy:2018:DSC,
  author =       "Sangita Roy and Ashok Singh Sairam",
  title =        "Distributed star coloring of network for {IP}
                 traceback",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "3",
  pages =        "315--326",
  month =        jun,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0366-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Mon Apr 16 12:27:34 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0366-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Faust:2018:OPM,
  author =       "Sebastian Faust and Carmit Hazay and Daniele Venturi",
  title =        "Outsourced pattern matching",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "3",
  pages =        "327--346",
  month =        jun,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0374-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Mon Apr 16 12:27:34 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib;
                 http://www.math.utah.edu/pub/tex/bib/string-matching.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0374-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Wang:2018:VEC,
  author =       "Yujue Wang and HweeHwa Pang and Robert H. Deng",
  title =        "Verifiably encrypted cascade-instantiable blank
                 signatures to secure progressive decision management",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "3",
  pages =        "347--363",
  month =        jun,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0372-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Mon Apr 16 12:27:34 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0372-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Gonzalez-Serrano:2018:SML,
  author =       "Francisco-Javier Gonz{\'a}lez-Serrano and Adri{\'a}n
                 Amor-Mart{\'\i}n and Jorge Casamay{\'o}n-Ant{\'o}n",
  title =        "Supervised machine learning using encrypted training
                 data",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "4",
  pages =        "365--377",
  month =        aug,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0381-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Jul 25 08:53:56 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0381-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Ham:2018:IYP,
  author =       "HyoungMin Ham and JongHyup Lee and JooSeok Song",
  title =        "Improved yoking proof protocols for preserving
                 anonymity",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "4",
  pages =        "379--393",
  month =        aug,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0383-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Jul 25 08:53:56 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0383-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Lanet:2018:WTM,
  author =       "Jean-Louis Lanet and H{\'e}l{\`e}ne {Le Bouder} and
                 Mohammed Benattou and Axel Legay",
  title =        "When time meets test",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "4",
  pages =        "395--409",
  month =        aug,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0371-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Jul 25 08:53:56 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0371-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Ali:2018:ZMN,
  author =       "Syed Taha Ali and Patrick McCorry and Peter Hyun-Jeen
                 Lee and Feng Hao",
  title =        "{ZombieCoin 2.0}: managing next-generation botnets
                 using {Bitcoin}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "4",
  pages =        "411--422",
  month =        aug,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0379-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Jul 25 08:53:56 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0379-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Yang:2018:NSS,
  author =       "Zheng Yang and Chao Liu and Wanping Liu and Daigu
                 Zhang and Song Luo",
  title =        "A new strong security model for stateful authenticated
                 group key exchange",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "4",
  pages =        "423--440",
  month =        aug,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0373-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Jul 25 08:53:56 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0373-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Morales-Sandoval:2018:PBC,
  author =       "Miguel Morales-Sandoval and Jose Luis Gonzalez-Compean
                 and Arturo Diaz-Perez and Victor J. Sosa-Sosa",
  title =        "A pairing-based cryptographic approach for data
                 security in the cloud",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "4",
  pages =        "441--461",
  month =        aug,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0375-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Jul 25 08:53:56 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0375-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Jiang:2018:FCP,
  author =       "Yinhao Jiang and Willy Susilo and Yi Mu and Fuchun
                 Guo",
  title =        "Flexible ciphertext-policy attribute-based encryption
                 supporting {AND}-gate and threshold with short
                 ciphertexts",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "4",
  pages =        "463--475",
  month =        aug,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0376-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Jul 25 08:53:56 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0376-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Jia:2018:ERH,
  author =       "Hongyong Jia and Yue Chen and Julong Lan and Kaixiang
                 Huang and Jun Wang",
  title =        "Efficient revocable hierarchical identity-based
                 encryption using cryptographic accumulators",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "4",
  pages =        "477--490",
  month =        aug,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0387-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Jul 25 08:53:56 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0387-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}