Valid HTML 4.0! Valid CSS!
%%% -*-BibTeX-*-
%%% ====================================================================
%%%  BibTeX-file{
%%%     author          = "Nelson H. F. Beebe",
%%%     version         = "1.33",
%%%     date            = "27 March 2024",
%%%     time            = "06:15:13 MST",
%%%     filename        = "intjinfosec.bib",
%%%     address         = "University of Utah
%%%                        Department of Mathematics, 110 LCB
%%%                        155 S 1400 E RM 233
%%%                        Salt Lake City, UT 84112-0090
%%%                        USA",
%%%     telephone       = "+1 801 581 5254",
%%%     FAX             = "+1 801 581 4148",
%%%     URL             = "https://www.math.utah.edu/~beebe",
%%%     checksum        = "28350 20240 76579 836681",
%%%     email           = "beebe at math.utah.edu, beebe at acm.org,
%%%                        beebe at computer.org (Internet)",
%%%     codetable       = "ISO/ASCII",
%%%     keywords        = "bibliography; BibTeX; International Journal
%%%                        of Information Security",
%%%     license         = "public domain",
%%%     supported       = "yes",
%%%     docstring       = "This is a COMPLETE bibliography of the
%%%                        International Journal of Information Security
%%%                        (CODEN none, ISSN 1615-5262 (print),
%%%                        1615-5270 (electronic)), published by
%%%                        Springer-Verlag.  Publication began with
%%%                        volume 1, number 1, in August 2001.  Journal
%%%                        issues appeared four times a year through
%%%                        2006, and since then, six times a year, with
%%%                        one volume per year.
%%%
%%%                        At version 1.33, the COMPLETE year coverage
%%%                        looked like this:
%%%
%%%                             2001 (   5)    2009 (  31)    2017 (  37)
%%%                             2002 (  10)    2010 (  26)    2018 (  43)
%%%                             2003 (   9)    2011 (  28)    2019 (  41)
%%%                             2004 (  22)    2012 (  29)    2020 (  47)
%%%                             2005 (  22)    2013 (  27)    2021 (  48)
%%%                             2006 (  22)    2014 (  35)    2022 (  78)
%%%                             2007 (  28)    2015 (  39)    2023 ( 110)
%%%                             2008 (  24)    2016 (  38)    2024 (  73)
%%%
%%%                             Article:        872
%%%
%%%                             Total entries:  872
%%%
%%%                        Data for this bibliography have been derived
%%%                        primarily from the publisher Web site, with
%%%                        contributions from the BibNet Project and TeX
%%%                        User Group bibliography archives.
%%%
%%%                        Numerous errors in the publisher metadata
%%%                        sources noted above have been corrected.
%%%                        Spelling has been verified with the UNIX
%%%                        spell and GNU ispell programs using the
%%%                        exception dictionary stored in the companion
%%%                        file with extension .sok.
%%%
%%%                        BibTeX citation tags are uniformly chosen
%%%                        as name:year:abbrev, where name is the
%%%                        family name of the first author or editor,
%%%                        year is a 4-digit number, and abbrev is a
%%%                        3-letter condensation of important title
%%%                        words. Citation tags were automatically
%%%                        generated by software developed for the
%%%                        BibNet Project.
%%%
%%%                        In this bibliography, journal entries are
%%%                        sorted in publication order, using
%%%                        bibsort -byvolume.
%%%
%%%                        The checksum field above contains a CRC-16
%%%                        checksum as the first value, followed by the
%%%                        equivalent of the standard UNIX wc (word
%%%                        count) utility output of lines, words, and
%%%                        characters.  This is produced by Robert
%%%                        Solovay's checksum utility.",
%%%  }
%%% ====================================================================
@Preamble{
 "\ifx \undefined \booktitle \def \booktitle#1{{{\em #1}}} \fi" #
 "\ifx \undefined \pkg       \def \pkg       #1{{{\tt #1}}} \fi"
}

%%% ====================================================================
%%% Acknowledgement abbreviations:
@String{ack-nhfb = "Nelson H. F. Beebe,
                    University of Utah,
                    Department of Mathematics, 110 LCB,
                    155 S 1400 E RM 233,
                    Salt Lake City, UT 84112-0090, USA,
                    Tel: +1 801 581 5254,
                    FAX: +1 801 581 4148,
                    e-mail: \path|beebe@math.utah.edu|,
                            \path|beebe@acm.org|,
                            \path|beebe@computer.org| (Internet),
                    URL: \path|https://www.math.utah.edu/~beebe/|"}

%%% ====================================================================
%%% Journal abbreviations:
@String{j-INT-J-INFO-SEC        = "International Journal of Information
                                  Security"}

%%% ====================================================================
%%% Bibliography entries, in publication order, with ``bibsort -byvol'':
@Article{Gollman:2001:E,
  author =       "Dieter Gollman and Catherine A. Meadows and Eiji
                 Okamoto",
  title =        "Editorial",
  journal =      j-INT-J-INFO-SEC,
  volume =       "1",
  number =       "1",
  pages =        "1--2",
  month =        aug,
  year =         "2001",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s102070100004",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:21 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s102070100004",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Landwehr:2001:CS,
  author =       "Carl E. Landwehr",
  title =        "Computer security",
  journal =      j-INT-J-INFO-SEC,
  volume =       "1",
  number =       "1",
  pages =        "3--13",
  month =        aug,
  year =         "2001",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s102070100003",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:21 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s102070100003",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{McHugh:2001:IID,
  author =       "John McHugh",
  title =        "Intrusion and intrusion detection",
  journal =      j-INT-J-INFO-SEC,
  volume =       "1",
  number =       "1",
  pages =        "14--35",
  month =        aug,
  year =         "2001",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s102070100001",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:21 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s102070100001",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Johnson:2001:ECD,
  author =       "Don Johnson and Alfred Menezes and Scott Vanstone",
  title =        "The {Elliptic Curve Digital Signature Algorithm
                 (ECDSA)}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "1",
  number =       "1",
  pages =        "36--63",
  month =        aug,
  year =         "2001",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s102070100002",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:21 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s102070100002",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Blundo:2001:PDI,
  author =       "Carlo Blundo and Paolo D'Arco and Alfredo {De
                 Santis}",
  title =        "A $t$-private $k$-database information retrieval
                 scheme",
  journal =      j-INT-J-INFO-SEC,
  volume =       "1",
  number =       "1",
  pages =        "64--68",
  month =        aug,
  year =         "2001",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s102070100005",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:21 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s102070100005",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Monrose:2002:PHB,
  author =       "Fabian Monrose and Michael K. Reiter and Susanne
                 Wetzel",
  title =        "Password hardening based on keystroke dynamics",
  journal =      j-INT-J-INFO-SEC,
  volume =       "1",
  number =       "2",
  pages =        "69--83",
  month =        feb,
  year =         "2002",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s102070100006",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:21 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s102070100006",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Rodeh:2002:UAT,
  author =       "Ohad Rodeh and Kenneth P. Birman and Danny Dolev",
  title =        "Using {AVL} trees for fault-tolerant group key
                 management",
  journal =      j-INT-J-INFO-SEC,
  volume =       "1",
  number =       "2",
  pages =        "84--99",
  month =        feb,
  year =         "2002",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s102070100008",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:21 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s102070100008",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Damiani:2002:SSS,
  author =       "E. Damiani and S. {De Capitani di Vimercati} and S.
                 Paraboschi and P. Samarati",
  title =        "Securing {SOAP} e-services",
  journal =      j-INT-J-INFO-SEC,
  volume =       "1",
  number =       "2",
  pages =        "100--115",
  month =        feb,
  year =         "2002",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s102070100009",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:21 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s102070100009",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kudo:2002:PPB,
  author =       "Michiharu Kudo",
  title =        "{PBAC}: Provision-based access control model",
  journal =      j-INT-J-INFO-SEC,
  volume =       "1",
  number =       "2",
  pages =        "116--130",
  month =        feb,
  year =         "2002",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s102070100010",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:21 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s102070100010",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Mizuki:2002:CCF,
  author =       "Takaaki Mizuki and Hiroki Shizuya and Takao
                 Nishizeki",
  title =        "A complete characterization of a family of key
                 exchange protocols",
  journal =      j-INT-J-INFO-SEC,
  volume =       "1",
  number =       "2",
  pages =        "131--142",
  month =        feb,
  year =         "2002",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s102070100011",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:21 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s102070100011",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Steinwandt:2002:APB,
  author =       "Rainer Steinwandt and Willi Geiselmann and Regine
                 Endsuleit",
  title =        "Attacking a polynomial-based cryptosystem: {Polly}
                 Cracker",
  journal =      j-INT-J-INFO-SEC,
  volume =       "1",
  number =       "3",
  pages =        "143--148",
  month =        nov,
  year =         "2002",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-002-0012-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:21 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-002-0012-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Itakura:2002:PPI,
  author =       "Yukio Itakura and Masaki Hashiyada and Toshio
                 Nagashima and Shigeo Tsujii",
  title =        "Proposal on personal identifiers generated from the
                 {STR} information of {DNA}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "1",
  number =       "3",
  pages =        "149--160",
  month =        nov,
  year =         "2002",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-002-0013-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:21 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-002-0013-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Nieto:2002:KRC,
  author =       "J. M. Gonz{\'a}les Nieto and K. Viswanathan and C.
                 Boyd and A. Clark and E. Dawson",
  title =        "Key recovery for the commercial environment",
  journal =      j-INT-J-INFO-SEC,
  volume =       "1",
  number =       "3",
  pages =        "161--174",
  month =        nov,
  year =         "2002",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-002-0014-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:21 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-002-0014-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kim:2002:NEC,
  author =       "S. Kim and H. Oh",
  title =        "A new electronic check system with reusable refunds",
  journal =      j-INT-J-INFO-SEC,
  volume =       "1",
  number =       "3",
  pages =        "175--188",
  month =        nov,
  year =         "2002",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-002-0015-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:21 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-002-0015-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Dawson:2002:CCP,
  author =       "Ed Dawson and Kapali Viswanathan and Colin Boyd",
  title =        "Compliant cryptologic protocols",
  journal =      j-INT-J-INFO-SEC,
  volume =       "1",
  number =       "3",
  pages =        "189--202",
  month =        nov,
  year =         "2002",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-002-0016-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:21 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-002-0016-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Korzhik:2003:HAB,
  author =       "Valery Korzhik and Guillermo Morales-Luna",
  title =        "Hybrid authentication based on noisy channels",
  journal =      j-INT-J-INFO-SEC,
  volume =       "1",
  number =       "4",
  pages =        "203--210",
  month =        jul,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-002-0017-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:22 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-002-0017-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Ruan:2003:FGB,
  author =       "Chun Ruan and Vijay Varadharajan",
  title =        "A formal graph based framework for supporting
                 authorization delegations and conflict resolutions",
  journal =      j-INT-J-INFO-SEC,
  volume =       "1",
  number =       "4",
  pages =        "211--222",
  month =        jul,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-003-0018-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:22 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-003-0018-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kremer:2003:FMP,
  author =       "Steve Kremer and Olivier Markowitch",
  title =        "Fair multi-party non-repudiation protocols",
  journal =      j-INT-J-INFO-SEC,
  volume =       "1",
  number =       "4",
  pages =        "223--235",
  month =        jul,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-003-0019-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:22 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-003-0019-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Carminati:2003:MAC,
  author =       "Barbara Carminati and Elena Ferrari",
  title =        "Management of access control policies for {XML}
                 document sources",
  journal =      j-INT-J-INFO-SEC,
  volume =       "1",
  number =       "4",
  pages =        "236--260",
  month =        jul,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-003-0020-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:22 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-003-0020-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{MacKenzie:2003:NCD,
  author =       "Philip MacKenzie and Michael K. Reiter",
  title =        "Networked cryptographic devices resilient to capture",
  journal =      j-INT-J-INFO-SEC,
  volume =       "2",
  number =       "1",
  pages =        "1--20",
  month =        nov,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-003-0022-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:22 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-003-0022-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Gurgens:2003:ACP,
  author =       "Sigrid G{\"u}rgens and Javier Lopez and Ren{\'e}
                 Peralta",
  title =        "Analysis of e-commerce protocols: Adapting a
                 traditional technique",
  journal =      j-INT-J-INFO-SEC,
  volume =       "2",
  number =       "1",
  pages =        "21--36",
  month =        nov,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-003-0021-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:22 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-003-0021-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Baek:2003:ZSP,
  author =       "Joonsang Baek and Yuliang Zheng",
  title =        "{Zheng} and {Seberry}'s public key encryption scheme
                 revisited",
  journal =      j-INT-J-INFO-SEC,
  volume =       "2",
  number =       "1",
  pages =        "37--44",
  month =        nov,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-003-0023-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:22 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-003-0023-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bertino:2003:CBF,
  author =       "Elisa Bertino and Elena Ferrari and Andrea Perego",
  title =        "Content-based filtering of {Web} documents: the {MaX}
                 system and the {EUFORBIA} project",
  journal =      j-INT-J-INFO-SEC,
  volume =       "2",
  number =       "1",
  pages =        "45--58",
  month =        nov,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-003-0024-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:22 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-003-0024-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Geiselmann:2003:AIP,
  author =       "Willi Geiselmann and Willi Meier and Rainer
                 Steinwandt",
  title =        "An attack on the isomorphisms of polynomials problem
                 with one secret",
  journal =      j-INT-J-INFO-SEC,
  volume =       "2",
  number =       "1",
  pages =        "59--64",
  month =        nov,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-003-0025-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:22 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-003-0025-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Dawson:2004:PSI,
  author =       "E. Dawson",
  title =        "Preface to the special issue on {PKI}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "2",
  number =       "2",
  pages =        "65--65",
  month =        jan,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-003-0031-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:22 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-003-0031-7;
                 http://link.springer.com/content/pdf/10.1007/s10207-003-0031-7.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Blakley:2004:ASN,
  author =       "B. Blakley and G. R. Blakley",
  title =        "All sail, no anchor {II}: Acceptable high-end {PKI}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "2",
  number =       "2",
  pages =        "66--77",
  month =        jan,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-003-0029-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:22 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-003-0029-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Russell:2004:TBR,
  author =       "Selwyn Russell",
  title =        "Theory and benefits of recursive certificate
                 structures",
  journal =      j-INT-J-INFO-SEC,
  volume =       "2",
  number =       "2",
  pages =        "78--90",
  month =        jan,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-003-0028-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:22 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-003-0028-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Lopez:2004:PDB,
  author =       "Javier Lopez and Antonio Ma{\~n}a and Jose A.
                 Montenegro and Juan J. Ortega",
  title =        "{PKI} design based on the use of on-line certification
                 authorities",
  journal =      j-INT-J-INFO-SEC,
  volume =       "2",
  number =       "2",
  pages =        "91--102",
  month =        jan,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-003-0027-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:22 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-003-0027-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Laih:2004:GVR,
  author =       "C. S. Laih and K. Y. Chen",
  title =        "Generating visible {RSA} public keys for {PKI}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "2",
  number =       "2",
  pages =        "103--109",
  month =        jan,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-003-0030-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:22 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-003-0030-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Munoz:2004:CRS,
  author =       "Jose L. Mu{\~n}oz and Jordi Forne and Oscar Esparza
                 and Miguel Soriano",
  title =        "Certificate revocation system implementation based on
                 the {Merkle} hash tree",
  journal =      j-INT-J-INFO-SEC,
  volume =       "2",
  number =       "2",
  pages =        "110--124",
  month =        jan,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-003-0026-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:22 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-003-0026-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Priami:2004:PSI,
  author =       "Corrado Priami",
  title =        "Preface to the special issue on {Security in Global
                 Computing}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "2",
  number =       "3--4",
  pages =        "125--125",
  month =        aug,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0034-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:23 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0034-z;
                 http://link.springer.com/content/pdf/10.1007/s10207-004-0034-z.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Teller:2004:UAC,
  author =       "David Teller and Pascal Zimmer and Daniel Hirschkoff",
  title =        "Using ambients to control resources",
  journal =      j-INT-J-INFO-SEC,
  volume =       "2",
  number =       "3--4",
  pages =        "126--144",
  month =        aug,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0035-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:23 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0035-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Buchholtz:2004:CCF,
  author =       "Mikael Buchholtz and Hanne Riis Nielson and Flemming
                 Nielson",
  title =        "A calculus for control flow analysis of security
                 protocols",
  journal =      j-INT-J-INFO-SEC,
  volume =       "2",
  number =       "3--4",
  pages =        "145--167",
  month =        aug,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0036-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:23 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0036-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Gorrieri:2004:AAT,
  author =       "Roberto Gorrieri and Ruggero Lanotte and Andrea
                 Maggiolo-Schettini and Fabio Martinelli and Simone Tini
                 and Enrico Tronci",
  title =        "Automated analysis of timed security: a case study on
                 web privacy",
  journal =      j-INT-J-INFO-SEC,
  volume =       "2",
  number =       "3--4",
  pages =        "168--186",
  month =        aug,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0037-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:23 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0037-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bartoletti:2004:SIS,
  author =       "Massimo Bartoletti and Pierpaolo Degano and Gian Luigi
                 Ferrari",
  title =        "Stack inspection and secure program transformations",
  journal =      j-INT-J-INFO-SEC,
  volume =       "2",
  number =       "3--4",
  pages =        "187--217",
  month =        aug,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0038-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:23 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0038-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{MacKenzie:2004:TPG,
  author =       "Philip MacKenzie and Michael K. Reiter",
  title =        "Two-party generation of {DSA} signatures",
  journal =      j-INT-J-INFO-SEC,
  volume =       "2",
  number =       "3--4",
  pages =        "218--239",
  month =        aug,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0041-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:23 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0041-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Waidner:2004:P,
  author =       "Michael Waidner",
  title =        "Preface",
  journal =      j-INT-J-INFO-SEC,
  volume =       "3",
  number =       "1",
  pages =        "1--1",
  month =        oct,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0051-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:23 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0051-y;
                 http://link.springer.com/content/pdf/10.1007/s10207-004-0051-y.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Hopcroft:2004:ASA,
  author =       "Philippa Hopcroft and Gavin Lowe",
  title =        "Analysing a stream authentication protocol using model
                 checking",
  journal =      j-INT-J-INFO-SEC,
  volume =       "3",
  number =       "1",
  pages =        "2--13",
  month =        oct,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0040-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:23 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0040-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Biskup:2004:CQE,
  author =       "Joachim Biskup and Piero Bonatti",
  title =        "Controlled query evaluation for enforcing
                 confidentiality in complete information systems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "3",
  number =       "1",
  pages =        "14--27",
  month =        oct,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0032-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:23 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0032-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Smith:2004:OAP,
  author =       "Sean W. Smith",
  title =        "Outbound authentication for programmable secure
                 coprocessors",
  journal =      j-INT-J-INFO-SEC,
  volume =       "3",
  number =       "1",
  pages =        "28--41",
  month =        oct,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0033-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:23 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0033-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Backes:2004:CPN,
  author =       "Michael Backes and Birgit Pfitzmann",
  title =        "Computational probabilistic noninterference",
  journal =      j-INT-J-INFO-SEC,
  volume =       "3",
  number =       "1",
  pages =        "42--60",
  month =        oct,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0039-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:23 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0039-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Daza:2004:PUI,
  author =       "Vanesa Daza and Javier Herranz and Germ{\'a}n
                 S{\'a}ez",
  title =        "Protocols useful on the {Internet} from distributed
                 signature schemes",
  journal =      j-INT-J-INFO-SEC,
  volume =       "3",
  number =       "2",
  pages =        "61--69",
  month =        nov,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0043-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:23 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0043-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Burgess:2004:GTM,
  author =       "Mark Burgess and Geoffrey Canright and Kenth
                 Eng{\o}-Monsen",
  title =        "A graph-theoretical model of computer security",
  journal =      j-INT-J-INFO-SEC,
  volume =       "3",
  number =       "2",
  pages =        "70--85",
  month =        nov,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0044-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:23 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0044-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Hitchcock:2004:ESM,
  author =       "Yvonne Hitchcock and Paul Montague and Gary Carter and
                 Ed Dawson",
  title =        "The efficiency of solving multiple discrete logarithm
                 problems and the implications for the security of fixed
                 elliptic curves",
  journal =      j-INT-J-INFO-SEC,
  volume =       "3",
  number =       "2",
  pages =        "86--98",
  month =        nov,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0045-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:23 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0045-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Mana:2004:FSE,
  author =       "Antonio Ma{\~n}a and Javier Lopez and Juan J. Ortega
                 and Ernesto Pimentel and Jose M. Troya",
  title =        "A framework for secure execution of software",
  journal =      j-INT-J-INFO-SEC,
  volume =       "3",
  number =       "2",
  pages =        "99--112",
  month =        nov,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0048-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:23 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0048-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Abie:2004:DDR,
  author =       "Habtamu Abie and P{\aa}l Spilling and Bent Foyn",
  title =        "A distributed digital rights management model for
                 secure information-distribution systems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "3",
  number =       "2",
  pages =        "113--128",
  month =        nov,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0058-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:23 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0058-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Autexier:2005:PSI,
  author =       "Serge Autexier and Iliano Cervesato and Heiko Mantel",
  title =        "Preface to the special issue of selected papers from
                 {FCS\slash VERIFY 2002}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "4",
  number =       "1--2",
  pages =        "1--1",
  month =        feb,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0053-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:24 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0053-9;
                 http://link.springer.com/content/pdf/10.1007/s10207-004-0053-9.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Ligatti:2005:EAE,
  author =       "Jay Ligatti and Lujo Bauer and David Walker",
  title =        "Edit automata: enforcement mechanisms for run-time
                 security policies",
  journal =      j-INT-J-INFO-SEC,
  volume =       "4",
  number =       "1--2",
  pages =        "2--16",
  month =        feb,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0046-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:24 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0046-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bella:2005:OVS,
  author =       "Giampaolo Bella and Fabio Massacci and Lawrence C.
                 Paulson",
  title =        "An overview of the verification of {SET}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "4",
  number =       "1--2",
  pages =        "17--28",
  month =        feb,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0047-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:24 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0047-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Guttman:2005:RAN,
  author =       "Joshua D. Guttman and Amy L. Herzog",
  title =        "Rigorous automated network security management",
  journal =      j-INT-J-INFO-SEC,
  volume =       "4",
  number =       "1--2",
  pages =        "29--48",
  month =        feb,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0052-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:24 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0052-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kusters:2005:DCP,
  author =       "Ralf K{\"u}sters",
  title =        "On the decidability of cryptographic protocols with
                 open-ended data structures",
  journal =      j-INT-J-INFO-SEC,
  volume =       "4",
  number =       "1--2",
  pages =        "49--70",
  month =        feb,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0050-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:24 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0050-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Lye:2005:GSN,
  author =       "Kong-wei Lye and Jeannette M. Wing",
  title =        "Game strategies in network security",
  journal =      j-INT-J-INFO-SEC,
  volume =       "4",
  number =       "1--2",
  pages =        "71--86",
  month =        feb,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0060-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:24 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0060-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Skalka:2005:SUB,
  author =       "Christian Skalka and Scott Smith",
  title =        "Static use-based object confinement",
  journal =      j-INT-J-INFO-SEC,
  volume =       "4",
  number =       "1--2",
  pages =        "87--104",
  month =        feb,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0049-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:24 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0049-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Lhee:2005:DFB,
  author =       "Kyung-suk Lhee and Steve J. Chapin",
  title =        "Detection of file-based race conditions",
  journal =      j-INT-J-INFO-SEC,
  volume =       "4",
  number =       "1--2",
  pages =        "105--119",
  month =        feb,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0068-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:24 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0068-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bai:2005:SAP,
  author =       "Yun Bai and Yan Zhang and Vijay Varadharajan",
  title =        "On the sequence of authorization policy
                 transformations",
  journal =      j-INT-J-INFO-SEC,
  volume =       "4",
  number =       "1--2",
  pages =        "120--131",
  month =        feb,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0069-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:24 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0069-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Snekkenes:2005:PSI,
  author =       "Einar Snekkenes",
  title =        "Preface to the special issue on {ESORICS 2003}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "4",
  number =       "3",
  pages =        "133--134",
  month =        jun,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0054-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:24 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0054-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Backes:2005:SAS,
  author =       "Michael Backes and Birgit Pfitzmann and Michael
                 Waidner",
  title =        "Symmetric authentication in a simulatable
                 {Dolev--Yao}-style cryptographic library",
  journal =      j-INT-J-INFO-SEC,
  volume =       "4",
  number =       "3",
  pages =        "135--154",
  month =        jun,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0056-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:24 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0056-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{vonOheimb:2005:ASM,
  author =       "David von Oheimb and Volkmar Lotz and Georg Walter",
  title =        "Analyzing {SLE 88} memory management security using
                 {Interacting State Machines}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "4",
  number =       "3",
  pages =        "155--171",
  month =        jun,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0057-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:24 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0057-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Serjantov:2005:PAA,
  author =       "Andrei Serjantov and Peter Sewell",
  title =        "Passive-attack analysis for connection-based anonymity
                 systems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "4",
  number =       "3",
  pages =        "172--180",
  month =        jun,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0059-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:24 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0059-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Basin:2005:OSM,
  author =       "David Basin and Sebastian M{\"o}dersheim and Luca
                 Vigan{\`o}",
  title =        "{OFMC}: a symbolic model checker for security
                 protocols",
  journal =      j-INT-J-INFO-SEC,
  volume =       "4",
  number =       "3",
  pages =        "181--208",
  month =        jun,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0055-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:24 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0055-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Trostle:2005:TIS,
  author =       "Jonathan Trostle and Bill Gossman",
  title =        "Techniques for improving the security and
                 manageability of {IPsec} policy",
  journal =      j-INT-J-INFO-SEC,
  volume =       "4",
  number =       "3",
  pages =        "209--226",
  month =        jun,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0064-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:24 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0064-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Boyd:2005:PSI,
  author =       "Colin Boyd and Wenbo Mao",
  title =        "Preface to the special issue on {ISC 2003}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "4",
  number =       "4",
  pages =        "227--227",
  month =        oct,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0066-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:25 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0066-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Galindo:2005:FOH,
  author =       "David Galindo and Sebasti{\`a} Mart{\'\i}n and Paz
                 Morillo and Jorge L. Villar",
  title =        "{Fujisaki--Okamoto} hybrid encryption revisited",
  journal =      j-INT-J-INFO-SEC,
  volume =       "4",
  number =       "4",
  pages =        "228--241",
  month =        oct,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0042-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:25 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0042-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Backes:2005:RSS,
  author =       "Michael Backes and Birgit Pfitzmann and Michael
                 Waidner",
  title =        "Reactively secure signature schemes",
  journal =      j-INT-J-INFO-SEC,
  volume =       "4",
  number =       "4",
  pages =        "242--252",
  month =        oct,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0062-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:25 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0062-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Gurgens:2005:SFN,
  author =       "Sigrid G{\"u}rgens and Carsten Rudolph and Holger
                 Vogt",
  title =        "On the security of fair non-repudiation protocols",
  journal =      j-INT-J-INFO-SEC,
  volume =       "4",
  number =       "4",
  pages =        "253--262",
  month =        oct,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0063-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:25 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0063-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Baldwin:2005:ESA,
  author =       "Adrian Baldwin and Simon Shiu",
  title =        "Enabling shared audit data",
  journal =      j-INT-J-INFO-SEC,
  volume =       "4",
  number =       "4",
  pages =        "263--276",
  month =        oct,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0061-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:25 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0061-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Atallah:2005:SOS,
  author =       "Mikhail J. Atallah and Jiangtao Li",
  title =        "Secure outsourcing of sequence comparisons",
  journal =      j-INT-J-INFO-SEC,
  volume =       "4",
  number =       "4",
  pages =        "277--287",
  month =        oct,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-005-0070-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:25 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-005-0070-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Itakura:2005:PMB,
  author =       "Yukio Itakura and Shigeo Tsujii",
  title =        "Proposal on a multifactor biometric authentication
                 method based on cryptosystem keys containing biometric
                 signatures",
  journal =      j-INT-J-INFO-SEC,
  volume =       "4",
  number =       "4",
  pages =        "288--296",
  month =        oct,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0065-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:25 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0065-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Gritzalis:2006:PKI,
  author =       "Stefanos Gritzalis",
  title =        "{Public Key Infrastructure}: Research and
                 Applications",
  journal =      j-INT-J-INFO-SEC,
  volume =       "5",
  number =       "1",
  pages =        "1--2",
  month =        jan,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-005-0075-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:25 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-005-0075-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Vanrenen:2006:DSM,
  author =       "Gabriel Vanrenen and Sean Smith and John Marchesini",
  title =        "Distributing security-mediated {PKI}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "5",
  number =       "1",
  pages =        "3--17",
  month =        jan,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-005-0076-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:25 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-005-0076-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Lioy:2006:PPP,
  author =       "Antonio Lioy and Marius Marian and Natalia Moltchanova
                 and Massimiliano Pala",
  title =        "{PKI} past, present and future",
  journal =      j-INT-J-INFO-SEC,
  volume =       "5",
  number =       "1",
  pages =        "18--29",
  month =        jan,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-005-0077-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:25 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-005-0077-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bohli:2006:KSA,
  author =       "Jens-Matthias Bohli and Stefan R{\"o}hrich and Rainer
                 Steinwandt",
  title =        "Key substitution attacks revisited: Taking into
                 account malicious signers",
  journal =      j-INT-J-INFO-SEC,
  volume =       "5",
  number =       "1",
  pages =        "30--36",
  month =        jan,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-005-0071-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:25 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-005-0071-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Zhou:2006:MTI,
  author =       "Jianying Zhou and Feng Bao and Robert Deng",
  title =        "Minimizing {TTP}'s involvement in signature
                 validation",
  journal =      j-INT-J-INFO-SEC,
  volume =       "5",
  number =       "1",
  pages =        "37--47",
  month =        jan,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-005-0072-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:25 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-005-0072-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Li:2006:USS,
  author =       "Ninghui Li and John C. Mitchell",
  title =        "Understanding {SPKI\slash SDSI} using first-order
                 logic",
  journal =      j-INT-J-INFO-SEC,
  volume =       "5",
  number =       "1",
  pages =        "48--64",
  month =        jan,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-005-0073-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:25 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-005-0073-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Zhou:2006:P,
  author =       "Jianying Zhou and Javier Lopez",
  title =        "Preface",
  journal =      j-INT-J-INFO-SEC,
  volume =       "5",
  number =       "2",
  pages =        "65--66",
  month =        apr,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-006-0087-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:25 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-006-0087-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Young:2006:CEU,
  author =       "Adam L. Young",
  title =        "Cryptoviral extortion using {Microsoft}'s Crypto
                 {API}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "5",
  number =       "2",
  pages =        "67--76",
  month =        apr,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-006-0082-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:25 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-006-0082-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Sidiroglou:2006:ETD,
  author =       "Stelios Sidiroglou and Angelos D. Keromytis",
  title =        "Execution transactions for defending against software
                 failures: use and evaluation",
  journal =      j-INT-J-INFO-SEC,
  volume =       "5",
  number =       "2",
  pages =        "77--91",
  month =        apr,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-006-0083-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:25 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-006-0083-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Nali:2006:HTB,
  author =       "Deholo Nali and Carlisle Adams and Ali Miri",
  title =        "Hierarchical time-based information release",
  journal =      j-INT-J-INFO-SEC,
  volume =       "5",
  number =       "2",
  pages =        "92--104",
  month =        apr,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-006-0084-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:25 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-006-0084-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Chakrabarti:2006:KPD,
  author =       "Dibyendu Chakrabarti and Subhamoy Maitra and Bimal
                 Roy",
  title =        "A key pre-distribution scheme for wireless sensor
                 networks: merging blocks in combinatorial design",
  journal =      j-INT-J-INFO-SEC,
  volume =       "5",
  number =       "2",
  pages =        "105--114",
  month =        apr,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-006-0085-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:25 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-006-0085-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Yeo:2006:SWE,
  author =       "Gary S.-W. Yeo and Raphael C.-W. Phan",
  title =        "On the security of the {WinRAR} encryption feature",
  journal =      j-INT-J-INFO-SEC,
  volume =       "5",
  number =       "2",
  pages =        "115--123",
  month =        apr,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-006-0086-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:25 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-006-0086-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Mayer:2006:OFA,
  author =       "Alain Mayer and Avishai Wool and Elisha Ziskind",
  title =        "Offline firewall analysis",
  journal =      j-INT-J-INFO-SEC,
  volume =       "5",
  number =       "3",
  pages =        "125--144",
  month =        jul,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-005-0074-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:26 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-005-0074-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Crescini:2006:PSD,
  author =       "Vino Fernando Crescini and Yan Zhang",
  title =        "{PolicyUpdater}: a system for dynamic access control",
  journal =      j-INT-J-INFO-SEC,
  volume =       "5",
  number =       "3",
  pages =        "145--165",
  month =        jul,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-005-0078-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:26 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-005-0078-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Tsunoo:2006:ICA,
  author =       "Yukiyasu Tsunoo and Etsuko Tsujihara and Maki Shigeri
                 and Hiroyasu Kubo and Kazuhiko Minematsu",
  title =        "Improving cache attacks by considering cipher
                 structure",
  journal =      j-INT-J-INFO-SEC,
  volume =       "5",
  number =       "3",
  pages =        "166--176",
  month =        jul,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-005-0079-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:26 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-005-0079-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Okeya:2006:SAC,
  author =       "Katsuyuki Okeya and Tsuyoshi Takagi",
  title =        "Security analysis of {CRT}-based cryptosystems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "5",
  number =       "3",
  pages =        "177--185",
  month =        jul,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-005-0080-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:26 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-005-0080-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{vanOorschot:2006:MSD,
  author =       "Paul C. van Oorschot and Jean-Marc Robert and Miguel
                 Vargas Martin",
  title =        "A monitoring system for detecting repeated packets
                 with applications to computer worms",
  journal =      j-INT-J-INFO-SEC,
  volume =       "5",
  number =       "3",
  pages =        "186--199",
  month =        jul,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-006-0081-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:26 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-006-0081-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Brandt:2006:HOF,
  author =       "Felix Brandt",
  title =        "How to obtain full privacy in auctions",
  journal =      j-INT-J-INFO-SEC,
  volume =       "5",
  number =       "4",
  pages =        "201--216",
  month =        oct,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-006-0001-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:26 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-006-0001-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Al-Riyami:2006:EFE,
  author =       "S. S. Al-Riyami and J. Malone-Lee and N. P. Smart",
  title =        "Escrow-free encryption supporting cryptographic
                 workflow",
  journal =      j-INT-J-INFO-SEC,
  volume =       "5",
  number =       "4",
  pages =        "217--229",
  month =        oct,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-006-0002-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:26 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-006-0002-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Ding:2006:CNT,
  author =       "Jintai Ding and Dieter Schmidt and Zhijun Yin",
  title =        "Cryptanalysis of the new {TTS} scheme in {CHES 2004}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "5",
  number =       "4",
  pages =        "231--240",
  month =        oct,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-006-0003-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:26 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-006-0003-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Nguyen:2006:VSF,
  author =       "Lan Nguyen and Rei Safavi-Naini and Kaoru Kurosawa",
  title =        "Verifiable shuffles: a formal model and a
                 Paillier-based three-round construction with provable
                 security",
  journal =      j-INT-J-INFO-SEC,
  volume =       "5",
  number =       "4",
  pages =        "241--255",
  month =        oct,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-006-0004-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:26 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-006-0004-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Giorgini:2006:RET,
  author =       "Paolo Giorgini and Fabio Massacci and John Mylopoulos
                 and Nicola Zannone",
  title =        "Requirements engineering for trust management: model,
                 methodology, and reasoning",
  journal =      j-INT-J-INFO-SEC,
  volume =       "5",
  number =       "4",
  pages =        "257--274",
  month =        oct,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-006-0005-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:26 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-006-0005-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Clarke:2007:AMP,
  author =       "N. L. Clarke and S. M. Furnell",
  title =        "Authenticating mobile phone users using keystroke
                 analysis",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "1",
  pages =        "1--14",
  month =        jan,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-006-0006-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:26 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-006-0006-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Blundo:2007:LRC,
  author =       "Carlo Blundo and Clemente Galdi and Giuseppe
                 Persiano",
  title =        "Low-randomness constant-round private {XOR}
                 computations",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "1",
  pages =        "15--26",
  month =        jan,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-006-0007-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:26 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-006-0007-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Wang:2007:HDA,
  author =       "Shujing Wang and Yan Zhang",
  title =        "Handling distributed authorization with delegation
                 through answer set programming",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "1",
  pages =        "27--46",
  month =        jan,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-006-0008-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:26 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-006-0008-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Konstantinou:2007:EGS,
  author =       "Elisavet Konstantinou and Yannis C. Stamatiou and
                 Christos Zaroliagis",
  title =        "Efficient generation of secure elliptic curves",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "1",
  pages =        "47--63",
  month =        jan,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-006-0009-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:26 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-006-0009-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Dimitrakos:2007:GEP,
  author =       "Theo Dimitrakos and Fabio Martinelli and Peter Y. A.
                 Ryan and Steve Schneider",
  title =        "{Guest Editors}' Preface",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "2--3",
  pages =        "65--66",
  month =        mar,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0012-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:27 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0012-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Zheng:2007:DSL,
  author =       "Lantian Zheng and Andrew C. Myers",
  title =        "Dynamic security labels and static information flow
                 control",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "2--3",
  pages =        "67--84",
  month =        mar,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0019-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:27 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0019-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{DeFrancesco:2007:ILS,
  author =       "Nicoletta {De Francesco} and Luca Martini",
  title =        "Instruction-level security typing by abstract
                 interpretation",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "2--3",
  pages =        "85--106",
  month =        mar,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0015-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:27 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0015-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kopf:2007:TTU,
  author =       "Boris K{\"o}pf and Heiko Mantel",
  title =        "Transformational typing and unification for
                 automatically correcting insecure programs",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "2--3",
  pages =        "107--131",
  month =        mar,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0016-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:27 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0016-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Cederquist:2007:ABC,
  author =       "J. G. Cederquist and R. Corin and M. A. C. Dekker and
                 S. Etalle and J. I. den Hartog and G. Lenzini",
  title =        "Audit-based compliance control",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "2--3",
  pages =        "133--151",
  month =        mar,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0017-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:27 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0017-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Krukow:2007:TS,
  author =       "Karl Krukow and Mogens Nielsen",
  title =        "Trust structures",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "2--3",
  pages =        "153--181",
  month =        mar,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0014-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:27 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0014-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Delicata:2007:AAV,
  author =       "Rob Delicata and Steve Schneider",
  title =        "An algebraic approach to the verification of a class
                 of {Diffie--Hellman} protocols",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "2--3",
  pages =        "183--196",
  month =        mar,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0013-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:27 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0013-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Gritzalis:2007:PMO,
  author =       "S. Gritzalis and A. N. Yannacopoulos and C.
                 Lambrinoudakis and P. Hatzopoulos and S. K. Katsikas",
  title =        "A probabilistic model for optimal insurance contracts
                 against security risks and privacy violation in {IT}
                 outsourcing environments",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "4",
  pages =        "197--211",
  month =        jul,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-006-0010-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:27 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-006-0010-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Chen:2007:IBK,
  author =       "L. Chen and Z. Cheng and N. P. Smart",
  title =        "Identity-based key agreement protocols from pairings",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "4",
  pages =        "213--241",
  month =        jul,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-006-0011-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:27 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-006-0011-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bohli:2007:SGK,
  author =       "Jens-Matthias Bohli and Mar{\'\i}a Isabel Gonz{\'a}lez
                 Vasco and Rainer Steinwandt",
  title =        "Secure group key establishment revisited",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "4",
  pages =        "243--254",
  month =        jul,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0018-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:27 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0018-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bertino:2007:SSP,
  author =       "Elisa Bertino and Elena Ferrari and Federica Paci and
                 Loredana Parasiliti Provenza",
  title =        "A system for securing push-based distribution of {XML}
                 documents",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "4",
  pages =        "255--284",
  month =        jul,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0020-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:27 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0020-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Knight:2007:IJI,
  author =       "Scott Knight and Scott Buffett and Patrick C. K.
                 Hung",
  title =        "The {{\booktitle{International Journal of Information
                 Security}}} Special Issue on privacy, security and
                 trust technologies and E-business services",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "5",
  pages =        "285--286",
  month =        sep,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0036-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:27 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0036-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Wu:2007:RFT,
  author =       "Zhengping Wu and Alfred C. Weaver",
  title =        "Requirements of federated trust management for
                 service-oriented architectures",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "5",
  pages =        "287--296",
  month =        sep,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0027-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:27 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0027-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Liu:2007:ICR,
  author =       "Jinshan Liu and Val{\'e}rie Issarny",
  title =        "An incentive compatible reputation mechanism for
                 ubiquitous computing environments",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "5",
  pages =        "297--311",
  month =        sep,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0029-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:27 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0029-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Levin:2007:WSL,
  author =       "Avner Levin",
  title =        "Is workplace surveillance legal in {Canada}?",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "5",
  pages =        "313--321",
  month =        sep,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0026-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:27 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0026-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Lauer:2007:BOT,
  author =       "Thomas W. Lauer and Xiaodong Deng",
  title =        "Building online trust through privacy practices",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "5",
  pages =        "323--331",
  month =        sep,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0028-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:27 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0028-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Zhang:2007:FBT,
  author =       "Jie Zhang and Ali A. Ghorbani and Robin Cohen",
  title =        "A familiarity-based trust model for effective
                 selection of sellers in multiagent e-commerce systems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "5",
  pages =        "333--344",
  month =        sep,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0025-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:27 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0025-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Zulkernine:2007:ISS,
  author =       "Mohammad Zulkernine and Mathews Graves and Muhammad
                 Umair Ahmed Khan",
  title =        "Integrating software specifications into intrusion
                 detection",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "5",
  pages =        "345--357",
  month =        sep,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0023-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:27 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0023-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Backes:2007:P,
  author =       "Michael Backes and Stefanos Gritzalis and Bart
                 Preneel",
  title =        "Preface",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "6",
  pages =        "359--360",
  month =        oct,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0034-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:28 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0034-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Anagnostakis:2007:CDR,
  author =       "Kostas G. Anagnostakis and Michael B. Greenwald and
                 Sotiris Ioannidis and Angelos D. Keromytis",
  title =        "{COVERAGE}: detecting and reacting to worm epidemics
                 using cooperation and validation",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "6",
  pages =        "361--378",
  month =        oct,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0032-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:28 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0032-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bononi:2007:IDS,
  author =       "Luciano Bononi and Carlo Tacconi",
  title =        "Intrusion detection for secure clustering and routing
                 in {Mobile Multi-hop Wireless Networks}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "6",
  pages =        "379--392",
  month =        oct,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0035-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:28 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0035-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Danezis:2007:BFM,
  author =       "George Danezis",
  title =        "Breaking four mix-related schemes based on {Universal
                 Re-encryption}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "6",
  pages =        "393--402",
  month =        oct,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0033-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:28 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0033-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
  keywords =     "Anonymous communications; El-Gamal encryption; rWonGoo
                 anonymous channel; Traffic analysis; Universal
                 re-encryption",
  remark =       "From the abstract: ``Universal Re-encryption allows
                 El-Gamal ciphertexts to be re-encrypted without
                 knowledge of their corresponding public keys. This has
                 made it an enticing building block for anonymous
                 communications protocols. \ldots{} [we] find serious
                 weaknesses in all of them.''",
}

@Article{Esponda:2007:PDP,
  author =       "Fernando Esponda and Elena S. Ackley and Paul Helman
                 and Haixia Jia and Stephanie Forrest",
  title =        "Protecting data privacy through hard-to-reverse
                 negative databases",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "6",
  pages =        "403--415",
  month =        oct,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0030-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:28 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0030-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Klinkoff:2007:ENS,
  author =       "Patrick Klinkoff and Engin Kirda and Christopher
                 Kruegel and Giovanni Vigna",
  title =        "Extending {.NET} security to unmanaged code",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "6",
  pages =        "417--428",
  month =        oct,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0031-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:28 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0031-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Degano:2008:P,
  author =       "Pierpaolo Degano and Luca Vigan{\`o}",
  title =        "Preface",
  journal =      j-INT-J-INFO-SEC,
  volume =       "7",
  number =       "1",
  pages =        "1--1",
  month =        jan,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0038-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:28 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0038-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Armando:2008:SBM,
  author =       "Alessandro Armando and Luca Compagna",
  title =        "{SAT}-based model-checking for security protocols
                 analysis",
  journal =      j-INT-J-INFO-SEC,
  volume =       "7",
  number =       "1",
  pages =        "3--32",
  month =        jan,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0041-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:28 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0041-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Backes:2008:LBU,
  author =       "Michael Backes and Birgit Pfitzmann",
  title =        "Limits of the {BRSIM\slash UC} soundness of
                 {Dolev--Yao}-style {XOR}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "7",
  number =       "1",
  pages =        "33--54",
  month =        jan,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0040-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:28 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0040-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bracciali:2008:SFM,
  author =       "Andrea Bracciali and Gianluigi Ferrari and Emilio
                 Tuosto",
  title =        "A symbolic framework for multi-faceted security
                 protocol analysis",
  journal =      j-INT-J-INFO-SEC,
  volume =       "7",
  number =       "1",
  pages =        "55--84",
  month =        jan,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0043-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:28 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0043-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Estevez-Tapiador:2008:BRE,
  author =       "Juan M. Estevez-Tapiador and Almudena Alcaide and
                 Julio C. Hernandez-Castro and Arturo Ribagorda",
  title =        "{Bayesian} rational exchange",
  journal =      j-INT-J-INFO-SEC,
  volume =       "7",
  number =       "1",
  pages =        "85--100",
  month =        jan,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0039-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:28 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0039-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Gollmann:2008:E,
  author =       "Dieter Gollmann",
  title =        "Editorial",
  journal =      j-INT-J-INFO-SEC,
  volume =       "7",
  number =       "2",
  pages =        "101--101",
  month =        apr,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0052-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:28 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0052-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Alfaro:2008:CAC,
  author =       "J. G. Alfaro and N. Boulahia-Cuppens and F. Cuppens",
  title =        "Complete analysis of configuration rules to guarantee
                 reliable network security policies",
  journal =      j-INT-J-INFO-SEC,
  volume =       "7",
  number =       "2",
  pages =        "103--122",
  month =        apr,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0045-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:28 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0045-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Crampton:2008:DRB,
  author =       "Jason Crampton and Hemanth Khambhammettu",
  title =        "Delegation in role-based access control",
  journal =      j-INT-J-INFO-SEC,
  volume =       "7",
  number =       "2",
  pages =        "123--136",
  month =        apr,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0044-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:28 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0044-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Fong:2008:DCC,
  author =       "Philip W. L. Fong",
  title =        "Discretionary capability confinement",
  journal =      j-INT-J-INFO-SEC,
  volume =       "7",
  number =       "2",
  pages =        "137--154",
  month =        apr,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0047-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:28 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0047-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Backes:2008:CRS,
  author =       "Michael Backes and Markus D{\"u}rmuth and Dennis
                 Hofheinz and Ralf K{\"u}sters",
  title =        "Conditional reactive simulatability",
  journal =      j-INT-J-INFO-SEC,
  volume =       "7",
  number =       "2",
  pages =        "155--169",
  month =        apr,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0046-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:28 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0046-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Huang:2008:SUD,
  author =       "Xinyi Huang and Willy Susilo and Yi Mu and Wei Wu",
  title =        "Secure universal designated verifier signature without
                 random oracles",
  journal =      j-INT-J-INFO-SEC,
  volume =       "7",
  number =       "3",
  pages =        "171--183",
  month =        jun,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0021-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:29 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0021-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Chen:2008:IID,
  author =       "Pei-Te Chen and Chi-Sung Laih",
  title =        "{IDSIC}: an intrusion detection system with
                 identification capability",
  journal =      j-INT-J-INFO-SEC,
  volume =       "7",
  number =       "3",
  pages =        "185--197",
  month =        jun,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0024-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:29 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0024-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Biskup:2008:KSI,
  author =       "Joachim Biskup and Torben Weibert",
  title =        "Keeping secrets in incomplete databases",
  journal =      j-INT-J-INFO-SEC,
  volume =       "7",
  number =       "3",
  pages =        "199--217",
  month =        jun,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0037-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:29 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0037-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Aldini:2008:EMI,
  author =       "Alessandro Aldini and Alessandra {Di Pierro}",
  title =        "Estimating the maximum information leakage",
  journal =      j-INT-J-INFO-SEC,
  volume =       "7",
  number =       "3",
  pages =        "219--242",
  month =        jun,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0050-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:29 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0050-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Wang:2008:MLF,
  author =       "XiaoFeng Wang and Michael K. Reiter",
  title =        "A multi-layer framework for puzzle-based
                 denial-of-service defense",
  journal =      j-INT-J-INFO-SEC,
  volume =       "7",
  number =       "4",
  pages =        "243--263",
  month =        aug,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0042-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:29 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0042-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Tartary:2008:CAM,
  author =       "Christophe Tartary and Huaxiong Wang and Josef
                 Pieprzyk",
  title =        "A coding approach to the multicast stream
                 authentication problem",
  journal =      j-INT-J-INFO-SEC,
  volume =       "7",
  number =       "4",
  pages =        "265--283",
  month =        aug,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0048-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:29 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0048-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Cuppens:2008:MCS,
  author =       "Fr{\'e}d{\'e}ric Cuppens and Nora Cuppens-Boulahia",
  title =        "Modeling contextual security policies",
  journal =      j-INT-J-INFO-SEC,
  volume =       "7",
  number =       "4",
  pages =        "285--305",
  month =        aug,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0051-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:29 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0051-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Aimeur:2008:LPP,
  author =       "Esma A{\"\i}meur and Gilles Brassard and Jos{\'e} M.
                 Fernandez and Flavien Serge Mani Onana",
  title =        "{{\sc Alambic}}: a privacy-preserving recommender
                 system for electronic commerce",
  journal =      j-INT-J-INFO-SEC,
  volume =       "7",
  number =       "5",
  pages =        "307--334",
  month =        oct,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0049-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:29 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0049-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Corbett:2008:PCW,
  author =       "Cherita L. Corbett and Raheem A. Beyah and John A.
                 Copeland",
  title =        "Passive classification of wireless {NICs} during
                 active scanning",
  journal =      j-INT-J-INFO-SEC,
  volume =       "7",
  number =       "5",
  pages =        "335--348",
  month =        oct,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0053-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:29 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0053-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Dent:2008:SCE,
  author =       "Alexander W. Dent",
  title =        "A survey of certificateless encryption schemes and
                 security models",
  journal =      j-INT-J-INFO-SEC,
  volume =       "7",
  number =       "5",
  pages =        "349--377",
  month =        oct,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-008-0055-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:29 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-008-0055-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Zhao:2008:NAP,
  author =       "Chang-An Zhao and Fangguo Zhang and Jiwu Huang",
  title =        "A note on the {Ate} pairing",
  journal =      j-INT-J-INFO-SEC,
  volume =       "7",
  number =       "6",
  pages =        "379--382",
  month =        nov,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-008-0054-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:30 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-008-0054-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Imamoto:2008:AEC,
  author =       "Kenji Imamoto and Jianying Zhou and Kouichi Sakurai",
  title =        "Achieving evenhandedness in certified email system for
                 contract signing",
  journal =      j-INT-J-INFO-SEC,
  volume =       "7",
  number =       "6",
  pages =        "383--394",
  month =        nov,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-008-0056-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:30 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-008-0056-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Balopoulos:2008:SIP,
  author =       "Theodoros Balopoulos and Stefanos Gritzalis and
                 Sokratis K. Katsikas",
  title =        "Specifying and implementing privacy-preserving
                 cryptographic protocols",
  journal =      j-INT-J-INFO-SEC,
  volume =       "7",
  number =       "6",
  pages =        "395--420",
  month =        nov,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-008-0057-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:30 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-008-0057-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bryans:2008:OGT,
  author =       "Jeremy W. Bryans and Maciej Koutny and Laurent
                 Mazar{\'e} and Peter Y. A. Ryan",
  title =        "Opacity generalised to transition systems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "7",
  number =       "6",
  pages =        "421--435",
  month =        nov,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-008-0058-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:30 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-008-0058-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Lu:2009:RKR,
  author =       "Jiqiang Lu",
  title =        "Related-key rectangle attack on 36 rounds of the
                 {XTEA} block cipher",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "1",
  pages =        "1--11",
  month =        feb,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-008-0059-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:30 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-008-0059-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Yoshino:2009:BMM,
  author =       "Masayuki Yoshino and Katsuyuki Okeya and Camille
                 Vuillaume",
  title =        "Bipartite modular multiplication with twice the
                 bit-length of multipliers",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "1",
  pages =        "13--23",
  month =        feb,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-008-0060-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:30 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-008-0060-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Tian:2009:LSN,
  author =       "Daxin Tian and Yanheng Liu and Yang Xiang",
  title =        "Large-scale network intrusion detection based on
                 distributed learning algorithm",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "1",
  pages =        "25--35",
  month =        feb,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-008-0061-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:30 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-008-0061-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Cheng:2009:CKA,
  author =       "Jiin-Chiou Cheng and Chi-Sung Laih",
  title =        "Conference key agreement protocol with non-interactive
                 fault-tolerance over broadcast network",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "1",
  pages =        "37--48",
  month =        feb,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-008-0062-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:30 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-008-0062-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Mashatan:2009:ITC,
  author =       "Atefeh Mashatan and Douglas R. Stinson",
  title =        "Interactive two-channel message authentication based
                 on {Interactive--Collision Resistant} hash functions",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "1",
  pages =        "49--60",
  month =        feb,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-008-0063-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:30 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-008-0063-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
  keywords =     "Interactive--Collision Resistant (ICR) hash function",
}

@Article{Narasimha:2009:PPR,
  author =       "M. Narasimha and J. Solis and G. Tsudik",
  title =        "Privacy-preserving revocation checking",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "1",
  pages =        "61--75",
  month =        feb,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-008-0064-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:30 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-008-0064-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Elmufti:2009:MWS,
  author =       "Kalid Elmufti and Dasun Weerasinghe and M. Rajarajan
                 and Veselin Rakocevic and Sanowar Khan and John A.
                 MacDonald",
  title =        "Mobile {Web} services authentication using {SAML} and
                 {3GPP} generic bootstrapping architecture",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "2",
  pages =        "77--87",
  month =        apr,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-008-0065-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:30 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-008-0065-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Li:2009:DSA,
  author =       "Jiangtao Li and Ninghui Li and XiaoFeng Wang and Ting
                 Yu",
  title =        "Denial of service attacks and defenses in
                 decentralized trust management",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "2",
  pages =        "89--101",
  month =        apr,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-008-0068-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:30 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-008-0068-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Quinn:2009:AAE,
  author =       "Karl Quinn and David Lewis and Declan O'Sullivan and
                 Vincent P. Wade",
  title =        "An analysis of accuracy experiments carried out over
                 of a multi-faceted model of trust",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "2",
  pages =        "103--119",
  month =        apr,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-008-0069-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:30 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-008-0069-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Vasserman:2009:IKN,
  author =       "Eugene Y. Vasserman and Nicholas Hopper and James
                 Tyra",
  title =        "{{\sc SilentKnock}}: practical, provably undetectable
                 authentication",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "2",
  pages =        "121--135",
  month =        apr,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-008-0070-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:30 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-008-0070-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Chadwick:2009:ASX,
  author =       "David W. Chadwick and Sassa Otenko and Tuan Anh
                 Nguyen",
  title =        "Adding support to {XACML} for multi-domain user to
                 user dynamic delegation of authority",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "2",
  pages =        "137--152",
  month =        apr,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-008-0073-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:30 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-008-0073-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Wu:2009:IDV,
  author =       "Yu-Sung Wu and Vinita Apte and Saurabh Bagchi and
                 Sachin Garg and Navjot Singh",
  title =        "Intrusion detection in voice over {IP} environments",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "3",
  pages =        "153--172",
  month =        jun,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-008-0071-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:31 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-008-0071-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kuper:2009:GXS,
  author =       "Gabriel Kuper and Fabio Massacci and Nataliya
                 Rassadko",
  title =        "Generalized {XML} security views",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "3",
  pages =        "173--203",
  month =        jun,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-008-0074-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:31 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-008-0074-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Harn:2009:EIB,
  author =       "Lein Harn and Jian Ren and Changlu Lin",
  title =        "Efficient identity-based {GQ} multisignatures",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "3",
  pages =        "205--210",
  month =        jun,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-008-0072-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:31 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-008-0072-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Cook:2009:EBC,
  author =       "Debra L. Cook and Moti Yung and Angelos D. Keromytis",
  title =        "Elastic block ciphers: method, security and
                 instantiations",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "3",
  pages =        "211--231",
  month =        jun,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-008-0075-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:31 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-008-0075-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Sourour:2009:ESD,
  author =       "Meharouech Sourour and Bouhoula Adel and Abbes Tarek",
  title =        "Ensuring security in depth based on heterogeneous
                 network security technologies",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "4",
  pages =        "233--246",
  month =        aug,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-009-0077-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:31 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-009-0077-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Desoky:2009:LLB,
  author =       "Abdelrahman Desoky",
  title =        "{Listega}: list-based steganography methodology",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "4",
  pages =        "247--261",
  month =        aug,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-009-0079-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:31 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-009-0079-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
  keywords =     "List-Based Steganography Methodology (Listega)",
}

@Article{Lee:2009:RTB,
  author =       "Sangho Lee and Jong Kim and Sung Je Hong",
  title =        "Redistributing time-based rights between consumer
                 devices for content sharing in {DRM} system",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "4",
  pages =        "263--273",
  month =        aug,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-009-0082-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:31 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-009-0082-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Shay:2009:CST,
  author =       "Richard Shay and Elisa Bertino",
  title =        "A comprehensive simulation tool for the analysis of
                 password policies",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "4",
  pages =        "275--289",
  month =        aug,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-009-0084-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:31 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-009-0084-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Koshutanski:2009:EGS,
  author =       "Hristo Koshutanski and Aliaksandr Lazouski and Fabio
                 Martinelli and Paolo Mori",
  title =        "Enhancing grid security by fine-grained behavioral
                 control and negotiation-based authorization",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "4",
  pages =        "291--314",
  month =        aug,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-009-0083-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:31 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-009-0083-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Brickell:2009:SSN,
  author =       "Ernie Brickell and Liqun Chen and Jiangtao Li",
  title =        "Simplified security notions of direct anonymous
                 attestation and a concrete scheme from pairings",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "5",
  pages =        "315--330",
  month =        oct,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-009-0076-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:31 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-009-0076-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Esponda:2009:NRI,
  author =       "Fernando Esponda and Stephanie Forrest and Paul
                 Helman",
  title =        "Negative representations of information",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "5",
  pages =        "331--345",
  month =        oct,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-009-0078-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:31 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-009-0078-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Hasegawa:2009:PFC,
  author =       "Shingo Hasegawa and Shuji Isobe and Hiroki Shizuya and
                 Katsuhiro Tashiro",
  title =        "On the pseudo-freeness and the {CDH} assumption",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "5",
  pages =        "347--355",
  month =        oct,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-009-0087-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:31 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-009-0087-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Geron:2009:CCR,
  author =       "Erel Geron and Avishai Wool",
  title =        "{CRUST}: cryptographic remote untrusted storage
                 without public keys",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "5",
  pages =        "357--377",
  month =        oct,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-009-0081-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:31 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-009-0081-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Qin:2009:SSS,
  author =       "Huawang Qin and Yuewei Dai and Zhiquan Wang",
  title =        "A secret sharing scheme based on $ (t, n) $ threshold
                 and adversary structure",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "5",
  pages =        "379--385",
  month =        oct,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-009-0085-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:31 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-009-0085-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Chiasson:2009:UID,
  author =       "Sonia Chiasson and Alain Forget and Robert Biddle and
                 P. C. van Oorschot",
  title =        "User interface design affects security: patterns in
                 click-based graphical passwords",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "6",
  pages =        "387--398",
  month =        dec,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-009-0080-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:32 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-009-0080-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Hammer:2009:FSC,
  author =       "Christian Hammer and Gregor Snelting",
  title =        "Flow-sensitive, context-sensitive, and
                 object-sensitive information flow control based on
                 program dependence graphs",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "6",
  pages =        "399--422",
  month =        dec,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-009-0086-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:32 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-009-0086-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{An:2009:UIC,
  author =       "Xiangdong An and Dawn Jutla and Nick Cercone and
                 Charnyote Pluempitiwiriyawej and Hai Wang",
  title =        "Uncertain inference control in privacy protection",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "6",
  pages =        "423--431",
  month =        dec,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-009-0088-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:32 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-009-0088-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Sajedi:2009:SSB,
  author =       "Hedieh Sajedi and Mansour Jamzad",
  title =        "Secure steganography based on embedding capacity",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "6",
  pages =        "433--445",
  month =        dec,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-009-0089-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:32 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-009-0089-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Plaga:2009:BKS,
  author =       "Rainer Plaga",
  title =        "Biometric keys: suitable use cases and achievable
                 information content",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "6",
  pages =        "447--454",
  month =        dec,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-009-0090-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:32 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-009-0090-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kozina:2009:MIW,
  author =       "Mario Kozina and Marin Golub and Stjepan Gros",
  title =        "A method for identifying {Web} applications",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "6",
  pages =        "455--467",
  month =        dec,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-009-0092-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:32 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-009-0092-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Zheng:2010:AAB,
  author =       "Ruijuan Zheng and Mingchuan Zhang and Qingtao Wu and
                 Shibao Sun and Jiexin Pu",
  title =        "Analysis and application of {Bio-Inspired Multi-Net
                 Security Model}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "9",
  number =       "1",
  pages =        "1--17",
  month =        feb,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-009-0091-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:32 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-009-0091-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Han:2010:CBI,
  author =       "Shui-Hua Han and Chao-Hsien Chu",
  title =        "Content-based image authentication: current status,
                 issues, and challenges",
  journal =      j-INT-J-INFO-SEC,
  volume =       "9",
  number =       "1",
  pages =        "19--32",
  month =        feb,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-009-0093-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:32 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-009-0093-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Goldschlag:2010:THB,
  author =       "David M. Goldschlag and Stuart G. Stubblebine and Paul
                 F. Syverson",
  title =        "Temporarily hidden bit commitment and lottery
                 applications",
  journal =      j-INT-J-INFO-SEC,
  volume =       "9",
  number =       "1",
  pages =        "33--50",
  month =        feb,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-009-0094-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:32 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-009-0094-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Chakraborty:2010:CDB,
  author =       "Anindya Chakraborty and Arun K. Majumdar and Shamik
                 Sural",
  title =        "A column dependency-based approach for static and
                 dynamic recovery of databases from malicious
                 transactions",
  journal =      j-INT-J-INFO-SEC,
  volume =       "9",
  number =       "1",
  pages =        "51--67",
  month =        feb,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-009-0095-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:32 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-009-0095-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bayly:2010:FBS,
  author =       "Duncan Bayly and Maurice Castro and Arathi Arakala and
                 Jason Jeffers and Kathy Horadam",
  title =        "Fractional biometrics: safeguarding privacy in
                 biometric applications",
  journal =      j-INT-J-INFO-SEC,
  volume =       "9",
  number =       "1",
  pages =        "69--82",
  month =        feb,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-009-0096-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:32 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-009-0096-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bella:2010:PGA,
  author =       "Giampaolo Bella",
  title =        "The principle of guarantee availability for security
                 protocol analysis",
  journal =      j-INT-J-INFO-SEC,
  volume =       "9",
  number =       "2",
  pages =        "83--97",
  month =        apr,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-009-0097-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:32 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-009-0097-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{deAlbuquerque:2010:FVA,
  author =       "Jo{\~a}o Porto de Albuquerque and Heiko Krumm and
                 Paulo L{\'\i}cio de Geus",
  title =        "Formal validation of automated policy refinement in
                 the management of network security systems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "9",
  number =       "2",
  pages =        "99--125",
  month =        apr,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-010-0101-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:32 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-010-0101-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Knudsen:2010:CEA,
  author =       "Lars R. Knudsen and Charlotte V. Miolane",
  title =        "Counting equations in algebraic attacks on block
                 ciphers",
  journal =      j-INT-J-INFO-SEC,
  volume =       "9",
  number =       "2",
  pages =        "127--135",
  month =        apr,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-009-0099-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:32 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-009-0099-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Gauravaram:2010:HFU,
  author =       "Praveen Gauravaram and John Kelsey and Lars R. Knudsen
                 and S{\o}ren S. Thomsen",
  title =        "On hash functions using checksums",
  journal =      j-INT-J-INFO-SEC,
  volume =       "9",
  number =       "2",
  pages =        "137--151",
  month =        apr,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-009-0100-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:32 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-009-0100-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
  remark =       "From the abstract: ``We analyse the security of
                 iterated hash functions that compute an input dependent
                 checksum which is processed as part of the hash
                 computation. We show that a large class of such
                 schemes, including those using non-linear or even
                 one-way checksum functions, is not secure against the
                 second preimage attack of Kelsey and Schneier, the
                 herding attack of Kelsey and Kohno and the
                 multicollision attack of Joux. Our attacks also apply
                 to a large class of cascaded hash functions.''",
}

@Article{Lin:2010:MTE,
  author =       "Ching Lin and Vijay Varadharajan",
  title =        "{MobileTrust}: a trust enhanced security architecture
                 for mobile agent systems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "9",
  number =       "3",
  pages =        "153--178",
  month =        jun,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-009-0098-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:33 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-009-0098-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kundu:2010:DID,
  author =       "Amlan Kundu and Shamik Sural and A. K. Majumdar",
  title =        "Database intrusion detection using sequence
                 alignment",
  journal =      j-INT-J-INFO-SEC,
  volume =       "9",
  number =       "3",
  pages =        "179--191",
  month =        jun,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-010-0102-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:33 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-010-0102-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Buhan:2010:ERC,
  author =       "Ileana Buhan and Jeroen Doumen and Pieter Hartel and
                 Qian Tang and Raymond Veldhuis",
  title =        "Embedding renewable cryptographic keys into noisy
                 data",
  journal =      j-INT-J-INFO-SEC,
  volume =       "9",
  number =       "3",
  pages =        "193--208",
  month =        jun,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-010-0103-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:33 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-010-0103-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Ben-Ghorbel-Talbi:2010:DME,
  author =       "Meriam Ben-Ghorbel-Talbi and Fr{\'e}d{\'e}ric Cuppens
                 and Nora Cuppens-Boulahia and Adel Bouhoula",
  title =        "A delegation model for extended {RBAC}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "9",
  number =       "3",
  pages =        "209--236",
  month =        jun,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-010-0104-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:33 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-010-0104-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Ding:2010:NHA,
  author =       "Xuhua Ding and Yanjiang Yang and Robert H. Deng and
                 Shuhong Wang",
  title =        "A new hardware-assisted {PIR} with {$ O(n) $} shuffle
                 cost",
  journal =      j-INT-J-INFO-SEC,
  volume =       "9",
  number =       "4",
  pages =        "237--252",
  month =        aug,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-010-0105-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:33 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-010-0105-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
  keywords =     "private information retrieval (PIR)",
}

@Article{Lin:2010:ECE,
  author =       "Dan Lin and Prathima Rao and Elisa Bertino and Ninghui
                 Li and Jorge Lobo",
  title =        "{EXAM}: a comprehensive environment for the analysis
                 of access control policies",
  journal =      j-INT-J-INFO-SEC,
  volume =       "9",
  number =       "4",
  pages =        "253--273",
  month =        aug,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-010-0106-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:33 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-010-0106-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Pais:2010:NPR,
  author =       "Alwyn R. Pais and Shankar Joshi",
  title =        "A new probabilistic rekeying method for secure
                 multicast groups",
  journal =      j-INT-J-INFO-SEC,
  volume =       "9",
  number =       "4",
  pages =        "275--286",
  month =        aug,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-010-0108-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:33 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-010-0108-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Liu:2010:EOO,
  author =       "Joseph K. Liu and Joonsang Baek and Jianying Zhou and
                 Yanjiang Yang and Jun Wen Wong",
  title =        "Efficient online\slash offline identity-based
                 signature for wireless sensor network",
  journal =      j-INT-J-INFO-SEC,
  volume =       "9",
  number =       "4",
  pages =        "287--296",
  month =        aug,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-010-0109-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:33 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-010-0109-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Yuen:2010:HCI,
  author =       "Tsz Hon Yuen and Willy Susilo and Yi Mu",
  title =        "How to construct identity-based signatures without the
                 key escrow problem",
  journal =      j-INT-J-INFO-SEC,
  volume =       "9",
  number =       "4",
  pages =        "297--311",
  month =        aug,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-010-0110-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:33 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-010-0110-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Dupasquier:2010:AIL,
  author =       "Beno{\^\i}t Dupasquier and Stefan Burschka and Kieran
                 McLaughlin and Sakir Sezer",
  title =        "Analysis of information leakage from encrypted {Skype}
                 conversations",
  journal =      j-INT-J-INFO-SEC,
  volume =       "9",
  number =       "5",
  pages =        "313--325",
  month =        oct,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-010-0111-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:33 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-010-0111-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Skoric:2010:FDS,
  author =       "Boris Skori{\'c} and Marc X. Makkes",
  title =        "Flowchart description of security primitives for
                 controlled physical unclonable functions",
  journal =      j-INT-J-INFO-SEC,
  volume =       "9",
  number =       "5",
  pages =        "327--335",
  month =        oct,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-010-0113-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:33 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-010-0113-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Sajedi:2010:UCT,
  author =       "Hedieh Sajedi and Mansour Jamzad",
  title =        "Using contourlet transform and cover selection for
                 secure steganography",
  journal =      j-INT-J-INFO-SEC,
  volume =       "9",
  number =       "5",
  pages =        "337--352",
  month =        oct,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-010-0112-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:33 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-010-0112-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Chen:2010:HSS,
  author =       "Haiyong Chen and Hailiang Chen",
  title =        "A hybrid scheme for securing fingerprint templates",
  journal =      j-INT-J-INFO-SEC,
  volume =       "9",
  number =       "5",
  pages =        "353--361",
  month =        oct,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-010-0114-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:33 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-010-0114-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Baek:2010:RAR,
  author =       "Yoo-Jin Baek",
  title =        "Regular $ 2^w$-ary right-to-left exponentiation
                 algorithm with very efficient {DPA} and {FA}
                 countermeasures",
  journal =      j-INT-J-INFO-SEC,
  volume =       "9",
  number =       "5",
  pages =        "363--370",
  month =        oct,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-010-0118-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:33 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-010-0118-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Damgaard:2010:GPP,
  author =       "Ivan Damg{\aa}rd and Mads Jurik and Jesper Buus
                 Nielsen",
  title =        "A generalization of {Paillier}'s public-key system
                 with applications to electronic voting",
  journal =      j-INT-J-INFO-SEC,
  volume =       "9",
  number =       "6",
  pages =        "371--385",
  month =        dec,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-010-0119-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:34 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-010-0119-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{MacKenzie:2010:PAK,
  author =       "Philip MacKenzie and Sarvar Patel and Ram
                 Swaminathan",
  title =        "Password-authenticated key exchange based on {RSA}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "9",
  number =       "6",
  pages =        "387--410",
  month =        dec,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-010-0120-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:34 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-010-0120-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Naor:2010:ETR,
  author =       "Moni Naor and Benny Pinkas",
  title =        "Efficient trace and revoke schemes",
  journal =      j-INT-J-INFO-SEC,
  volume =       "9",
  number =       "6",
  pages =        "411--424",
  month =        dec,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-010-0121-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:34 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-010-0121-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Baumgarten:2011:CSH,
  author =       "Alex Baumgarten and Michael Steffen and Matthew
                 Clausman and Joseph Zambreno",
  title =        "A case study in hardware {Trojan} design and
                 implementation",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "1",
  pages =        "1--14",
  month =        feb,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-010-0115-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:34 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-010-0115-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Lim:2011:IBC,
  author =       "Hoon Wei Lim and Kenneth G. Paterson",
  title =        "Identity-based cryptography for grid security",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "1",
  pages =        "15--32",
  month =        feb,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-010-0116-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:34 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-010-0116-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Peng:2011:MOS,
  author =       "Kun Peng and Ed Dawson and Feng Bao",
  title =        "Modification and optimisation of a shuffling scheme:
                 stronger security, formal analysis and higher
                 efficiency",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "1",
  pages =        "33--47",
  month =        feb,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-010-0117-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:34 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-010-0117-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Peng:2011:GEC,
  author =       "Kun Peng",
  title =        "A general and efficient countermeasure to relation
                 attacks in mix-based e-voting",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "1",
  pages =        "49--60",
  month =        feb,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-010-0122-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:34 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-010-0122-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Anonymous:2011:P,
  author =       "Anonymous",
  title =        "Preface",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "2",
  pages =        "61--61",
  month =        jun,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0134-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:35 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0134-5;
                 http://link.springer.com/content/pdf/10.1007/s10207-011-0134-5.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Coker:2011:PRA,
  author =       "George Coker and Joshua Guttman and Peter Loscocco and
                 Amy Herzog and Jonathan Millen and Brian O'Hanlon and
                 John Ramsdell and Ariel Segall and Justin Sheehy and
                 Brian Sniffen",
  title =        "Principles of remote attestation",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "2",
  pages =        "63--81",
  month =        jun,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0124-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:35 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0124-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{DiPierro:2011:PTC,
  author =       "Alessandra {Di Pierro} and Chris Hankin and Herbert
                 Wiklicky",
  title =        "Probabilistic timing covert channels: to close or not
                 to close?",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "2",
  pages =        "83--106",
  month =        jun,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-010-0107-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:35 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-010-0107-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Backes:2011:CSS,
  author =       "Michael Backes and Iliano Cervesato and Aaron D.
                 Jaggard and Andre Scedrov and Joe-Kai Tsay",
  title =        "Cryptographically sound security proofs for basic and
                 public-key {Kerberos}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "2",
  pages =        "107--134",
  month =        jun,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0125-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:35 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0125-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Anonymous:2011:SIS,
  author =       "Anonymous",
  title =        "Special issue on ``{SCADA} and control system
                 security''",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "2",
  pages =        "135--136",
  month =        jun,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0128-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:35 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0128-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Crampton:2011:UFC,
  author =       "Jason Crampton and Hoon Wei Lim and Kenneth G.
                 Paterson and Geraint Price",
  title =        "User-friendly and certificate-free grid security
                 infrastructure",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "3",
  pages =        "137--153",
  month =        jun,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0123-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:35 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0123-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Zhu:2011:SLA,
  author =       "Wen Tao Zhu and Yang Xiang and Jianying Zhou and
                 Robert H. Deng and Feng Bao",
  title =        "Secure localization with attack detection in wireless
                 sensor networks",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "3",
  pages =        "155--171",
  month =        jun,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0127-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:35 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0127-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Roelse:2011:DST,
  author =       "Peter Roelse",
  title =        "Dynamic subtree tracing and its application in
                 pay-{TV} systems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "3",
  pages =        "173--187",
  month =        jun,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0126-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:35 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  note =         "See erratum \cite{Roelse:2011:EDS}.",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0126-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kate:2011:GCB,
  author =       "Aniket Kate and Ian Goldberg",
  title =        "Generalizing cryptosystems based on the subset sum
                 problem",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "3",
  pages =        "189--199",
  month =        jun,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0129-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:35 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0129-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Ustaoglu:2011:IIB,
  author =       "Berkant Ustao{\u{g}}lu",
  title =        "Integrating identity-based and certificate-based
                 authenticated key exchange protocols",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "4",
  pages =        "201--212",
  month =        aug,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0136-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:35 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0136-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Saxena:2011:DRE,
  author =       "Nitesh Saxena and Jonathan Voris",
  title =        "Data remanence effects on memory-based entropy
                 collection for {RFID} systems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "4",
  pages =        "213--222",
  month =        aug,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0139-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:35 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0139-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bouzida:2011:CAB,
  author =       "Yacine Bouzida and Luigi Logrippo and Serge
                 Mankovski",
  title =        "Concrete- and abstract-based access control",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "4",
  pages =        "223--238",
  month =        aug,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0138-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:35 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0138-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bielova:2011:DYR,
  author =       "Nataliia Bielova and Fabio Massacci",
  title =        "Do you really mean what you actually enforced?",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "4",
  pages =        "239--254",
  month =        aug,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0137-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:35 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0137-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Hanley:2011:UTD,
  author =       "Neil Hanley and Michael Tunstall and William P.
                 Marnane",
  title =        "Using templates to distinguish multiplications from
                 squaring operations",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "4",
  pages =        "255--266",
  month =        aug,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0135-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:35 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0135-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Jajodia:2011:MGE,
  author =       "Sushil Jajodia and Jianying Zhou",
  title =        "Message from the {Guest Editors}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "5",
  pages =        "267--268",
  month =        oct,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0131-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:36 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0131-8;
                 http://link.springer.com/content/pdf/10.1007/s10207-011-0131-8.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kong:2011:SSA,
  author =       "Deguang Kong and Yoon-Chan Jhi and Tao Gong and Sencun
                 Zhu and Peng Liu and Hongsheng Xi",
  title =        "{SAS}: semantics aware signature generation for
                 polymorphic worm detection",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "5",
  pages =        "269--283",
  month =        oct,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0132-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:36 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0132-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Chang:2011:EHS,
  author =       "Ee-Chien Chang and Liming Lu and Yongzheng Wu and
                 Roland H. C. Yap and Jie Yu",
  title =        "Enhancing host security using external environment
                 sensors",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "5",
  pages =        "285--299",
  month =        oct,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0130-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:36 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0130-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Marconi:2011:CPE,
  author =       "Luciana Marconi and Mauro Conti and Roberto {Di
                 Pietro}",
  title =        "{CASSANDRA}: a probabilistic, efficient, and
                 privacy-preserving solution to compute set
                 intersection",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "5",
  pages =        "301--319",
  month =        oct,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0133-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:36 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0133-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Gyorffy:2011:TBG,
  author =       "John Charles Gyorffy and Andrew F. Tappenden and James
                 Miller",
  title =        "Token-based graphical password authentication",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "6",
  pages =        "321--336",
  month =        nov,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0147-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:36 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0147-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Glisson:2011:ERW,
  author =       "William Bradley Glisson and Tim Storer and Gavin
                 Mayall and Iain Moug and George Grispos",
  title =        "Electronic retention: what does your mobile phone
                 reveal about you?",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "6",
  pages =        "337--349",
  month =        nov,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0144-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:36 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0144-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Garcia:2011:SID,
  author =       "Sergio S{\'a}nchez Garc{\'\i}a and Ana G{\'o}mez Oliva
                 and Emilia P{\'e}rez Belleboni and Iv{\'a}n Pau de la
                 Cruz",
  title =        "Solving identity delegation problem in the
                 e-government environment",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "6",
  pages =        "351--372",
  month =        nov,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0140-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:36 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0140-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Huang:2011:ESD,
  author =       "Qiong Huang and Guomin Yang and Duncan S. Wong and
                 Willy Susilo",
  title =        "Efficient strong designated verifier signature schemes
                 without random oracle or with non-delegatability",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "6",
  pages =        "373--385",
  month =        nov,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0146-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:36 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0146-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Miret:2011:CAH,
  author =       "Josep M. Miret and Francesc Seb{\'e}",
  title =        "Cryptanalysis of an ad-hoc cryptosystem for mix-based
                 e-voting robust against relation attacks",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "6",
  pages =        "387--389",
  month =        nov,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0145-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:36 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0145-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Roelse:2011:EDS,
  author =       "Peter Roelse",
  title =        "Erratum to: {Dynamic subtree tracing and its
                 application in pay-TV systems}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "6",
  pages =        "391--391",
  month =        nov,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0141-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:36 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  note =         "See \cite{Roelse:2011:DST}.",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0141-6;
                 http://link.springer.com/content/pdf/10.1007/s10207-011-0141-6.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Fiore:2012:RBS,
  author =       "D. Fiore and R. Gennaro and N. P. Smart",
  title =        "Relations between the security models for
                 certificateless encryption and {ID}-based key
                 agreement",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "1",
  pages =        "1--22",
  month =        feb,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0149-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:36 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0149-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Peng:2012:TDA,
  author =       "Kun Peng",
  title =        "Threshold distributed access control with public
                 verification: a practical application of {PVSS}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "1",
  pages =        "23--31",
  month =        feb,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0151-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:36 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0151-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Ates:2012:WHI,
  author =       "Mika{\"e}l Ates and Francesco Buccafurri and Jacques
                 Fayolle and Gianluca Lax",
  title =        "A warning on how to implement anonymous credential
                 protocols into the information card framework",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "1",
  pages =        "33--40",
  month =        feb,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0150-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:36 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0150-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Wang:2012:SGN,
  author =       "Yuanzhuo Wang and Min Yu and Jingyuan Li and Kun Meng
                 and Chuang Lin and Xueqi Cheng",
  title =        "Stochastic game net and applications in security
                 analysis for enterprise network",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "1",
  pages =        "41--52",
  month =        feb,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0148-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:36 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0148-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Huang:2012:NEO,
  author =       "Qiong Huang and Guomin Yang and Duncan S. Wong and
                 Willy Susilo",
  title =        "A new efficient optimistic fair exchange protocol
                 without random oracles",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "1",
  pages =        "53--63",
  month =        feb,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0152-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:36 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0152-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Guerra-Casanova:2012:AMD,
  author =       "J. Guerra-Casanova and C. S{\'a}nchez-{\'A}vila and G.
                 Bailador and A. de Santos Sierra",
  title =        "Authentication in mobile devices through hand gesture
                 recognition",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "2",
  pages =        "65--83",
  month =        apr,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0154-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:37 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0154-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Nuida:2012:SCS,
  author =       "Koji Nuida",
  title =        "Short collusion-secure fingerprint codes against three
                 pirates",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "2",
  pages =        "85--102",
  month =        apr,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0155-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:37 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0155-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Andreeva:2012:SAS,
  author =       "Elena Andreeva and Andrey Bogdanov and Bart Mennink
                 and Bart Preneel and Christian Rechberger",
  title =        "On security arguments of the second round {SHA-3}
                 candidates",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "2",
  pages =        "103--120",
  month =        apr,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0156-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:37 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0156-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
  keywords =     "Classification; Differential attacks; Hash functions;
                 Security reductions; SHA-3 competition; US National
                 Institute for Standards and Technology (NIST)
                 cryptographic hash algorithm design competition",
}

@Article{Gritzalis:2012:FAR,
  author =       "Dimitris Gritzalis and Panagiotis Katsaros and
                 Stylianos Basagiannis and Yannis Soupionis",
  title =        "Formal analysis for robust anti-{SPIT} protection
                 using model checking",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "2",
  pages =        "121--135",
  month =        apr,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0159-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:37 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0159-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Niebuhr:2012:SPS,
  author =       "Robert Niebuhr and Mohammed Meziani and Stanislav
                 Bulygin and Johannes Buchmann",
  title =        "Selecting parameters for secure {McEliece}-based
                 cryptosystems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "3",
  pages =        "137--147",
  month =        jun,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0153-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:37 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0153-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Andreeva:2012:PFG,
  author =       "Elena Andreeva and Bart Mennink and Bart Preneel",
  title =        "The parazoa family: generalizing the sponge hash
                 functions",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "3",
  pages =        "149--165",
  month =        jun,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0157-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:37 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0157-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Dewri:2012:OSH,
  author =       "Rinku Dewri and Indrajit Ray and Nayot Poolsappasit
                 and Darrell Whitley",
  title =        "Optimal security hardening on attack tree models of
                 networks: a cost-benefit analysis",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "3",
  pages =        "167--188",
  month =        jun,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0160-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:37 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0160-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Das:2012:RKE,
  author =       "Ashok Kumar Das",
  title =        "A random key establishment scheme for multi-phase
                 deployment in large-scale distributed sensor networks",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "3",
  pages =        "189--211",
  month =        jun,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0162-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:37 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0162-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Ahmed:2012:MGE,
  author =       "Irfan Ahmed and Martin Naedele and Bradley Schatz and
                 Ryoichi Sasaki and Andrew West",
  title =        "Message from the guest editors",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "4",
  pages =        "213--213",
  month =        aug,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0168-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:37 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0168-3;
                 http://link.springer.com/content/pdf/10.1007/s10207-012-0168-3.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Reaves:2012:OVT,
  author =       "Bradley Reaves and Thomas Morris",
  title =        "An open virtual testbed for industrial control system
                 security research",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "4",
  pages =        "215--229",
  month =        aug,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0164-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:37 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0164-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Hadziosmanovic:2012:LMA,
  author =       "Dina Hadziosmanovi{\'c} and Damiano Bolzoni and Pieter
                 H. Hartel",
  title =        "A log mining approach for process monitoring in
                 {SCADA}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "4",
  pages =        "231--251",
  month =        aug,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0163-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:37 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0163-8;
                 http://link.springer.com/content/pdf/10.1007/s10207-012-0163-8.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Sole:2012:EMT,
  author =       "Marc Sol{\'e} and Victor Munt{\'e}s-Mulero and Jordi
                 Nin",
  title =        "Efficient microaggregation techniques for large
                 numerical data volumes",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "4",
  pages =        "253--267",
  month =        aug,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0158-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:37 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0158-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Yaseen:2012:ITM,
  author =       "Qussai Yaseen and Brajendra Panda",
  title =        "Insider threat mitigation: preventing unauthorized
                 knowledge acquisition",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "4",
  pages =        "269--280",
  month =        aug,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0165-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:37 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0165-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Huber:2012:PSS,
  author =       "Michael Huber",
  title =        "Perfect secrecy systems immune to spoofing attacks",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "4",
  pages =        "281--289",
  month =        aug,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0166-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:37 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0166-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Zhou:2012:MGE,
  author =       "Jianying Zhou and Xuejia Lai and Hui Li",
  title =        "Message from the {Guest Editors}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "5",
  pages =        "291--292",
  month =        oct,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0172-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:38 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0172-7;
                 http://link.springer.com/content/pdf/10.1007/s10207-012-0172-7.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Xin:2012:RAA,
  author =       "Zhi Xin and Huiyu Chen and Xinche Wang and Peng Liu
                 and Sencun Zhu and Bing Mao and Li Xie",
  title =        "Replacement attacks: automatically evading
                 behavior-based software birthmark",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "5",
  pages =        "293--304",
  month =        oct,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0170-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:38 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0170-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Chen:2012:DHP,
  author =       "Liqun Chen and Yu Chen",
  title =        "The $n$-{Diffie--Hellman} problem and multiple-key
                 encryption",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "5",
  pages =        "305--320",
  month =        oct,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0171-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:38 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0171-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kontaxis:2012:MID,
  author =       "Georgios Kontaxis and Michalis Polychronakis and
                 Evangelos P. Markatos",
  title =        "Minimizing information disclosure to third parties in
                 social login platforms",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "5",
  pages =        "321--332",
  month =        oct,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0173-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:38 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0173-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Golic:2012:NAM,
  author =       "Jovan Dj. Goli{\'c}",
  title =        "A new authentication model for ad hoc networks",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "5",
  pages =        "333--347",
  month =        oct,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0167-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:38 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0167-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Camacho:2012:SAC,
  author =       "Philippe Camacho and Alejandro Hevia and Marcos Kiwi
                 and Roberto Opazo",
  title =        "Strong accumulators from collision-resistant hashing",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "5",
  pages =        "349--363",
  month =        oct,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0169-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:38 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0169-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Perez-Mendez:2012:CLS,
  author =       "Alejandro P{\'e}rez-M{\'e}ndez and Fernando
                 Pere{\~n}{\'\i}guez-Garc{\'\i}a and Rafael
                 Mar{\'\i}n-L{\'o}pez and Gabriel L{\'o}pez-Mill{\'a}n",
  title =        "A cross-layer {SSO} solution for federating access to
                 kerberized services in the {eduroam\slash DAMe}
                 network",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "6",
  pages =        "365--388",
  month =        nov,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0174-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:38 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0174-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Han:2012:NCO,
  author =       "Jinguang Han and Willy Susilo and Yi Mu and Jun Yan",
  title =        "New constructions of {OSBE} schemes and their
                 applications in oblivious access control",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "6",
  pages =        "389--401",
  month =        nov,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0176-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:38 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0176-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bogdanov:2012:HPS,
  author =       "Dan Bogdanov and Margus Niitsoo and Tomas Toft and Jan
                 Willemson",
  title =        "High-performance secure multi-party computation for
                 data mining applications",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "6",
  pages =        "403--418",
  month =        nov,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0177-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:38 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0177-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bagheri:2012:SFP,
  author =       "Nasour Bagheri and Praveen Gauravaram and Lars R.
                 Knudsen and Erik Zenner",
  title =        "The suffix-free-prefix-free hash function construction
                 and its indifferentiability security analysis",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "6",
  pages =        "419--434",
  month =        nov,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0175-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:38 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0175-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{DArco:2013:TTR,
  author =       "Paolo D'Arco and Angel Perez del Pozo",
  title =        "Toward tracing and revoking schemes secure against
                 collusion and any form of secret information leakage",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "1",
  pages =        "1--17",
  month =        feb,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0186-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:38 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0186-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Abe:2013:DTA,
  author =       "Masayuki Abe and Sherman S. M. Chow and Kristiyan
                 Haralambiev and Miyako Ohkubo",
  title =        "Double-trapdoor anonymous tags for traceable
                 signatures",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "1",
  pages =        "19--31",
  month =        feb,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0184-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:38 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0184-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Catalano:2013:FNI,
  author =       "Dario Catalano and Mario {Di Raimondo} and Dario Fiore
                 and Rosario Gennaro and Orazio Puglisi",
  title =        "Fully non-interactive onion routing with forward
                 secrecy",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "1",
  pages =        "33--47",
  month =        feb,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0185-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:38 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0185-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{DeCristofaro:2013:PDC,
  author =       "Emiliano {De Cristofaro} and Mark Manulis and Bertram
                 Poettering",
  title =        "Private discovery of common social contacts",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "1",
  pages =        "49--65",
  month =        feb,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0183-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:38 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0183-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Marmol:2013:PEA,
  author =       "F{\'e}lix G{\'o}mez M{\'a}rmol and Christoph Sorge and
                 Ronald Petrlic and Osman Ugus and Dirk Westhoff and
                 Gregorio Mart{\'\i}nez P{\'e}rez",
  title =        "Privacy-enhanced architecture for smart metering",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "2",
  pages =        "67--82",
  month =        apr,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0181-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:39 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0181-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Asghar:2013:CCH,
  author =       "Hassan Jameel Asghar and Shujun Li and Josef Pieprzyk
                 and Huaxiong Wang",
  title =        "Cryptanalysis of the convex hull click human
                 identification protocol",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "2",
  pages =        "83--96",
  month =        apr,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0161-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:39 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0161-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Alsaleh:2013:EAA,
  author =       "Mansour Alsaleh and P. C. van Oorschot",
  title =        "Evaluation in the absence of absolute ground truth:
                 toward reliable evaluation methodology for scan
                 detectors",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "2",
  pages =        "97--110",
  month =        apr,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0178-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:39 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0178-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Abbadi:2013:FET,
  author =       "Imad M. Abbadi",
  title =        "A framework for establishing trust in Cloud
                 provenance",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "2",
  pages =        "111--128",
  month =        apr,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0179-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:39 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0179-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Rebollo-Monedero:2013:MPA,
  author =       "David Rebollo-Monedero and Javier Parra-Arnau and
                 Claudia Diaz and Jordi Forn{\'e}",
  title =        "On the measurement of privacy as an attacker's
                 estimation error",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "2",
  pages =        "129--149",
  month =        apr,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0182-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:39 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0182-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Rizomiliotis:2013:SAP,
  author =       "Panagiotis Rizomiliotis and Stefanos Gritzalis",
  title =        "On the security of {AUTH}, a provably secure
                 authentication protocol based on the subspace {LPN}
                 problem",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "2",
  pages =        "151--154",
  month =        apr,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0188-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:39 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0188-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Xu:2013:VBP,
  author =       "Wenjuan Xu and Mohamed Shehab and Gail-Joon Ahn",
  title =        "Visualization-based policy analysis for {SELinux}:
                 framework and user study",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "3",
  pages =        "155--171",
  month =        jun,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0180-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:39 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0180-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Tormo:2013:DAI,
  author =       "Gin{\'e}s D{\'o}lera Tormo and Gabriel L{\'o}pez
                 Mill{\'a}n and Gregorio Mart{\'\i}nez P{\'e}rez",
  title =        "Definition of an advanced identity management
                 infrastructure",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "3",
  pages =        "173--200",
  month =        jun,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0189-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:39 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0189-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Vrakas:2013:IDP,
  author =       "Nikos Vrakas and Costas Lambrinoudakis",
  title =        "An intrusion detection and prevention system for {IMS}
                 and {VoIP} services",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "3",
  pages =        "201--217",
  month =        jun,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0187-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:39 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0187-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bernhard:2013:AAU,
  author =       "D. Bernhard and G. Fuchsbauer and E. Ghadafi and N. P.
                 Smart and B. Warinschi",
  title =        "Anonymous attestation with user-controlled
                 linkability",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "3",
  pages =        "219--249",
  month =        jun,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0191-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:39 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0191-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Phan:2013:ACB,
  author =       "Duong-Hieu Phan and David Pointcheval and Siamak F.
                 Shahandashti and Mario Strefler",
  title =        "Adaptive {CCA} broadcast encryption with constant-size
                 secret keys and ciphertexts",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "4",
  pages =        "251--265",
  month =        aug,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0190-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:39 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0190-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Brzuska:2013:LMR,
  author =       "C. Brzuska and M. Fischlin and N. P. Smart and B.
                 Warinschi and S. C. Williams",
  title =        "Less is more: relaxed yet composable security notions
                 for key exchange",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "4",
  pages =        "267--297",
  month =        aug,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0192-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:39 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0192-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Draper-Gil:2013:OFE,
  author =       "G. Draper-Gil and J. Zhou and J. L. Ferrer-Gomila and
                 M. F. Hinarejos",
  title =        "An optimistic fair exchange protocol with active
                 intermediaries",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "4",
  pages =        "299--318",
  month =        aug,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0194-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:39 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0194-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Beauquier:2013:SPE,
  author =       "Dani{\`e}le Beauquier and Jo{\"e}lle Cohen and Ruggero
                 Lanotte",
  title =        "Security policies enforcement using finite and
                 pushdown edit automata",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "4",
  pages =        "319--336",
  month =        aug,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0195-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:39 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0195-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Peng:2013:SAH,
  author =       "Kun Peng",
  title =        "A shuffle to achieve high efficiency through
                 pre-computation and batch verification",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "4",
  pages =        "337--345",
  month =        aug,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0193-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:39 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0193-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Boteanu:2013:CSQ,
  author =       "Daniel Boteanu and Jos{\'e} M. Fernandez",
  title =        "A comprehensive study of queue management as a {DoS}
                 counter-measure",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "5",
  pages =        "347--382",
  month =        oct,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0197-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:40 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0197-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Wang:2013:USM,
  author =       "Pu Wang and Marta C. Gonz{\'a}lez and Ronaldo Menezes
                 and Albert-L{\'a}szl{\'o} Barab{\'a}si",
  title =        "Understanding the spread of malicious mobile-phone
                 programs and their damage potential",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "5",
  pages =        "383--392",
  month =        oct,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0203-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:40 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0203-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Schreuders:2013:FBA,
  author =       "Z. Cliffe Schreuders and Christian Payne and Tanya
                 McGill",
  title =        "The functionality-based application confinement
                 model",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "5",
  pages =        "393--422",
  month =        oct,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0199-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:40 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0199-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Zakerzadeh:2013:DSA,
  author =       "Hessam Zakerzadeh and Sylvia L. Osborn",
  title =        "Delay-sensitive approaches for anonymizing numerical
                 streaming data",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "5",
  pages =        "423--437",
  month =        oct,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0196-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:40 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0196-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bresson:2013:LLS,
  author =       "Emmanuel Bresson and Dario Catalano and Mario {Di
                 Raimondo} and Dario Fiore and Rosario Gennaro",
  title =        "Off-line\slash on-line signatures revisited: a general
                 unifying paradigm, efficient threshold variants and
                 experimental results",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "6",
  pages =        "439--465",
  month =        nov,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0200-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:40 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0200-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kundu:2013:PPA,
  author =       "Ashish Kundu and Elisa Bertino",
  title =        "Privacy-preserving authentication of trees and
                 graphs",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "6",
  pages =        "467--494",
  month =        nov,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0198-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:40 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0198-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Chen:2013:AMA,
  author =       "Yu-Shian Chen and Chin-Laung Lei",
  title =        "Aggregate message authentication codes ({AMACs}) with
                 on-the-fly verification",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "6",
  pages =        "495--504",
  month =        nov,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0202-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:40 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0202-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Pereniguez-Garcia:2013:KPA,
  author =       "F. Pere{\~n}{\'\i}guez-Garc{\'\i}a and R.
                 Mar{\'\i}n-L{\'o}pez and G. Kambourakis and A.
                 Ruiz-Mart{\'\i}nez and S. Gritzalis and A. F.
                 Skarmeta-G{\'o}mez",
  title =        "{KAMU}: providing advanced user privacy in {Kerberos}
                 multi-domain scenarios",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "6",
  pages =        "505--525",
  month =        nov,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0201-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:40 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0201-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Liao:2014:POC,
  author =       "Qi Liao and Zhen Li",
  title =        "Portfolio optimization of computer and mobile
                 botnets",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "1",
  pages =        "1--14",
  month =        feb,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0206-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:41 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0206-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Mizuki:2014:FCB,
  author =       "Takaaki Mizuki and Hiroki Shizuya",
  title =        "A formalization of card-based cryptographic protocols
                 via abstract machine",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "1",
  pages =        "15--23",
  month =        feb,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0219-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:41 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0219-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Manulis:2014:PAI,
  author =       "Mark Manulis and Bertram Poettering and Douglas
                 Stebila",
  title =        "Plaintext awareness in identity-based key
                 encapsulation",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "1",
  pages =        "25--49",
  month =        feb,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0218-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:41 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0218-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Emura:2014:GSI,
  author =       "Keita Emura and Goichiro Hanaoka and Yusuke Sakai and
                 Jacob C. N. Schuldt",
  title =        "Group signature implies public-key encryption with
                 non-interactive opening",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "1",
  pages =        "51--62",
  month =        feb,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0204-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:41 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0204-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Granadillo:2014:RBC,
  author =       "Gustavo Gonzalez Granadillo and Malek Belhaouane and
                 Herv{\'e} Debar and Gr{\'e}goire Jacob",
  title =        "{RORI}-based countermeasure selection using the
                 {OrBAC} formalism",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "1",
  pages =        "63--79",
  month =        feb,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0207-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:41 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0207-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Saikia:2014:PHF,
  author =       "Navajit Saikia and Prabin K. Bora",
  title =        "Perceptual hash function for scalable video",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "1",
  pages =        "81--93",
  month =        feb,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0211-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:41 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0211-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Anonymous:2014:SCC,
  author =       "Anonymous",
  title =        "Security in cloud computing",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "2",
  pages =        "95--96",
  month =        apr,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0232-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:41 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0232-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Gouglidis:2014:SPV,
  author =       "Antonios Gouglidis and Ioannis Mavridis and Vincent C.
                 Hu",
  title =        "Security policy verification for multi-domains in
                 cloud systems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "2",
  pages =        "97--111",
  month =        apr,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0205-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:41 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0205-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Fernandes:2014:SIC,
  author =       "Diogo A. B. Fernandes and Liliana F. B. Soares and
                 Jo{\~a}o V. Gomes and M{\'a}rio M. Freire and Pedro R.
                 M. In{\'a}cio",
  title =        "Security issues in cloud environments: a survey",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "2",
  pages =        "113--170",
  month =        apr,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0208-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:41 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0208-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bates:2014:DCR,
  author =       "Adam Bates and Benjamin Mood and Joe Pletcher and
                 Hannah Pruse and Masoud Valafar and Kevin Butler",
  title =        "On detecting co-resident cloud instances using network
                 flow watermarking techniques",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "2",
  pages =        "171--189",
  month =        apr,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0210-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:41 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0210-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Albeshri:2014:EGI,
  author =       "Aiiad Albeshri and Colin Boyd and Juan Gonz{\'a}lez
                 Nieto",
  title =        "Enhanced {GeoProof}: improved geographic assurance for
                 data in the cloud",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "2",
  pages =        "191--198",
  month =        apr,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0217-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:41 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0217-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Nunez:2014:BPP,
  author =       "David Nu{\~n}ez and Isaac Agudo",
  title =        "{BlindIdM}: a privacy-preserving approach for identity
                 management as a service",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "2",
  pages =        "199--215",
  month =        apr,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0230-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:41 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0230-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Mavrogiannopoulos:2014:TSK,
  author =       "Nikos Mavrogiannopoulos and Andreas Pashalidis and
                 Bart Preneel",
  title =        "Toward a secure {Kerberos} key exchange with smart
                 cards",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "3",
  pages =        "217--228",
  month =        jun,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0213-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:41 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0213-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Li:2014:AAM,
  author =       "Fudong Li and Nathan Clarke and Maria Papadaki and
                 Paul Dowland",
  title =        "Active authentication for mobile devices utilising
                 behaviour profiling",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "3",
  pages =        "229--244",
  month =        jun,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0209-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:41 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0209-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Wu:2014:SSP,
  author =       "Tzong-Sun Wu and Ming-Lun Lee and Han-Yu Lin and
                 Chao-Yuan Wang",
  title =        "Shoulder-surfing-proof graphical password
                 authentication scheme",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "3",
  pages =        "245--254",
  month =        jun,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0216-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:41 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0216-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Mu:2014:RBD,
  author =       "Chengpo Mu and Meng Yu and Yingjiu Li and Wanyu Zang",
  title =        "Risk balance defense approach against intrusions for
                 network server",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "3",
  pages =        "255--269",
  month =        jun,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0214-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:41 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0214-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Lian:2014:PSC,
  author =       "Bin Lian and Gongliang Chen and Jianhua Li",
  title =        "Provably secure E-cash system with practical and
                 efficient complete tracing",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "3",
  pages =        "271--289",
  month =        jun,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0240-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:41 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0240-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{McEvoy:2014:ANT,
  author =       "Robert P. McEvoy and Michael Tunstall and Claire
                 Whelan and Colin C. Murphy and William P. Marnane",
  title =        "{All-or-Nothing Transforms} as a countermeasure to
                 differential side-channel analysis",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "3",
  pages =        "291--304",
  month =        jun,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0212-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:41 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0212-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kim:2014:EVE,
  author =       "Kee Sung Kim and Ik Rae Jeong",
  title =        "Efficient verifiably encrypted signatures from
                 lattices",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "4",
  pages =        "305--314",
  month =        aug,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0226-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:42 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0226-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Sepahi:2014:LBC,
  author =       "Reza Sepahi and Ron Steinfeld and Josef Pieprzyk",
  title =        "Lattice-based certificateless public-key encryption in
                 the standard model",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "4",
  pages =        "315--333",
  month =        aug,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0215-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:42 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0215-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bertoni:2014:SCS,
  author =       "Guido Bertoni and Joan Daemen and Micha{\"e}l Peeters
                 and Gilles {Van Assche}",
  title =        "Sufficient conditions for sound tree and sequential
                 hashing modes",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "4",
  pages =        "335--353",
  month =        aug,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0220-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:42 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0220-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Alabrah:2014:ESC,
  author =       "Amerah Alabrah and Jeffrey Cashion and Mostafa
                 Bassiouni",
  title =        "Enhancing security of cookie-based sessions in mobile
                 networks using sparse caching",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "4",
  pages =        "355--366",
  month =        aug,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0223-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:42 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0223-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Shameli-Sendi:2014:ACA,
  author =       "Alireza Shameli-Sendi and Michel Dagenais",
  title =        "{ARITO}: Cyber-attack response system using accurate
                 risk impact tolerance",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "4",
  pages =        "367--390",
  month =        aug,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0222-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:42 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0222-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Mousazadeh:2014:RGA,
  author =       "Mousa Mousazadeh and Behrouz Tork Ladani",
  title =        "Randomized gossip algorithms under attack",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "4",
  pages =        "391--402",
  month =        aug,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0221-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:42 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0221-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Garcia:2014:WLS,
  author =       "Flavio D. Garcia and Gerhard de Koning Gans and Roel
                 Verdult",
  title =        "Wirelessly lockpicking a smart card reader",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "5",
  pages =        "403--420",
  month =        oct,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0234-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:42 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0234-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Catuogno:2014:ATF,
  author =       "Luigi Catuogno and Clemente Galdi",
  title =        "Analysis of a two-factor graphical password scheme",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "5",
  pages =        "421--437",
  month =        oct,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0228-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:42 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0228-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Zhang:2014:DFA,
  author =       "Meng Zhang and Anand Raghunathan and Niraj K. Jha",
  title =        "A defense framework against malware and vulnerability
                 exploits",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "5",
  pages =        "439--452",
  month =        oct,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0233-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:42 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0233-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Yasmin:2014:PSP,
  author =       "Rehana Yasmin and Eike Ritter and Guilin Wang",
  title =        "Provable security of a pairing-free one-pass
                 authenticated key establishment protocol for wireless
                 sensor networks",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "5",
  pages =        "453--465",
  month =        oct,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0224-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:42 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0224-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Gao:2014:TTR,
  author =       "Weizheng Gao and Kashi Neupane and Rainer Steinwandt",
  title =        "Tuning a two-round group key agreement",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "5",
  pages =        "467--476",
  month =        oct,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0225-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:42 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0225-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Shin:2014:AAA,
  author =       "Sooyeon Shin and Taekyoung Kwon",
  title =        "{AAnA}: Anonymous authentication and authorization
                 based on short traceable signatures",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "5",
  pages =        "477--495",
  month =        oct,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0227-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:42 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0227-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Herranz:2014:SEA,
  author =       "Javier Herranz and Jordi Nin",
  title =        "Secure and efficient anonymization of distributed
                 confidential databases",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "6",
  pages =        "497--512",
  month =        nov,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0237-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:42 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0237-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Lee:2014:AGU,
  author =       "Ming-Feng Lee and Nigel P. Smart and Bogdan Warinschi
                 and Gaven J. Watson",
  title =        "Anonymity guarantees of the {UMTS\slash LTE}
                 authentication and connection protocol",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "6",
  pages =        "513--527",
  month =        nov,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0231-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:42 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0231-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Veeningen:2014:DMC,
  author =       "Meilof Veeningen and Benne de Weger and Nicola
                 Zannone",
  title =        "Data minimisation in communication protocols: a formal
                 analysis framework and application to identity
                 management",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "6",
  pages =        "529--569",
  month =        nov,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0235-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:42 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0235-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Jovanovikj:2014:CMS,
  author =       "Vladimir Jovanovikj and Dusan Gabrijelcic and Tomaz
                 Klobucar",
  title =        "A conceptual model of security context",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "6",
  pages =        "571--581",
  month =        nov,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0229-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:42 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0229-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Sen:2014:UIW,
  author =       "Sevil Sen",
  title =        "Using instance-weighted naive {Bayes} for adapting
                 concept drift in masquerade detection",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "6",
  pages =        "583--590",
  month =        nov,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0238-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:42 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0238-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Han:2015:MAU,
  author =       "Kyoung Soo Han and Jae Hyun Lim and Boojoong Kang and
                 Eul Gyu Im",
  title =        "Malware analysis using visualized images and entropy
                 graphs",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "1",
  pages =        "1--14",
  month =        feb,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0242-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:43 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0242-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Nappa:2015:MDI,
  author =       "Antonio Nappa and M. Zubair Rafique and Juan
                 Caballero",
  title =        "The {MALICIA} dataset: identification and analysis of
                 drive-by download operations",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "1",
  pages =        "15--33",
  month =        feb,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0248-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:43 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0248-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Silva:2015:RMP,
  author =       "Helber Silva and Aldri Santos and Michele Nogueira",
  title =        "Routing management for performance and security
                 tradeoff in wireless mesh networks",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "1",
  pages =        "35--46",
  month =        feb,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0246-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:43 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0246-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Dolzhenko:2015:MRE,
  author =       "Egor Dolzhenko and Jay Ligatti and Srikar Reddy",
  title =        "Modeling runtime enforcement with mandatory results
                 automata",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "1",
  pages =        "47--60",
  month =        feb,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0239-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:43 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0239-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Valenzuela:2015:MAO,
  author =       "Michael Valenzuela and Ferenc Szidarovszky and Jerzy
                 Rozenblit",
  title =        "A multiresolution approach for optimal defense against
                 random attacks",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "1",
  pages =        "61--72",
  month =        feb,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0245-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:43 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0245-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Tonicelli:2015:ITS,
  author =       "Rafael Tonicelli and Anderson C. A. Nascimento and
                 Rafael Dowsley and J{\"o}rn M{\"u}ller-Quade and Hideki
                 Imai and Goichiro Hanaoka and Akira Otsuka",
  title =        "Information-theoretically secure oblivious polynomial
                 evaluation in the commodity-based model",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "1",
  pages =        "73--84",
  month =        feb,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0247-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:43 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0247-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Arbit:2015:IPK,
  author =       "Alex Arbit and Yoel Livne and Yossef Oren and Avishai
                 Wool",
  title =        "Implementing public-key cryptography on passive {RFID}
                 tags is practical",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "1",
  pages =        "85--99",
  month =        feb,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0236-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:43 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0236-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bella:2015:SIS,
  author =       "Giampaolo Bella and Helge Janicke",
  title =        "Special issue on the {Security Track at the ACM
                 Symposium on Applied Computing 2013}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "2",
  pages =        "101--102",
  month =        apr,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0280-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:43 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0280-2;
                 http://link.springer.com/content/pdf/10.1007/s10207-015-0280-2.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Martina:2015:ATM,
  author =       "Jean Everson Martina and Eduardo dos Santos and
                 Marcelo Carlomagno Carlos and Geraint Price and Ricardo
                 Felipe Cust{\'o}dio",
  title =        "An adaptive threat model for security ceremonies",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "2",
  pages =        "103--121",
  month =        apr,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0253-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:43 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0253-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Armando:2015:FMA,
  author =       "Alessandro Armando and Gabriele Costa and Alessio
                 Merlo and Luca Verderame",
  title =        "Formal modeling and automatic enforcement of {Bring
                 Your Own Device} policies",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "2",
  pages =        "123--140",
  month =        apr,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0252-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:43 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0252-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Spreitzenbarth:2015:MSC,
  author =       "Michael Spreitzenbarth and Thomas Schreck and Florian
                 Echtler and Daniel Arp and Johannes Hoffmann",
  title =        "{Mobile-Sandbox}: combining static and dynamic
                 analysis with machine-learning techniques",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "2",
  pages =        "141--153",
  month =        apr,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0250-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:43 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0250-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Riecker:2015:LEC,
  author =       "Michael Riecker and Sebastian Biedermann and Rachid
                 {El Bansarkhani} and Matthias Hollick",
  title =        "Lightweight energy consumption-based intrusion
                 detection system for wireless sensor networks",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "2",
  pages =        "155--167",
  month =        apr,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0241-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:43 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0241-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Egners:2015:MOW,
  author =       "Andr{\'e} Egners and Patrick Herrmann and Ulrike
                 Meyer",
  title =        "Multi-operator wireless mesh networks secured by an
                 all-encompassing security architecture",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "2",
  pages =        "169--186",
  month =        apr,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0244-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:43 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0244-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Martina:2015:VMB,
  author =       "Jean Everson Martina and Lawrence Charles Paulson",
  title =        "Verifying multicast-based security protocols using the
                 inductive method",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "2",
  pages =        "187--204",
  month =        apr,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0251-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:43 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0251-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Chakravarty:2015:DAE,
  author =       "Sambuddho Chakravarty and Georgios Portokalidis and
                 Michalis Polychronakis and Angelos D. Keromytis",
  title =        "Detection and analysis of eavesdropping in anonymous
                 communication networks",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "3",
  pages =        "205--220",
  month =        jun,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0256-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:43 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0256-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Seifi:2015:ATA,
  author =       "Younes Seifi and Suriadi Suriadi and Ernest Foo and
                 Colin Boyd",
  title =        "Analysis of two authorization protocols using {Colored
                 Petri Nets}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "3",
  pages =        "221--247",
  month =        jun,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0243-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:43 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0243-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{James:2015:AIP,
  author =       "Joshua I. James and Pavel Gladyshev",
  title =        "Automated inference of past action instances in
                 digital investigations",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "3",
  pages =        "249--261",
  month =        jun,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0249-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:43 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0249-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Giffhorn:2015:NAL,
  author =       "Dennis Giffhorn and Gregor Snelting",
  title =        "A new algorithm for low-deterministic security",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "3",
  pages =        "263--287",
  month =        jun,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0257-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:43 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0257-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Vasiliadis:2015:GAM,
  author =       "Giorgos Vasiliadis and Michalis Polychronakis and
                 Sotiris Ioannidis",
  title =        "{GPU}-assisted malware",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "3",
  pages =        "289--297",
  month =        jun,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0262-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:43 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0262-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Pitropakis:2015:BRP,
  author =       "Nikolaos Pitropakis and Aggelos Pikrakis and Costas
                 Lambrinoudakis",
  title =        "Behaviour reflects personality: detecting co-residence
                 attacks on {Xen}-based cloud environments",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "4",
  pages =        "299--305",
  month =        aug,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0255-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:44 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0255-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Yu:2015:EPR,
  author =       "Yong Yu and Man Ho Au and Yi Mu and Shaohua Tang and
                 Jian Ren and Willy Susilo and Liju Dong",
  title =        "Enhanced privacy of a remote data integrity-checking
                 protocol for secure cloud storage",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "4",
  pages =        "307--318",
  month =        aug,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0263-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:44 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0263-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Casassa-Mont:2015:TSI,
  author =       "Marco Casassa-Mont and Ilaria Matteucci and Marinella
                 Petrocchi and Marco Luca Sbodio",
  title =        "Towards safer information sharing in the cloud",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "4",
  pages =        "319--334",
  month =        aug,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0258-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:44 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0258-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Isern-Deya:2015:PUG,
  author =       "Andreu Pere Isern-Dey{\`a} and Lloren{\c{c}}
                 Huguet-Rotger and M. Magdalena Payeras-Capell{\`a} and
                 Maci{\`a} Mut-Puigserver",
  title =        "On the practicability of using group signatures on
                 mobile devices: implementation and performance analysis
                 on the {Android} platform",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "4",
  pages =        "335--345",
  month =        aug,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0259-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:44 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0259-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Mustafa:2015:UIA,
  author =       "Tanveer Mustafa and Karsten Sohr",
  title =        "Understanding the implemented access control policy of
                 {Android} system services with slicing and extended
                 static checking",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "4",
  pages =        "347--366",
  month =        aug,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0260-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:44 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0260-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{ElHassani:2015:ION,
  author =       "Abdeljebar Ameziane {El Hassani} and Anas Abou {El
                 Kalam} and Adel Bouhoula and Ryma Abassi and Abdellah
                 Ait Ouahman",
  title =        "{Integrity-OrBAC}: a new model to preserve {Critical
                 Infrastructures} integrity",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "4",
  pages =        "367--385",
  month =        aug,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0254-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:44 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0254-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Al-Saleh:2015:IDC,
  author =       "Mohammed I. Al-Saleh and Fatima M. AbuHjeela and Ziad
                 A. Al-Sharif",
  title =        "Investigating the detection capabilities of
                 antiviruses under concurrent attacks",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "4",
  pages =        "387--396",
  month =        aug,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0261-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:44 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0261-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Wei:2015:TPE,
  author =       "Lei Wei and Michael K. Reiter",
  title =        "Toward practical encrypted email that supports
                 private, regular-expression searches",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "5",
  pages =        "397--416",
  month =        oct,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0268-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:44 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib;
                 https://www.math.utah.edu/pub/tex/bib/string-matching.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0268-3;
                 http://link.springer.com/content/pdf/10.1007/s10207-014-0268-3.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
  keywords =     "Cloud security; Private search on encrypted data;
                 Regular-expression search",
}

@Article{Zhou:2015:GCR,
  author =       "Lan Zhou and Vijay Varadharajan and Michael Hitchens",
  title =        "Generic constructions for role-based encryption",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "5",
  pages =        "417--430",
  month =        oct,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0267-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:44 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0267-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Lin:2015:RNR,
  author =       "Han-Yu Lin",
  title =        "{RPCAE}: a novel revocable proxy convertible
                 authenticated encryption scheme",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "5",
  pages =        "431--441",
  month =        oct,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0269-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:44 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0269-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Halevi:2015:KAS,
  author =       "Tzipora Halevi and Nitesh Saxena",
  title =        "Keyboard acoustic side channel attacks: exploring
                 realistic and security-sensitive scenarios",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "5",
  pages =        "443--456",
  month =        oct,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0264-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:44 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0264-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Li:2015:TMM,
  author =       "Tao Li and Aiqun Hu",
  title =        "Trusted mobile model based on {DTE} technology",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "5",
  pages =        "457--469",
  month =        oct,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0266-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:44 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0266-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Azkia:2015:DPA,
  author =       "Hanieh Azkia and Nora Cuppens-Boulahia and
                 Fr{\'e}d{\'e}ric Cuppens and Gouenou Coatrieux and Said
                 Oulmakhzoune",
  title =        "Deployment of a posteriori access control using {IHE
                 ATNA}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "5",
  pages =        "471--483",
  month =        oct,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0265-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:44 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0265-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bertino:2015:SPE,
  author =       "Elisa Bertino and Robert H. Deng and Xinyi Huang and
                 Jianying Zhou",
  title =        "Security and privacy of electronic health information
                 systems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "6",
  pages =        "485--486",
  month =        nov,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0303-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:44 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0303-z;
                 http://link.springer.com/content/pdf/10.1007/s10207-015-0303-z.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Qian:2015:PPP,
  author =       "Huiling Qian and Jiguo Li and Yichen Zhang and
                 Jinguang Han",
  title =        "Privacy-preserving personal health record using
                 multi-authority attribute-based encryption with
                 revocation",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "6",
  pages =        "487--497",
  month =        nov,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0270-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:44 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0270-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Qin:2015:FAB,
  author =       "Bo Qin and Hua Deng and Qianhong Wu and Josep
                 Domingo-Ferrer and David Naccache and Yunya Zhou",
  title =        "Flexible attribute-based encryption applicable to
                 secure e-healthcare records",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "6",
  pages =        "499--511",
  month =        nov,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0272-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:44 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0272-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Hadavi:2015:SSS,
  author =       "Mohammad Ali Hadavi and Rasool Jalili and Ernesto
                 Damiani and Stelvio Cimato",
  title =        "Security and searchability in secret sharing-based
                 data outsourcing",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "6",
  pages =        "513--529",
  month =        nov,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0277-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:44 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0277-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kamm:2015:SFP,
  author =       "Liina Kamm and Jan Willemson",
  title =        "Secure floating point arithmetic and private satellite
                 collision analysis",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "6",
  pages =        "531--548",
  month =        nov,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0271-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:44 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/fparith.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0271-8;
                 http://link.springer.com/content/pdf/10.1007/s10207-014-0271-8.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Hoang:2015:GAM,
  author =       "Thang Hoang and Deokjai Choi and Thuc Nguyen",
  title =        "Gait authentication on mobile phone using biometric
                 cryptosystem and fuzzy commitment scheme",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "6",
  pages =        "549--560",
  month =        nov,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0273-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:44 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0273-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kozakevicius:2015:UQS,
  author =       "Alice Kozakevicius and Cristian Cappo and Bruno A.
                 Mozzaquatro and Raul Ceretta Nunes and Christian E.
                 Schaerer",
  title =        "{URL} query string anomaly sensor designed with the
                 bidimensional {Haar} wavelet transform",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "6",
  pages =        "561--581",
  month =        nov,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0276-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:44 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0276-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Liu:2016:STP,
  author =       "Liang Liu and Xiaofeng Chen and Wenjing Lou",
  title =        "Secure three-party computational protocols for
                 triangle area",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "1",
  pages =        "1--13",
  month =        feb,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0284-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:45 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0284-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Chen:2016:SOK,
  author =       "Yu Chen and Qiong Huang and Zongyang Zhang",
  title =        "{Sakai--Ohgishi--Kasahara} identity-based
                 non-interactive key exchange revisited and more",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "1",
  pages =        "15--33",
  month =        feb,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0274-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:45 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0274-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Liu:2016:PCC,
  author =       "Weiran Liu and Jianwei Liu and Qianhong Wu and Bo Qin
                 and Yan Li",
  title =        "Practical chosen-ciphertext secure {Hierarchical
                 Identity-Based Broadcast Encryption}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "1",
  pages =        "35--50",
  month =        feb,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0287-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:45 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0287-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Susil:2016:SSA,
  author =       "Petr Susil and Pouyan Sepehrdad and Serge Vaudenay and
                 Nicolas Courtois",
  title =        "On selection of samples in algebraic attacks and a new
                 technique to find hidden low degree equations",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "1",
  pages =        "51--65",
  month =        feb,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0295-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:45 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0295-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Wang:2016:SSE,
  author =       "Yuyu Wang and Keisuke Tanaka",
  title =        "Strongly simulation-extractable leakage-resilient
                 {NIZK}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "1",
  pages =        "67--79",
  month =        feb,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0291-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:45 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0291-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Rao:2016:EAB,
  author =       "Y. Sreenivasa Rao and Ratna Dutta",
  title =        "Efficient attribute-based signature and signcryption
                 realizing expressive access structures",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "1",
  pages =        "81--109",
  month =        feb,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0289-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:45 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0289-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{DeKeulenaer:2016:LTS,
  author =       "Ronald {De Keulenaer} and Jonas Maebe and Koen {De
                 Bosschere} and Bjorn {De Sutter}",
  title =        "Link-time smart card code hardening",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "2",
  pages =        "111--130",
  month =        apr,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0282-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:45 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0282-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Chikha:2016:BBA,
  author =       "Randa Jabeur {Ben Chikha} and Tarek Abbes and Wassim
                 {Ben Chikha} and Adel Bouhoula",
  title =        "Behavior-based approach to detect spam over {IP}
                 telephony attacks",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "2",
  pages =        "131--143",
  month =        apr,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0281-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:45 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0281-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Karimi:2016:UAA,
  author =       "Vahid R. Karimi and Paulo S. C. Alencar and Donald D.
                 Cowan",
  title =        "A uniform approach for access control and business
                 models with explicit rule realization",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "2",
  pages =        "145--171",
  month =        apr,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0275-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:45 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0275-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Raad:2016:PSR,
  author =       "Elie Raad and Bechara {Al Bouna} and Richard Chbeir",
  title =        "Preventing sensitive relationships disclosure for
                 better social media preservation",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "2",
  pages =        "173--194",
  month =        apr,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0278-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:45 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0278-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Celdran:2016:RPP,
  author =       "Alberto Huertas Celdr{\'a}n and Gin{\'e}s D{\'o}lera
                 Tormo and F{\'e}lix G{\'o}mez M{\'a}rmol and Manuel Gil
                 P{\'e}rez and Gregorio Mart{\'\i}nez P{\'e}rez",
  title =        "Resolving privacy-preserving relationships over
                 outsourced encrypted data storages",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "2",
  pages =        "195--209",
  month =        apr,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0283-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:45 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0283-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Mateu:2016:HAV,
  author =       "V{\'\i}ctor Mateu and Josep M. Miret and Francesc
                 Seb{\'e}",
  title =        "A hybrid approach to vector-based homomorphic tallying
                 remote voting",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "2",
  pages =        "211--221",
  month =        apr,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0279-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:45 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0279-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Yang:2016:MGE,
  author =       "Guomin Yang and Willy Susilo and Yi Mu",
  title =        "Message from the {Guest Editors}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "2",
  pages =        "223--224",
  month =        apr,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0315-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:45 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0315-3;
                 http://link.springer.com/content/pdf/10.1007/s10207-016-0315-3.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Rashwan:2016:UTP,
  author =       "Hatem A. Rashwan and Agusti Solanas and Dom{\`e}nec
                 Puig and Antoni Mart{\'\i}nez-Ballest{\'e}",
  title =        "Understanding trust in privacy-aware video
                 surveillance systems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "3",
  pages =        "225--234",
  month =        jun,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0286-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:45 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0286-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kurek:2016:TBC,
  author =       "Tytus Kurek and Marcin Niemiec and Artur Lason",
  title =        "Taking back control of privacy: a novel framework for
                 preserving cloud-based firewall policy
                 confidentiality",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "3",
  pages =        "235--250",
  month =        jun,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0292-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:45 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0292-y;
                 http://link.springer.com/content/pdf/10.1007/s10207-015-0292-y.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Orencik:2016:MKS,
  author =       "Cengiz Orencik and Ayse Selcuk and Erkay Savas and
                 Murat Kantarcio{\u{g}}lu",
  title =        "Multi-keyword search over encrypted data with scoring
                 and search pattern obfuscation",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "3",
  pages =        "251--269",
  month =        jun,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0294-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:45 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib;
                 https://www.math.utah.edu/pub/tex/bib/string-matching.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0294-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
  keywords =     "Efficiency Scoring; Encrypted cloud data; Privacy
                 preservation; Secure search",
}

@Article{Gritti:2016:BED,
  author =       "Cl{\'e}mentine Gritti and Willy Susilo and Thomas
                 Plantard and Kaitai Liang and Duncan S. Wong",
  title =        "Broadcast encryption with dealership",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "3",
  pages =        "271--283",
  month =        jun,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0285-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:45 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0285-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Mennink:2016:EPH,
  author =       "Bart Mennink and Bart Preneel",
  title =        "Efficient parallelizable hashing using small
                 non-compressing primitives",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "3",
  pages =        "285--300",
  month =        jun,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0288-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:45 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0288-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Abbes:2016:DFC,
  author =       "Tarek Abbes and Adel Bouhoula and Micha{\"e}l
                 Rusinowitch",
  title =        "Detection of firewall configuration errors with
                 updatable tree",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "3",
  pages =        "301--317",
  month =        jun,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0290-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:45 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0290-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Salini:2016:EPA,
  author =       "P. Salini and S. Kanmani",
  title =        "Effectiveness and performance analysis of
                 model-oriented security requirements engineering to
                 elicit security requirements: a systematic solution for
                 developing secure software systems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "3",
  pages =        "319--334",
  month =        jun,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0305-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:45 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0305-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Khayati:2016:PPP,
  author =       "Leyli Javid Khayati and Cengiz Orencik and Erkay Savas
                 and Berkant Ustao{\u{g}}lu",
  title =        "A practical privacy-preserving targeted advertising
                 scheme for {IPTV} users",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "4",
  pages =        "335--360",
  month =        aug,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0296-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:46 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0296-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Miao:2016:MDU,
  author =       "Qiguang Miao and Jiachen Liu and Ying Cao and Jianfeng
                 Song",
  title =        "Malware detection using bilayer behavior abstraction
                 and improved one-class support vector machines",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "4",
  pages =        "361--379",
  month =        aug,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0297-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:46 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0297-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Skoric:2016:FBR,
  author =       "Boris Skori{\'c} and Sebastiaan J. A. de Hoogh and
                 Nicola Zannone",
  title =        "Flow-based reputation with uncertainty: evidence-based
                 subjective logic",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "4",
  pages =        "381--402",
  month =        aug,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0298-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:46 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0298-5;
                 http://link.springer.com/content/pdf/10.1007/s10207-015-0298-5.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Vajda:2016:ATA,
  author =       "Istv{\'a}n Vajda",
  title =        "On the analysis of time-aware protocols in universal
                 composability framework",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "4",
  pages =        "403--412",
  month =        aug,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0300-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:46 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0300-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Diaz-Santiago:2016:CST,
  author =       "Sandra D{\'\i}az-Santiago and Lil Mar{\'\i}a
                 Rodr{\'\i}guez-Henr{\'\i}quez and Debrup Chakraborty",
  title =        "A cryptographic study of tokenization systems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "4",
  pages =        "413--432",
  month =        aug,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0313-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:46 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0313-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Malhi:2016:PPA,
  author =       "Avleen Malhi and Shalini Batra",
  title =        "Privacy-preserving authentication framework using
                 {Bloom} filter for secure vehicular communications",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "4",
  pages =        "433--453",
  month =        aug,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0299-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:46 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0299-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Anagnostopoulos:2016:NFM,
  author =       "Marios Anagnostopoulos and Georgios Kambourakis and
                 Stefanos Gritzalis",
  title =        "New facets of mobile botnet: architecture and
                 evaluation",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "5",
  pages =        "455--473",
  month =        oct,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0310-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:46 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0310-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Almaatouq:2016:IIL,
  author =       "Abdullah Almaatouq and Erez Shmueli and Mariam Nouh
                 and Ahmad Alabdulkareem and Vivek K. Singh and Mansour
                 Alsaleh and Abdulrahman Alarifi and Anas Alfaris and
                 Alex `Sandy' Pentland",
  title =        "If it looks like a spammer and behaves like a spammer,
                 it must be a spammer: analysis and detection of
                 microblogging spam accounts",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "5",
  pages =        "475--491",
  month =        oct,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0321-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:46 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0321-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Blanton:2016:POS,
  author =       "Marina Blanton and Everaldo Aguiar",
  title =        "Private and oblivious set and multiset operations",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "5",
  pages =        "493--518",
  month =        oct,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0301-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:46 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0301-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kiraz:2016:EVA,
  author =       "Mehmet Sabir Kiraz and Osmanbey Uzunkol",
  title =        "Efficient and verifiable algorithms for secure
                 outsourcing of cryptographic computations",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "5",
  pages =        "519--537",
  month =        oct,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0308-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:46 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0308-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Hu:2016:EWS,
  author =       "Changhui Hu and Lidong Han",
  title =        "Efficient wildcard search over encrypted data",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "5",
  pages =        "539--547",
  month =        oct,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0302-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:46 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib;
                 https://www.math.utah.edu/pub/tex/bib/string-matching.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0302-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
  keywords =     "Cloud computing; Searchable symmetric encryption;
                 Wildcard search",
}

@Article{Kasamatsu:2016:TSE,
  author =       "Kohei Kasamatsu and Takahiro Matsuda and Keita Emura
                 and Nuttapong Attrapadung and Goichiro Hanaoka and
                 Hideki Imai",
  title =        "Time-specific encryption from forward-secure
                 encryption: generic and direct constructions",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "5",
  pages =        "549--571",
  month =        oct,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0304-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:46 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0304-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Chen:2016:MGE,
  author =       "Liqun Chen and Chris Mitchell",
  title =        "Message from the guest editors",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "6",
  pages =        "573--574",
  month =        nov,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0353-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:46 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0353-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Rowe:2016:MPS,
  author =       "Paul D. Rowe and Joshua D. Guttman and Moses D.
                 Liskov",
  title =        "Measuring protocol strength with security goals",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "6",
  pages =        "575--596",
  month =        nov,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0319-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:46 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0319-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Manulis:2016:SMP,
  author =       "Mark Manulis and Douglas Stebila and Franziskus Kiefer
                 and Nick Denham",
  title =        "Secure modular password authentication for the web
                 using channel bindings",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "6",
  pages =        "597--620",
  month =        nov,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0348-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:46 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0348-7;
                 http://link.springer.com/content/pdf/10.1007/s10207-016-0348-7.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Brown:2016:API,
  author =       "Christopher W. Brown and Michael Jenkins",
  title =        "Analyzing proposals for improving authentication on
                 the {TLS-\slash SSL}-protected {Web}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "6",
  pages =        "621--635",
  month =        nov,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0316-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:46 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0316-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Degabriele:2016:UPC,
  author =       "Jean Paul Degabriele and Victoria Fehr and Marc
                 Fischlin and Tommaso Gagliardoni and Felix G{\"u}nther
                 and Giorgia Azzurra Marson and Arno Mittelbach and
                 Kenneth G. Paterson",
  title =        "Unpicking {PLAID}: a cryptographic analysis of an
                 {ISO}-standards-track authentication protocol",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "6",
  pages =        "637--657",
  month =        nov,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0309-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:46 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0309-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Cremers:2016:III,
  author =       "Cas Cremers and Marko Horvat",
  title =        "Improving the {ISO\slash IEC 11770} standard for key
                 management techniques",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "6",
  pages =        "659--673",
  month =        nov,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0306-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:46 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0306-9;
                 http://link.springer.com/content/pdf/10.1007/s10207-015-0306-9.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Poettering:2017:DAP,
  author =       "Bertram Poettering and Douglas Stebila",
  title =        "Double-authentication-preventing signatures",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "1",
  pages =        "1--22",
  month =        feb,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0307-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:47 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0307-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Li:2017:WOO,
  author =       "Lichun Li and Anwitaman Datta",
  title =        "Write-only oblivious {RAM}-based privacy-preserved
                 access of outsourced data",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "1",
  pages =        "23--42",
  month =        feb,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0329-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:47 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0329-x;
                 http://link.springer.com/content/pdf/10.1007/s10207-016-0329-x.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Karimi:2017:FMA,
  author =       "Vahid R. Karimi and Paulo S. C. Alencar and Donald D.
                 Cowan",
  title =        "A formal modeling and analysis approach for access
                 control rules, policies, and their combinations",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "1",
  pages =        "43--74",
  month =        feb,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0314-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:47 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0314-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Albertini:2017:EAC,
  author =       "Davide Alberto Albertini and Barbara Carminati and
                 Elena Ferrari",
  title =        "An extended access control mechanism exploiting data
                 dependencies",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "1",
  pages =        "75--89",
  month =        feb,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0322-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:47 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0322-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Shaikh:2017:DCM,
  author =       "Riaz Ahmed Shaikh and Kamel Adi and Luigi Logrippo",
  title =        "A Data Classification Method for Inconsistency and
                 Incompleteness Detection in Access Control Policy
                 Sets",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "1",
  pages =        "91--113",
  month =        feb,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0317-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:47 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0317-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Stevanovic:2017:MIC,
  author =       "Matija Stevanovic and Jens Myrup Pedersen and
                 Alessandro D'Alconzo and Stefan Ruehrup",
  title =        "A method for identifying compromised clients based on
                 {DNS} traffic analysis",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "2",
  pages =        "115--132",
  month =        apr,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0331-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:47 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0331-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Mehrnezhad:2017:PCI,
  author =       "Maryam Mehrnezhad and Abbas Ghaemi Bafghi and Ahad
                 Harati and Ehsan Toreini",
  title =        "{PiSHi}: click the images and {I} tell if you are a
                 human",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "2",
  pages =        "133--149",
  month =        apr,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0311-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:47 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0311-z;
                 http://link.springer.com/content/pdf/10.1007/s10207-015-0311-z.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Boyd:2017:AAK,
  author =       "Colin Boyd and Cas Cremers and Mich{\`e}le Feltz and
                 Kenneth G. Paterson and Bertram Poettering and Douglas
                 Stebila",
  title =        "{ASICS}: authenticated key exchange security
                 incorporating certification systems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "2",
  pages =        "151--171",
  month =        apr,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0312-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:47 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0312-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Tiloca:2017:IRD,
  author =       "Marco Tiloca and Christian Gehrmann and Ludwig Seitz",
  title =        "On improving resistance to {Denial of Service} and key
                 provisioning scalability of the {DTLS} handshake",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "2",
  pages =        "173--193",
  month =        apr,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0326-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:47 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0326-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Singh:2017:RUA,
  author =       "Ankit Singh and Hervais C. Simo Fhom",
  title =        "Restricted usage of anonymous credentials in vehicular
                 ad hoc networks for misbehavior detection",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "2",
  pages =        "195--211",
  month =        apr,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0328-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:47 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0328-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Mann:2017:TFA,
  author =       "Christopher Mann and Daniel Loebenberger",
  title =        "Two-factor authentication for the {Bitcoin} protocol",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "2",
  pages =        "213--226",
  month =        apr,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0325-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Thu Nov 30 16:02:10 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0325-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bat-Erdene:2017:EAC,
  author =       "Munkhbayar Bat-Erdene and Hyundo Park and Hongzhe Li
                 and Heejo Lee and Mahn-Soo Choi",
  title =        "Entropy analysis to classify unknown packing
                 algorithms for malware detection",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "3",
  pages =        "227--248",
  month =        jun,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0330-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:47 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0330-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bernardini:2017:MRP,
  author =       "Riccardo Bernardini and Roberto Rinaldo",
  title =        "Making random permutations from physically unclonable
                 constants",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "3",
  pages =        "249--261",
  month =        jun,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0324-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:47 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0324-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
  keywords =     "Physically unclonable functions; Privacy and security;
                 Random permutations",
}

@Article{Kim:2017:MES,
  author =       "Minchul Kim and Younghoon Jung and Junghwan Song",
  title =        "A modified exhaustive search on a password system
                 using {SHA-1}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "3",
  pages =        "263--269",
  month =        jun,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0332-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:47 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib;
                 https://www.math.utah.edu/pub/tex/bib/string-matching.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0332-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
  keywords =     "Exhaustive search; Microsoft Office; Password
                 cracking; Security evaluation; SHA-1",
}

@Article{Ragab-Hassen:2017:KMS,
  author =       "Hani Ragab-Hassen and Esma Lounes",
  title =        "A key management scheme evaluation using {Markov}
                 processes",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "3",
  pages =        "271--280",
  month =        jun,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0323-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:47 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0323-3;
                 http://link.springer.com/content/pdf/10.1007/s10207-016-0323-3.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Gunther:2017:LMT,
  author =       "Felix G{\"u}nther and Bertram Poettering",
  title =        "Linkable message tagging: solving the key distribution
                 problem of signature schemes",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "3",
  pages =        "281--297",
  month =        jun,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0327-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:47 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0327-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Lai:2017:EIB,
  author =       "Jianchang Lai and Yi Mu and Fuchun Guo",
  title =        "Efficient identity-based online\slash offline
                 encryption and signcryption with short ciphertext",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "3",
  pages =        "299--311",
  month =        jun,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0320-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:47 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0320-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kotzanikolaou:2017:BAR,
  author =       "Panayiotis Kotzanikolaou and George Chatzisofroniou
                 and Mike Burmester",
  title =        "Broadcast anonymous routing ({BAR}): scalable
                 real-time anonymous communication",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "3",
  pages =        "313--326",
  month =        jun,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0318-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:47 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0318-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Catalano:2017:CAO,
  author =       "Dario Catalano and Dario Fiore and Rosario Gennaro",
  title =        "A certificateless approach to onion routing",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "3",
  pages =        "327--343",
  month =        jun,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0337-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:47 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0337-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Lazouski:2017:SDU,
  author =       "Aliaksandr Lazouski and Fabio Martinelli and Paolo
                 Mori and Andrea Saracino",
  title =        "Stateful Data Usage Control for {Android} Mobile
                 Devices",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "4",
  pages =        "345--369",
  month =        aug,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0336-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:48 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0336-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Ruiz-Heras:2017:AAB,
  author =       "A. Ruiz-Heras and P. Garc{\'\i}a-Teodoro and L.
                 S{\'a}nchez-Casado",
  title =        "{ADroid}: anomaly-based detection of malicious events
                 in {Android} platforms",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "4",
  pages =        "371--384",
  month =        aug,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0333-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:48 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0333-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Garg:2017:NBD,
  author =       "Shree Garg and Sateesh K. Peddoju and Anil K. Sarje",
  title =        "Network-based detection of {Android} malicious apps",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "4",
  pages =        "385--400",
  month =        aug,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0343-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:48 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0343-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kolias:2017:TDS,
  author =       "Constantinos Kolias and Vasilis Kolias and Georgios
                 Kambourakis",
  title =        "{TermID}: a distributed swarm intelligence-based
                 approach for wireless intrusion detection",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "4",
  pages =        "401--416",
  month =        aug,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0335-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:48 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0335-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Sampangi:2017:HSR,
  author =       "Raghav V. Sampangi and Srinivas Sampalli",
  title =        "{HiveSec}: security in resource-constrained wireless
                 networks inspired by beehives and bee swarms",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "4",
  pages =        "417--433",
  month =        aug,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0341-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:48 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0341-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Antunes:2017:DVT,
  author =       "Nuno Antunes and Marco Vieira",
  title =        "Designing vulnerability testing tools for web
                 services: approach, components, and tools",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "4",
  pages =        "435--457",
  month =        aug,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0334-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:48 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0334-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Sisaat:2017:STM,
  author =       "Khamphao Sisaat and Surin Kittitornkun and Hiroaki
                 Kikuchi and Chaxiong Yukonhiatou and Masato Terada and
                 Hiroshi Ishii",
  title =        "A spatio-temporal malware and country clustering
                 algorithm: {2012 IIJ MITF} case study",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "5",
  pages =        "459--473",
  month =        oct,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0342-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:48 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0342-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Duessel:2017:DZD,
  author =       "Patrick Duessel and Christian Gehl and Ulrich Flegel
                 and Sven Dietrich and Michael Meier",
  title =        "Detecting zero-day attacks using context-aware anomaly
                 detection at the application-layer",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "5",
  pages =        "475--490",
  month =        oct,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0344-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:48 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0344-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Arapinis:2017:APM,
  author =       "Myrto Arapinis and Loretta Ilaria Mancini and Eike
                 Ritter and Mark Dermot Ryan",
  title =        "Analysis of privacy in mobile telephony systems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "5",
  pages =        "491--523",
  month =        oct,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0338-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:48 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0338-9;
                 http://link.springer.com/content/pdf/10.1007/s10207-016-0338-9.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Huang:2017:MAP,
  author =       "Cheng-Ta Huang and Yu-Hong Zhang and Li-Chiun Lin and
                 Wei-Jen Wang and Shiuh-Jeng Wang",
  title =        "Mutual authentications to parties with {QR}-code
                 applications in mobile systems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "5",
  pages =        "525--540",
  month =        oct,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0349-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:48 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0349-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Alawatugoda:2017:GCM,
  author =       "Janaka Alawatugoda",
  title =        "Generic construction of an {eCK}-secure key exchange
                 protocol in the standard model",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "5",
  pages =        "541--557",
  month =        oct,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0346-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:48 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0346-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Zhang:2017:CIB,
  author =       "Lei Zhang and Qianhong Wu and Bo Qin and Hua Deng and
                 Jiangtao Li and Jianwei Liu and Wenchang Shi",
  title =        "Certificateless and identity-based authenticated
                 asymmetric group key agreement",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "5",
  pages =        "559--576",
  month =        oct,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0339-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:48 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0339-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Aliasgari:2017:SCH,
  author =       "Mehrdad Aliasgari and Marina Blanton and Fattaneh
                 Bayatbabolghani",
  title =        "Secure computation of hidden {Markov} models and
                 secure floating-point arithmetic in the malicious
                 model",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "6",
  pages =        "577--601",
  month =        nov,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0350-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:49 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/fparith.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0350-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
  keywords =     "Floating point; Gaussian mixture models; Hidden Markov
                 models; Secure computation",
}

@Article{Li:2017:RRS,
  author =       "Lichun Li and Michael Militzer and Anwitaman Datta",
  title =        "{rPIR}: ramp secret sharing-based
                 communication-efficient private information retrieval",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "6",
  pages =        "603--625",
  month =        nov,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0347-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:49 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0347-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Esfahani:2017:EHM,
  author =       "Alireza Esfahani and Georgios Mantas and Jonathan
                 Rodriguez and Jos{\'e} Carlos Neves",
  title =        "An efficient homomorphic {MAC}-based scheme against
                 data and tag pollution attacks in network
                 coding-enabled wireless networks",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "6",
  pages =        "627--639",
  month =        nov,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0351-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:49 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0351-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kananizadeh:2017:DDP,
  author =       "Shahrzad Kananizadeh and Kirill Kononenko",
  title =        "Development of dynamic protection against timing
                 channels",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "6",
  pages =        "641--651",
  month =        nov,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0356-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:49 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0356-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Malatras:2017:EUI,
  author =       "Apostolos Malatras and Dimitris Geneiatakis and
                 Ioannis Vakalis",
  title =        "On the efficiency of user identification: a
                 system-based approach",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "6",
  pages =        "653--671",
  month =        nov,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0340-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:49 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0340-2;
                 http://link.springer.com/content/pdf/10.1007/s10207-016-0340-2.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Joh:2017:PSV,
  author =       "HyunChul Joh and Yashwant K. Malaiya",
  title =        "Periodicity in software vulnerability discovery,
                 patching and exploitation",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "6",
  pages =        "673--690",
  month =        nov,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0345-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:49 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0345-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Rial:2018:PPS,
  author =       "Alfredo Rial and George Danezis and Markulf
                 Kohlweiss",
  title =        "Privacy-preserving smart metering revisited",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "1",
  pages =        "1--31",
  month =        feb,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0355-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:49 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0355-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Deng:2018:SPT,
  author =       "Hua Deng and Yunya Zhou and Qianhong Wu and Bo Qin and
                 Jianwei Liu",
  title =        "Secure {pay-TV} for chained hotels",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "1",
  pages =        "33--42",
  month =        feb,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0354-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:49 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0354-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Yoneyama:2018:FMR,
  author =       "Kazuki Yoneyama",
  title =        "Formal modeling of random oracle programmability and
                 verification of signature unforgeability using
                 task-{PIOAs}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "1",
  pages =        "43--66",
  month =        feb,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0352-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:49 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0352-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bernardini:2018:GES,
  author =       "Riccardo Bernardini and Roberto Rinaldo",
  title =        "Generalized {Elias} schemes for efficient harvesting
                 of truly random bits",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "1",
  pages =        "67--81",
  month =        feb,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0358-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:49 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0358-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
  keywords =     "Gaussian random variables; Geometric random variables;
                 Random number conditioning; Random number generation;
                 Vector quantization",
}

@Article{Ayed:2018:ADS,
  author =       "Samiha Ayed and Muhammad Sabir Idrees and Nora Cuppens
                 and Frederic Cuppens",
  title =        "Achieving dynamicity in security policies enforcement
                 using aspects",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "1",
  pages =        "83--103",
  month =        feb,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0357-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:49 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0357-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Deepa:2018:BBD,
  author =       "G. Deepa and P. Santhi Thilagam and Furqan Ahmed Khan
                 and Amit Praseed and Alwyn R. Pais and Nushafreen
                 Palsetia",
  title =        "Black-box detection of {XQuery} injection and
                 parameter tampering vulnerabilities in web
                 applications",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "1",
  pages =        "105--120",
  month =        feb,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0359-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:49 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0359-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Shah:2018:MMM,
  author =       "Ankit Shah and Rajesh Ganesan and Sushil Jajodia and
                 Hasan Cam",
  title =        "A methodology to measure and monitor level of
                 operational effectiveness of a {CSOC}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "2",
  pages =        "121--134",
  month =        apr,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0365-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Mar 3 09:41:24 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0365-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Akiyama:2018:HDC,
  author =       "Mitsuaki Akiyama and Takeshi Yagi and Takeo Hariu and
                 Youki Kadobayashi",
  title =        "{HoneyCirculator}: distributing credential honeytoken
                 for introspection of web-based attack cycle",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "2",
  pages =        "135--151",
  month =        apr,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0361-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Mar 3 09:41:24 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0361-5;
                 http://link.springer.com/content/pdf/10.1007/s10207-017-0361-5.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kirubavathi:2018:SAD,
  author =       "G. Kirubavathi and R. Anitha",
  title =        "Structural analysis and detection of {Android} botnets
                 using machine learning techniques",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "2",
  pages =        "153--167",
  month =        apr,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0363-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Mar 3 09:41:24 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0363-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Gruber:2018:UTB,
  author =       "A. Gruber and I. Ben-Gal",
  title =        "Using targeted {Bayesian} network learning for suspect
                 identification in communication networks",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "2",
  pages =        "169--181",
  month =        apr,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0362-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Mar 3 09:41:24 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0362-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kuo:2018:DRA,
  author =       "Tsung-Min Kuo and Sung-Ming Yen and Meng-Che Han",
  title =        "Dynamic reversed accumulator",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "2",
  pages =        "183--191",
  month =        apr,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0360-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Mar 3 09:41:24 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0360-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
  keywords =     "Dynamic accumulator; Revocation; Zero-knowledge
                 proof",
}

@Article{Seo:2018:AOF,
  author =       "Jae Hong Seo and Keita Emura and Keita Xagawa and
                 Kazuki Yoneyama",
  title =        "Accumulable optimistic fair exchange from verifiably
                 encrypted homomorphic signatures",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "2",
  pages =        "193--220",
  month =        apr,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0367-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Mar 3 09:41:24 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0367-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Laszka:2018:GTA,
  author =       "Aron Laszka and Yevgeniy Vorobeychik and Xenofon
                 Koutsoukos",
  title =        "A game-theoretic approach for integrity assurance in
                 resource-bounded systems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "2",
  pages =        "221--242",
  month =        apr,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0364-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Mar 3 09:41:24 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0364-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Domingo-Ferrer:2018:DGS,
  author =       "Josep Domingo-Ferrer and Alberto Blanco-Justicia and
                 Carla R{\`a}fols",
  title =        "Dynamic group size accreditation and group discounts
                 preserving anonymity",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "3",
  pages =        "243--260",
  month =        jun,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0368-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Mon Apr 16 12:27:34 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0368-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Luo:2018:ASI,
  author =       "Ying Luo and Sen-ching S. Cheung and Riccardo
                 Lazzeretti and Tommaso Pignata and Mauro Barni",
  title =        "Anonymous subject identification and privacy
                 information management in video surveillance",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "3",
  pages =        "261--278",
  month =        jun,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0380-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Mon Apr 16 12:27:34 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0380-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Martinez-Balleste:2018:DIS,
  author =       "Antoni Mart{\'\i}nez-Ballest{\'e} and Hatem Rashwan
                 and Domenec Puig and Agusti Solanas",
  title =        "Design and implementation of a secure and trustworthy
                 platform for privacy-aware video surveillance",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "3",
  pages =        "279--290",
  month =        jun,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0370-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Mon Apr 16 12:27:34 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0370-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Mehrnezhad:2018:SPM,
  author =       "Maryam Mehrnezhad and Ehsan Toreini and Siamak F.
                 Shahandashti and Feng Hao",
  title =        "Stealing {PINs} via mobile sensors: actual risk versus
                 user perception",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "3",
  pages =        "291--313",
  month =        jun,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0369-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Mon Apr 16 12:27:34 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0369-x;
                 http://link.springer.com/content/pdf/10.1007/s10207-017-0369-x.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Roy:2018:DSC,
  author =       "Sangita Roy and Ashok Singh Sairam",
  title =        "Distributed star coloring of network for {IP}
                 traceback",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "3",
  pages =        "315--326",
  month =        jun,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0366-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Mon Apr 16 12:27:34 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0366-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Faust:2018:OPM,
  author =       "Sebastian Faust and Carmit Hazay and Daniele Venturi",
  title =        "Outsourced pattern matching",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "3",
  pages =        "327--346",
  month =        jun,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0374-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Mon Apr 16 12:27:34 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib;
                 https://www.math.utah.edu/pub/tex/bib/string-matching.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0374-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Wang:2018:VEC,
  author =       "Yujue Wang and HweeHwa Pang and Robert H. Deng",
  title =        "Verifiably encrypted cascade-instantiable blank
                 signatures to secure progressive decision management",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "3",
  pages =        "347--363",
  month =        jun,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0372-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Mon Apr 16 12:27:34 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0372-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Gonzalez-Serrano:2018:SML,
  author =       "Francisco-Javier Gonz{\'a}lez-Serrano and Adri{\'a}n
                 Amor-Mart{\'\i}n and Jorge Casamay{\'o}n-Ant{\'o}n",
  title =        "Supervised machine learning using encrypted training
                 data",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "4",
  pages =        "365--377",
  month =        aug,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0381-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Jul 25 08:53:56 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0381-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Ham:2018:IYP,
  author =       "HyoungMin Ham and JongHyup Lee and JooSeok Song",
  title =        "Improved yoking proof protocols for preserving
                 anonymity",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "4",
  pages =        "379--393",
  month =        aug,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0383-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Jul 25 08:53:56 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0383-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Lanet:2018:WTM,
  author =       "Jean-Louis Lanet and H{\'e}l{\`e}ne {Le Bouder} and
                 Mohammed Benattou and Axel Legay",
  title =        "When time meets test",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "4",
  pages =        "395--409",
  month =        aug,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0371-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Jul 25 08:53:56 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0371-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Ali:2018:ZMN,
  author =       "Syed Taha Ali and Patrick McCorry and Peter Hyun-Jeen
                 Lee and Feng Hao",
  title =        "{ZombieCoin 2.0}: managing next-generation botnets
                 using {Bitcoin}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "4",
  pages =        "411--422",
  month =        aug,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0379-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Jul 25 08:53:56 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0379-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Yang:2018:NSS,
  author =       "Zheng Yang and Chao Liu and Wanping Liu and Daigu
                 Zhang and Song Luo",
  title =        "A new strong security model for stateful authenticated
                 group key exchange",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "4",
  pages =        "423--440",
  month =        aug,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0373-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Jul 25 08:53:56 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0373-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Morales-Sandoval:2018:PBC,
  author =       "Miguel Morales-Sandoval and Jose Luis Gonzalez-Compean
                 and Arturo Diaz-Perez and Victor J. Sosa-Sosa",
  title =        "A pairing-based cryptographic approach for data
                 security in the cloud",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "4",
  pages =        "441--461",
  month =        aug,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0375-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Jul 25 08:53:56 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0375-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Jiang:2018:FCP,
  author =       "Yinhao Jiang and Willy Susilo and Yi Mu and Fuchun
                 Guo",
  title =        "Flexible ciphertext-policy attribute-based encryption
                 supporting {AND}-gate and threshold with short
                 ciphertexts",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "4",
  pages =        "463--475",
  month =        aug,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0376-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Jul 25 08:53:56 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0376-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Jia:2018:ERH,
  author =       "Hongyong Jia and Yue Chen and Julong Lan and Kaixiang
                 Huang and Jun Wang",
  title =        "Efficient revocable hierarchical identity-based
                 encryption using cryptographic accumulators",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "4",
  pages =        "477--490",
  month =        aug,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0387-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Jul 25 08:53:56 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0387-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Chen:2018:MGE,
  author =       "Liqun Chen and Jinguang Han and Chris Mitchell",
  title =        "Message from the {Guest Editors}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "5",
  pages =        "491--492",
  month =        oct,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-018-0416-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Sep 25 06:07:03 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-018-0416-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Imamura:2018:IAA,
  author =       "Kazuya Imamura and Kazuhiko Minematsu and Tetsu
                 Iwata",
  title =        "Integrity analysis of authenticated encryption based
                 on stream ciphers",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "5",
  pages =        "493--511",
  month =        oct,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0378-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Sep 25 06:07:03 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0378-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Yoneyama:2018:MCK,
  author =       "Kazuki Yoneyama and Reo Yoshida and Yuto Kawahara and
                 Tetsutaro Kobayashi and Hitoshi Fuji and Tomohide
                 Yamamoto",
  title =        "Multi-cast key distribution: scalable, dynamic and
                 provably secure construction",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "5",
  pages =        "513--532",
  month =        oct,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0389-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Sep 25 06:07:03 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0389-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Jiang:2018:CPA,
  author =       "Yinhao Jiang and Willy Susilo and Yi Mu and Fuchun
                 Guo",
  title =        "Ciphertext-policy attribute-based encryption
                 supporting access policy update and its extension with
                 preserved attributes",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "5",
  pages =        "533--548",
  month =        oct,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0388-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Sep 25 06:07:03 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0388-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Li:2018:IVC,
  author =       "Yuxi Li and Fucai Zhou and Yuhai Qin and Muqing Lin
                 and Zifeng Xu",
  title =        "Integrity-verifiable conjunctive keyword searchable
                 encryption in cloud storage",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "5",
  pages =        "549--568",
  month =        oct,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0394-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Sep 25 06:07:03 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0394-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Ribeiro:2018:SRH,
  author =       "Carlos Ribeiro and Herbert Leitold and Simon Esposito
                 and David Mitzam",
  title =        "{STORK}: a real, heterogeneous, large-scale {eID}
                 management system",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "5",
  pages =        "569--585",
  month =        oct,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0385-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Sep 25 06:07:03 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0385-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Frattolillo:2018:WPE,
  author =       "Franco Frattolillo",
  title =        "Watermarking protocols: an excursus to motivate a new
                 approach",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "5",
  pages =        "587--601",
  month =        oct,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0386-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Sep 25 06:07:03 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0386-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Lopriore:2018:ARM,
  author =       "Lanfranco Lopriore",
  title =        "Access right management by extended password
                 capabilities",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "5",
  pages =        "603--612",
  month =        oct,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0390-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Sep 25 06:07:03 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0390-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{ElSalamouny:2018:ONF,
  author =       "Ehab ElSalamouny and S{\'e}bastien Gambs",
  title =        "Optimal noise functions for location privacy on
                 continuous regions",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "6",
  pages =        "613--630",
  month =        nov,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0384-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Sep 25 06:07:04 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0384-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Murakami:2018:OAA,
  author =       "Keisuke Murakami and Takeaki Uno",
  title =        "Optimization algorithm for $k$-anonymization of
                 datasets with low information loss",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "6",
  pages =        "631--644",
  month =        nov,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0392-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Sep 25 06:07:04 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0392-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Scaife:2018:OSR,
  author =       "Nolen Scaife and Henry Carter and Lyrissa Lidsky and
                 Rachael L. Jones and Patrick Traynor",
  title =        "{OnionDNS}: a seizure-resistant top-level domain",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "6",
  pages =        "645--660",
  month =        nov,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0391-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Sep 25 06:07:04 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0391-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Chiba:2018:DTA,
  author =       "Daiki Chiba and Takeshi Yagi and Mitsuaki Akiyama and
                 Toshiki Shibahara and Tatsuya Mori and Shigeki Goto",
  title =        "{DomainProfiler}: toward accurate and early discovery
                 of domain names abused in future",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "6",
  pages =        "661--680",
  month =        nov,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0396-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Sep 25 06:07:04 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0396-7;
                 http://link.springer.com/content/pdf/10.1007/s10207-017-0396-7.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Wangen:2018:FEI,
  author =       "Gaute Wangen and Christoffer Hallstensen and Einar
                 Snekkenes",
  title =        "A framework for estimating information security risk
                 assessment method completeness",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "6",
  pages =        "681--699",
  month =        nov,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0382-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Sep 25 06:07:04 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0382-0;
                 http://link.springer.com/content/pdf/10.1007/s10207-017-0382-0.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bindel:2018:CAA,
  author =       "Nina Bindel and Johannes Buchmann and Susanne
                 Rie{\ss}",
  title =        "Comparing apples with apples: performance analysis of
                 lattice-based authenticated key exchange protocols",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "6",
  pages =        "701--718",
  month =        nov,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0397-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Sep 25 06:07:04 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0397-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Cimitile:2018:TNM,
  author =       "Aniello Cimitile and Francesco Mercaldo and Vittoria
                 Nardone and Antonella Santone and Corrado Aaron
                 Visaggio",
  title =        "{Talos}: no more ransomware victims with formal
                 methods",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "6",
  pages =        "719--738",
  month =        nov,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0398-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Sep 25 06:07:04 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0398-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Das:2019:DSI,
  author =       "Debasish Das and Utpal Sharma and D. K.
                 Bhattacharyya",
  title =        "Defeating {SQL} injection attack in authentication
                 security: an experimental study",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "1",
  pages =        "1--22",
  month =        feb,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0393-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 22 17:04:47 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0393-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Dasgupta:2019:DIN,
  author =       "Dipankar Dasgupta and Abhijit Kumar Nag and Denise
                 Ferebee and Sanjib Kumar Saha and Kul Prasad Subedi and
                 Arunava Roy and Alvaro Madero and Abel Sanchez and John
                 R. Williams",
  title =        "Design and implementation of {Negative Authentication
                 System}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "1",
  pages =        "23--48",
  month =        feb,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0395-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 22 17:04:47 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0395-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Stasinopoulos:2019:CAE,
  author =       "Anastasios Stasinopoulos and Christoforos Ntantogian
                 and Christos Xenakis",
  title =        "{Commix}: automating evaluation and exploitation of
                 command injection vulnerabilities in {Web}
                 applications",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "1",
  pages =        "49--72",
  month =        feb,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-018-0399-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 22 17:04:47 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-018-0399-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Faria:2019:DAA,
  author =       "Gerson de Souza Faria and Hae Yong Kim",
  title =        "Differential audio analysis: a new side-channel attack
                 on {PIN} pads",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "1",
  pages =        "73--84",
  month =        feb,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-018-0403-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 22 17:04:47 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-018-0403-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Mesbah:2019:REJ,
  author =       "Abdelhak Mesbah and Jean-Louis Lanet and Mohamed
                 Mezghiche",
  title =        "Reverse engineering {Java Card} and vulnerability
                 exploitation: a shortcut to {ROM}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "1",
  pages =        "85--100",
  month =        feb,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-018-0401-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 22 17:04:47 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib;
                 https://www.math.utah.edu/pub/tex/bib/java2010.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-018-0401-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Hinarejos:2019:DPE,
  author =       "M. Francisca Hinarejos and Andreu-Pere Isern-Dey{\`a}
                 and Josep-Llu{\'\i}s Ferrer-Gomila and Lloren{\c{c}}
                 Huguet-Rotger",
  title =        "Deployment and performance evaluation of mobile
                 multicoupon solutions",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "1",
  pages =        "101--124",
  month =        feb,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-018-0404-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 22 17:04:47 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-018-0404-6;
                 http://link.springer.com/content/pdf/10.1007/s10207-018-0404-6.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Gulyas:2019:HIA,
  author =       "G{\'a}bor Gy{\"o}rgy Guly{\'a}s and S{\'a}ndor Imre",
  title =        "Hiding information against structural
                 re-identification",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "2",
  pages =        "125--139",
  month =        apr,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-018-0400-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Mon Mar 18 14:19:02 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-018-0400-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Zheng:2019:IDR,
  author =       "Jian-Wu Zheng and Jing Zhao and Xin-Ping Guan",
  title =        "Identifier discrimination: realizing selective-{ID}
                 {HIBE} with authorized delegation and dedicated
                 encryption privacy",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "2",
  pages =        "141--162",
  month =        apr,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-018-0402-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Mon Mar 18 14:19:02 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-018-0402-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Chang:2019:CTM,
  author =       "Donghoon Chang and Arpan Jati and Sweta Mishra and
                 Somitra Kumar Sanadhya",
  title =        "Cryptanalytic time-memory trade-off for password
                 hashing schemes",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "2",
  pages =        "163--180",
  month =        apr,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-018-0405-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Mon Mar 18 14:19:02 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-018-0405-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kluczniak:2019:MDA,
  author =       "Kamil Kluczniak and Jianfeng Wang and Xiaofeng Chen
                 and Miroslaw Kutylowski",
  title =        "Multi-device anonymous authentication",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "2",
  pages =        "181--197",
  month =        apr,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-018-0406-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Mon Mar 18 14:19:02 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-018-0406-4;
                 http://link.springer.com/content/pdf/10.1007/s10207-018-0406-4.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Shah:2019:MEF,
  author =       "Ankit Shah and Rajesh Ganesan and Sushil Jajodia",
  title =        "A methodology for ensuring fair allocation of {CSOC}
                 effort for alert investigation",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "2",
  pages =        "199--218",
  month =        apr,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-018-0407-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Mon Mar 18 14:19:02 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-018-0407-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Ros-Martin:2019:SND,
  author =       "Miguel Ros-Mart{\'\i}n and Juli{\'a}n Salas and Jordi
                 Casas-Roma",
  title =        "Scalable non-deterministic clustering-based
                 $k$-anonymization for rich networks",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "2",
  pages =        "219--238",
  month =        apr,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-018-0409-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Mon Mar 18 14:19:02 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-018-0409-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Joudaki:2019:ETS,
  author =       "Zeinab Joudaki and Julie Thorpe and Miguel {Vargas
                 Martin}",
  title =        "{Enhanced Tacit Secrets}: System-assigned passwords
                 you can't write down, but don't need to",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "2",
  pages =        "239--255",
  month =        apr,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-018-0408-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Mon Mar 18 14:19:02 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-018-0408-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bernardi:2019:DMD,
  author =       "Mario Luca Bernardi and Marta Cimitile Damiano
                 Distante and Fabio Martinelli and Francesco Mercaldo",
  title =        "Dynamic malware detection and phylogeny analysis using
                 process mining",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "3",
  pages =        "257--284",
  month =        jun,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-018-0415-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Thu May 23 17:57:24 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-018-0415-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Grining:2019:PPP,
  author =       "Krzysztof Grining and Marek Klonowski and Piotr Syga",
  title =        "On practical privacy-preserving fault-tolerant data
                 aggregation",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "3",
  pages =        "285--304",
  month =        jun,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-018-0413-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Thu May 23 17:57:24 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-018-0413-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Vora:2019:KBP,
  author =       "Aishwarya Vipul Vora and Saumya Hegde",
  title =        "Keyword-based private searching on cloud data along
                 with keyword association and dissociation using cuckoo
                 filter",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "3",
  pages =        "305--319",
  month =        jun,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-018-0418-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Thu May 23 17:57:24 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-018-0418-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Wu:2019:TPP,
  author =       "Ge Wu and Yi Mu and Willy Susilo and Fuchun Guo and
                 Futai Zhang",
  title =        "Threshold privacy-preserving cloud auditing with
                 multiple uploaders",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "3",
  pages =        "321--331",
  month =        jun,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-018-0420-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Thu May 23 17:57:24 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-018-0420-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Hiemenz:2019:DSS,
  author =       "Benedikt Hiemenz and Michel Kr{\"a}mer",
  title =        "Dynamic searchable symmetric encryption for storing
                 geospatial data in the cloud",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "3",
  pages =        "333--354",
  month =        jun,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-018-0414-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Thu May 23 17:57:24 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-018-0414-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Gao:2019:LBD,
  author =       "Wen Gao and Liqun Chen and Yupu Hu and Christopher J.
                 P. Newton and Baocang Wang and Jiangshan Chen",
  title =        "Lattice-based deniable ring signatures",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "3",
  pages =        "355--370",
  month =        jun,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-018-0417-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Thu May 23 17:57:24 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-018-0417-1;
                 http://link.springer.com/content/pdf/10.1007/s10207-018-0417-1.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Samadani:2019:SPM,
  author =       "Mohammad Hasan Samadani and Mehdi Berenjkoob and
                 Marina Blanton",
  title =        "Secure pattern matching based on bit parallelism",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "3",
  pages =        "371--391",
  month =        jun,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-018-0410-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Thu May 23 17:57:24 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib;
                 https://www.math.utah.edu/pub/tex/bib/string-matching.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-018-0410-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kulah:2019:SAD,
  author =       "Yusuf Kulah and Berkay Dincer and Cemal Yilmaz and
                 Erkay Savas",
  title =        "{SpyDetector}: an approach for detecting side-channel
                 attacks at runtime",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "4",
  pages =        "393--422",
  month =        aug,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-018-0411-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Jul 13 14:23:17 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-018-0411-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Faghani:2019:MBM,
  author =       "Mohammad R. Faghani and Uyen T. Nguyen",
  title =        "Mobile botnets meet social networks: design and
                 analysis of a new type of botnet",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "4",
  pages =        "423--449",
  month =        aug,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-018-0412-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Jul 13 14:23:17 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-018-0412-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Perez-Sola:2019:DSP,
  author =       "Cristina P{\'e}rez-Sol{\`a} and Sergi Delgado-Segura
                 and Guillermo Navarro-Arribas and Jordi
                 Herrera-Joancomart{\'\i}",
  title =        "Double-spending prevention for {Bitcoin}
                 zero-confirmation transactions",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "4",
  pages =        "451--463",
  month =        aug,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-018-0422-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Jul 13 14:23:17 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-018-0422-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Rezvani:2019:AXP,
  author =       "Mohsen Rezvani and David Rajaratnam and Aleksandar
                 Ignjatovic and Maurice Pagnucco and Sanjay Jha",
  title =        "Analyzing {XACML} policies using answer set
                 programming",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "4",
  pages =        "465--479",
  month =        aug,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-018-0421-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Jul 13 14:23:17 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-018-0421-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Saini:2019:YCS,
  author =       "Anil Saini and Manoj Singh Gaur and Vijay Laxmi and
                 Mauro Conti",
  title =        "You click, {I} steal: analyzing and detecting click
                 hijacking attacks in web pages",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "4",
  pages =        "481--504",
  month =        aug,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-018-0423-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Jul 13 14:23:17 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-018-0423-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Resende:2019:BMI,
  author =       "Jo{\~a}o S. Resende and Patr{\'\i}cia R. Sousa and
                 Rolando Martins and Lu{\'\i}s Antunes",
  title =        "Breaking {MPC} implementations through compression",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "4",
  pages =        "505--518",
  month =        aug,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-018-0424-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Jul 13 14:23:17 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/datacompression.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-018-0424-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
  keywords =     "multiparty computation (MPC) [a sub-field of
                 cryptography with the goal of creating methods for
                 parties to jointly compute a function over their inputs
                 while keeping those inputs private]",
}

@Article{Marco-Gisbert:2019:SES,
  author =       "H{\'e}ctor Marco-Gisbert and Ismael Ripoll-Ripoll",
  title =        "{SSPFA}: effective stack smashing protection for
                 {Android OS}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "4",
  pages =        "519--532",
  month =        aug,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-018-00425-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Jul 13 14:23:17 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-018-00425-8;
                 http://link.springer.com/content/pdf/10.1007/s10207-018-00425-8.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Farras:2019:PSP,
  author =       "Oriol Farr{\`a}s and Jordi Ribes-Gonz{\'a}lez",
  title =        "Provably secure public-key encryption with conjunctive
                 and subset keyword search",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "5",
  pages =        "533--548",
  month =        oct,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-018-00426-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Sep 11 11:59:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-018-00426-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Dyer:2019:PHE,
  author =       "James Dyer and Martin Dyer and Jie Xu",
  title =        "Practical homomorphic encryption over the integers for
                 secure computation in the cloud",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "5",
  pages =        "549--579",
  month =        oct,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00427-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Sep 11 11:59:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00427-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Takahashi:2019:SSF,
  author =       "Kenta Takahashi and Takahiro Matsuda and Takao
                 Murakami and Goichiro Hanaoka and Masakatsu Nishigaki",
  title =        "Signature schemes with a fuzzy private key",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "5",
  pages =        "581--617",
  month =        oct,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00428-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Sep 11 11:59:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00428-z;
                 http://link.springer.com/content/pdf/10.1007/s10207-019-00428-z.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Rastegari:2019:CDV,
  author =       "Parvin Rastegari and Willy Susilo and Mohammad
                 Dakhilalian",
  title =        "Certificateless designated verifier signature
                 revisited: achieving a concrete scheme in the standard
                 model",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "5",
  pages =        "619--635",
  month =        oct,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00430-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Sep 11 11:59:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00430-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Garra:2019:RAB,
  author =       "Ricard Garra and Dominik Leibenger and Josep M. Miret
                 and Francesc Seb{\'e}",
  title =        "Repairing an aggregation-based smart metering system",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "5",
  pages =        "637--646",
  month =        oct,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00435-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Sep 11 11:59:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00435-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Yu:2019:UUP,
  author =       "Xiaoying Yu and Qi Liao",
  title =        "Understanding user passwords through password prefix
                 and postfix ({P3}) graph analysis and visualization",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "5",
  pages =        "647--663",
  month =        oct,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00432-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Sep 11 11:59:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00432-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Makhlouf:2019:SAS,
  author =       "Amel Meddeb Makhlouf and Mohsen Guizani",
  title =        "{SE-AOMDV}: secure and efficient {AOMDV} routing
                 protocol for vehicular communications",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "5",
  pages =        "665--676",
  month =        oct,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00436-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Sep 11 11:59:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00436-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Cai:2019:STP,
  author =       "Yixian Cai and George Karakostas and Alan Wassyng",
  title =        "Secure and trusted partial grey-box verification",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "6",
  pages =        "677--700",
  month =        dec,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00431-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Mon Sep 23 07:53:38 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00431-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Zhang:2019:FGA,
  author =       "Tao Zhang and Wang Hao Lee and Mingyuan Gao and
                 Jianying Zhou",
  title =        "{File Guard}: automatic format-based media file
                 sanitization",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "6",
  pages =        "701--713",
  month =        dec,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00440-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Mon Sep 23 07:53:38 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00440-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Riesco:2019:LCT,
  author =       "R. Riesco and V. A. Villagr{\'a}",
  title =        "Leveraging cyber threat intelligence for a dynamic
                 risk framework",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "6",
  pages =        "715--739",
  month =        dec,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00433-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Mon Sep 23 07:53:38 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00433-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Yildirim:2019:EUI,
  author =       "M. Yildirim and I. Mackie",
  title =        "Encouraging users to improve password security and
                 memorability",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "6",
  pages =        "741--759",
  month =        dec,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00429-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Mon Sep 23 07:53:38 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00429-y;
                 http://link.springer.com/content/pdf/10.1007/s10207-019-00429-y.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Aamir:2019:DAD,
  author =       "Muhammad Aamir and Syed Mustafa Ali Zaidi",
  title =        "{DDoS} attack detection with feature engineering and
                 machine learning: the framework and performance
                 evaluation",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "6",
  pages =        "761--785",
  month =        dec,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00434-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Mon Sep 23 07:53:38 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00434-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Patsakis:2019:HID,
  author =       "Constantinos Patsakis and Fran Casino",
  title =        "{Hydras} and {IPFS}: a decentralised playground for
                 malware",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "6",
  pages =        "787--799",
  month =        dec,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00443-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Mon Sep 23 07:53:38 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00443-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Toreini:2019:DEW,
  author =       "Ehsan Toreini and Siamak F. Shahandashti and Maryam
                 Mehrnezhad and Feng Hao",
  title =        "{DOMtegrity}: ensuring web page integrity against
                 malicious browser extensions",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "6",
  pages =        "801--814",
  month =        dec,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00442-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Mon Sep 23 07:53:38 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00442-1;
                 http://link.springer.com/content/pdf/10.1007/s10207-019-00442-1.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Takahashi:2020:MGE,
  author =       "Takeshi Takahashi and Rodrigo Roman Castro and
                 Bilhanan Silverajan and Ryan K. L. Ko and Said Tabet",
  title =        "Message from the guest editors",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "1",
  pages =        "1--2",
  month =        feb,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00472-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Feb 1 14:23:11 MST 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00472-9;
                 http://link.springer.com/content/pdf/10.1007/s10207-019-00472-9.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Aufner:2020:ISG,
  author =       "Peter Aufner",
  title =        "The {IoT} security gap: a look down into the valley
                 between threat models and their implementation",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "1",
  pages =        "3--14",
  month =        feb,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00445-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Feb 1 14:23:11 MST 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00445-y;
                 http://link.springer.com/content/pdf/10.1007/s10207-019-00445-y.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Anada:2020:KUP,
  author =       "Hiroaki Anada and Akira Kanaoka and Natsume Matsuzaki
                 and Yohei Watanabe",
  title =        "Key-updatable public-key encryption with keyword
                 search (Or: How to realize {PEKS} with efficient key
                 updates for {IoT} environments)",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "1",
  pages =        "15--38",
  month =        feb,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00441-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Feb 1 14:23:11 MST 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00441-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Yehuda:2020:PAR,
  author =       "Raz {Ben Yehuda} and Nezer Jacob Zaidenberg",
  title =        "Protection against reverse engineering in {ARM}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "1",
  pages =        "39--51",
  month =        feb,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00450-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Feb 1 14:23:11 MST 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00450-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Ko:2020:FDD,
  author =       "Ili Ko and Desmond Chambers and Enda Barrett",
  title =        "Feature dynamic deep learning approach for {DDoS}
                 mitigation within the {ISP} domain",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "1",
  pages =        "53--70",
  month =        feb,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00453-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Feb 1 14:23:11 MST 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00453-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Takase:2020:PIE,
  author =       "Hayate Takase and Ryotaro Kobayashi and Masahiko Kato
                 and Ren Ohmura",
  title =        "A prototype implementation and evaluation of the
                 malware detection mechanism for {IoT} devices using the
                 processor information",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "1",
  pages =        "71--81",
  month =        feb,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00437-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Feb 1 14:23:11 MST 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00437-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Ozawa:2020:SIM,
  author =       "Seiichi Ozawa and Tao Ban and Naoki Hashimoto and
                 Junji Nakazato and Jumpei Shimamura",
  title =        "A study of {IoT} malware activities using association
                 rule learning for darknet sensor data",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "1",
  pages =        "83--92",
  month =        feb,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00439-w",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Feb 1 14:23:11 MST 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00439-w",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Shayesteh:2020:TMS,
  author =       "Behshid Shayesteh and Vesal Hakami and Ahmad Akbari",
  title =        "A trust management scheme for {IoT-enabled}
                 environmental health\slash accessibility monitoring
                 services",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "1",
  pages =        "93--110",
  month =        feb,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00446-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Feb 1 14:23:11 MST 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00446-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Ferraris:2020:TTR,
  author =       "Davide Ferraris and Carmen Fernandez-Gago",
  title =        "{TrUStAPIS}: a trust requirements elicitation method
                 for {IoT}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "1",
  pages =        "111--127",
  month =        feb,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00438-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Feb 1 14:23:11 MST 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00438-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Sowjanya:2020:ECC,
  author =       "K. Sowjanya and Mou Dasgupta and Sangram Ray",
  title =        "An elliptic curve cryptography based enhanced
                 anonymous authentication protocol for wearable health
                 monitoring systems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "1",
  pages =        "129--146",
  month =        feb,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00464-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Feb 1 14:23:11 MST 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00464-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Patil:2020:DVA,
  author =       "Rajendra Patil and Harsha Dudeja and Chirag Modi",
  title =        "Designing in-{VM}-assisted lightweight agent-based
                 malware detection framework for securing virtual
                 machines in cloud computing",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "2",
  pages =        "147--162",
  month =        apr,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00447-w",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 18 12:04:16 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00447-w",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{BenAttia:2020:UHT,
  author =       "Hasiba {Ben Attia} and Laid Kahloul Saber Benharzallah
                 and Samir Bourekkache",
  title =        "Using Hierarchical Timed Coloured {Petri} Nets in the
                 formal study of {TRBAC} security policies",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "2",
  pages =        "163--187",
  month =        apr,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00448-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 18 12:04:16 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  note =         "See author name correction \cite{BenAttia:2020:CUH}.",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00448-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Adepu:2020:ASG,
  author =       "Sridhar Adepu and Nandha Kumar Kandasamy and Jianying
                 Zhou and Aditya Mathur",
  title =        "Attacks on smart grid: power supply interruption and
                 malicious power generation",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "2",
  pages =        "189--211",
  month =        apr,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00452-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 18 12:04:16 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00452-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Cheng:2020:SAA,
  author =       "Peng Cheng and Ibrahim Ethem Bagci and Utz Roedig and
                 Jeff Yan",
  title =        "{SonarSnoop}: active acoustic side-channel attacks",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "2",
  pages =        "213--228",
  month =        apr,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00449-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 18 12:04:16 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00449-8;
                 http://link.springer.com/content/pdf/10.1007/s10207-019-00449-8.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Nayak:2020:SSE,
  author =       "Sanjeet Kumar Nayak and Somanath Tripathy",
  title =        "{SEDS}: secure and efficient server-aided data
                 deduplication scheme for cloud storage",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "2",
  pages =        "229--240",
  month =        apr,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00455-w",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 18 12:04:16 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00455-w",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{BenAttia:2020:CUH,
  author =       "Hasiba {Ben Attia} and Laid Kahloul and Saber
                 Benharzallah and Samir Bourekkache",
  title =        "Correction to: {Using Hierarchical Timed Coloured
                 Petri Nets in the formal study of TRBAC security
                 policies}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "2",
  pages =        "241--241",
  month =        apr,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00454-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 18 12:04:16 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  note =         "See \cite{BenAttia:2020:UHT}.",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00454-x;
                 http://link.springer.com/content/pdf/10.1007/s10207-019-00454-x.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
  remark =       "In the original publication of this article, the third
                 author's name was incorrectly published. The correct
                 name of the third author should read as ``Saber
                 Benharzallah''.",
}

@Article{Yeh:2020:SIS,
  author =       "Kuo-Hui Yeh and Chunhua Su and Robert H. Deng and Moti
                 Yung and Miroslaw Kutylowski",
  title =        "Special issue on security and privacy of blockchain
                 technologies",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "3",
  pages =        "243--244",
  month =        jun,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00496-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue May 19 08:49:45 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00496-6;
                 http://link.springer.com/content/pdf/10.1007/s10207-020-00496-6.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Fan:2020:SHB,
  author =       "Chun-I Fan and Yi-Fan Tseng and Hui-Po Su and Ruei-Hau
                 Hsu and Hiroaki Kikuchi",
  title =        "Secure hierarchical {Bitcoin} wallet scheme against
                 privilege escalation attacks",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "3",
  pages =        "245--255",
  month =        jun,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00476-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue May 19 08:49:45 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00476-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Yohan:2020:FSB,
  author =       "Alexander Yohan and Nai-Wei Lo",
  title =        "{FOTB}: a secure blockchain-based firmware update
                 framework for {IoT} environment",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "3",
  pages =        "257--278",
  month =        jun,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00467-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue May 19 08:49:45 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00467-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Meng:2020:ECB,
  author =       "Weizhi Meng and Wenjuan Li and Laurence T. Yang and
                 Peng Li",
  title =        "Enhancing challenge-based collaborative intrusion
                 detection networks against insider attacks using
                 blockchain",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "3",
  pages =        "279--290",
  month =        jun,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00462-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue May 19 08:49:45 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00462-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Sattath:2020:IQB,
  author =       "Or Sattath",
  title =        "On the insecurity of quantum {Bitcoin} mining",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "3",
  pages =        "291--302",
  month =        jun,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00493-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue May 19 08:49:45 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00493-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Zhou:2020:IFV,
  author =       "Yuanjian Zhou and Yining Liu and Chengshun Jiang and
                 Shulan Wang",
  title =        "An improved {FOO} voting scheme using blockchain",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "3",
  pages =        "303--310",
  month =        jun,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00457-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue May 19 08:49:45 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00457-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bao:2020:LSP,
  author =       "Zijian Bao and Wenbo Shi and Saru Kumari and Zhi-yin
                 Kong and Chien-Ming Chen",
  title =        "{Lockmix}: a secure and privacy-preserving mix service
                 for {Bitcoin} anonymity",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "3",
  pages =        "311--321",
  month =        jun,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00459-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue May 19 08:49:45 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00459-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Zhang:2020:CBE,
  author =       "Shufan Zhang and Lili Wang and Hu Xiong",
  title =        "{Chaintegrity}: blockchain-enabled large-scale
                 e-voting system with robustness and universal
                 verifiability",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "3",
  pages =        "323--341",
  month =        jun,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00465-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue May 19 08:49:45 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00465-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Tiloca:2020:GRB,
  author =       "Marco Tiloca and Gianluca Dini and Kiki Rizki and
                 Shahid Raza",
  title =        "Group rekeying based on member join history",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "4",
  pages =        "343--381",
  month =        aug,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00451-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jul 21 07:55:30 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00451-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Seo:2020:ERL,
  author =       "Minhye Seo and Suhri Kim and Dong Hoon Lee and Jong
                 Hwan Park",
  title =        "{EMBLEM}: {(R)LWE}-based key encapsulation with a new
                 multi-bit encoding method",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "4",
  pages =        "383--399",
  month =        aug,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00456-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jul 21 07:55:30 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00456-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Holzl:2020:DDA,
  author =       "Michael H{\"o}lzl and Michael Roland and Omid Mir and
                 Ren{\'e} Mayrhofer",
  title =        "Disposable dynamic accumulators: toward practical
                 privacy-preserving mobile {eIDs} with scalable
                 revocation",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "4",
  pages =        "401--417",
  month =        aug,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00458-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jul 21 07:55:30 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00458-7;
                 http://link.springer.com/content/pdf/10.1007/s10207-019-00458-7.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Ogata:2020:SAS,
  author =       "Wakaha Ogata and Takaaki Otemori",
  title =        "Security analysis of secure {kNN} and ranked keyword
                 search over encrypted data",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "4",
  pages =        "419--425",
  month =        aug,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00461-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jul 21 07:55:30 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00461-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Pilz:2020:SAS,
  author =       "M. Pilz and F. Baghaei Naeini and K. Grammont and C.
                 Smagghe and M. Davis and J.-C. Nebel and L. Al-Fagih
                 and E. Pfluegel",
  title =        "Security attacks on smart grid scheduling and their
                 defences: a game-theoretic approach",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "4",
  pages =        "427--443",
  month =        aug,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00460-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jul 21 07:55:30 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00460-z;
                 http://link.springer.com/content/pdf/10.1007/s10207-019-00460-z.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Ueda:2020:SIR,
  author =       "Itaru Ueda and Daiki Miyahara and Akihiro Nishimura
                 and Yu-ichi Hayashi and Takaaki Mizuki and Hideaki
                 Sone",
  title =        "Secure implementations of a random bisection cut",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "4",
  pages =        "445--452",
  month =        aug,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00463-w",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jul 21 07:55:30 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00463-w",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Wu:2020:CIB,
  author =       "Chunhui Wu and Xiaofeng Chen and Willy Susilo",
  title =        "Concise {ID}-based mercurial functional commitments
                 and applications to zero-knowledge sets",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "4",
  pages =        "453--464",
  month =        aug,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00466-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jul 21 07:55:30 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00466-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Casas-Roma:2020:DGD,
  author =       "Jordi Casas-Roma",
  title =        "{DUEF-GA}: data utility and privacy evaluation
                 framework for graph anonymization",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "4",
  pages =        "465--478",
  month =        aug,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00469-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jul 21 07:55:30 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00469-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Mitropoulos:2020:PAC,
  author =       "Dimitris Mitropoulos and Thodoris Sotiropoulos and
                 Nikos Koutsovasilis and Diomidis Spinellis",
  title =        "{PDGuard}: an architecture for the control and secure
                 processing of personal data",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "4",
  pages =        "479--498",
  month =        aug,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00468-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jul 21 07:55:30 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00468-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Sheikhalishahi:2020:DWD,
  author =       "Mina Sheikhalishahi and Andrea Saracino and Fabio
                 Martinelli and Antonio {La Marra} and Mohammed Mejri
                 and Nadia Tawbi",
  title =        "Digital Waste Disposal: an automated framework for
                 analysis of spam emails",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "5",
  pages =        "499--522",
  month =        oct,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00470-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Aug 15 07:08:49 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00470-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Alzaidi:2020:DHP,
  author =       "Areej Alzaidi and Suhair Alshehri and Seyed M.
                 Buhari",
  title =        "{DroidRista}: a highly precise static data flow
                 analysis framework for {Android} applications",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "5",
  pages =        "523--536",
  month =        oct,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00471-w",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Aug 15 07:08:49 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00471-w",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Torra:2020:RDP,
  author =       "Vicen{\c{c}} Torra",
  title =        "Random dictatorship for privacy-preserving social
                 choice",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "5",
  pages =        "537--545",
  month =        oct,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00474-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Aug 15 07:08:49 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00474-7;
                 http://link.springer.com/content/pdf/10.1007/s10207-019-00474-7.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bernardini:2020:ASS,
  author =       "Riccardo Bernardini and Roberto Rinaldo",
  title =        "Analysis of some simple stabilizers for physically
                 obfuscated keys",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "5",
  pages =        "547--565",
  month =        oct,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00473-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Aug 15 07:08:49 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00473-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Nguyen:2020:NGB,
  author =       "Huy-Trung Nguyen and Quoc-Dung Ngo and Van-Hoang Le",
  title =        "A novel graph-based approach for {IoT} botnet
                 detection",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "5",
  pages =        "567--577",
  month =        oct,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00475-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Aug 15 07:08:49 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00475-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Manasrah:2020:KPD,
  author =       "Ahmed M. Manasrah and Areej R. AL-Rabadi and Najib A.
                 Kofahi",
  title =        "Key pre-distribution approach using block {$ L U $}
                 decomposition in wireless sensor network",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "5",
  pages =        "579--596",
  month =        oct,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00477-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Aug 15 07:08:49 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00477-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Taheri:2020:CTU,
  author =       "Sona Taheri and Adil M. Bagirov and Iqbal Gondal and
                 Simon Brown",
  title =        "Cyberattack triage using incremental clustering for
                 intrusion detection systems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "5",
  pages =        "597--607",
  month =        oct,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00478-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Aug 15 07:08:49 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00478-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Hale:2020:UMA,
  author =       "Britta Hale",
  title =        "User-mediated authentication protocols and
                 unforgeability in key collision",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "6",
  pages =        "609--621",
  month =        dec,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00479-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 19 07:03:34 MST 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00479-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Picazo-Sanchez:2020:AYP,
  author =       "Pablo Picazo-Sanchez and Juan Tapiador and Gerardo
                 Schneider",
  title =        "After you, please: browser extensions order attacks
                 and countermeasures",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "6",
  pages =        "623--638",
  month =        dec,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00481-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 19 07:03:34 MST 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00481-8;
                 http://link.springer.com/content/pdf/10.1007/s10207-019-00481-8.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Zhang:2020:FAB,
  author =       "Yanting Zhang and Jianwei Liu and Zongyang Zhang and
                 Weiran Liu",
  title =        "{FDCO}: attribute-based fast data cloud-outsourcing
                 scheme for mobile devices",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "6",
  pages =        "639--656",
  month =        dec,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00480-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 19 07:03:34 MST 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00480-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Sethi:2020:CAR,
  author =       "Kamalakanta Sethi and E. Sai Rupesh and Rahul Kumar
                 and Padmalochan Bera and Y. Venu Madhav",
  title =        "A context-aware robust intrusion detection system: a
                 reinforcement learning-based approach",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "6",
  pages =        "657--678",
  month =        dec,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00482-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 19 07:03:34 MST 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00482-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Melki:2020:LMF,
  author =       "Reem Melki and Hassan N. Noura and Ali Chehab",
  title =        "Lightweight multi-factor mutual authentication
                 protocol for {IoT} devices",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "6",
  pages =        "679--694",
  month =        dec,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00484-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 19 07:03:34 MST 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00484-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Tavizi:2020:LPS,
  author =       "Tina Tavizi and Mehdi Shajari",
  title =        "A language and a pattern system for temporal property
                 specification: advanced metering infrastructure case
                 study",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "6",
  pages =        "695--710",
  month =        dec,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00483-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 19 07:03:34 MST 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00483-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Sun:2020:PDI,
  author =       "Lixue Sun and Chunxiang Xu and Yuan Zhang and Kefei
                 Chen",
  title =        "Public data integrity auditing without homomorphic
                 authenticators from indistinguishability obfuscation",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "6",
  pages =        "711--720",
  month =        dec,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00486-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 19 07:03:34 MST 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00486-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Leontiadis:2021:SCR,
  author =       "Iraklis Leontiadis and Ming Li",
  title =        "Secure and collusion-resistant data aggregation from
                 convertible tags",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "1",
  pages =        "1--20",
  month =        feb,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00485-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 19 07:03:35 MST 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00485-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Schlette:2021:MVC,
  author =       "Daniel Schlette and Fabian B{\"o}hm and Marco Caselli
                 and G{\"u}nther Pernul",
  title =        "Measuring and visualizing cyber threat intelligence
                 quality",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "1",
  pages =        "21--38",
  month =        feb,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00490-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 19 07:03:35 MST 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00490-y;
                 http://link.springer.com/content/pdf/10.1007/s10207-020-00490-y.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{El-Zawawy:2021:DLN,
  author =       "Mohamed A. El-Zawawy and Eleonora Losiouk and Mauro
                 Conti",
  title =        "Do not let {Next-Intent Vulnerability} be your next
                 nightmare: type system-based approach to detect it in
                 {Android} apps",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "1",
  pages =        "39--58",
  month =        feb,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00491-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 19 07:03:35 MST 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00491-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Liu:2021:NEM,
  author =       "Pengfei Liu and Weiping Wang and Xi Luo and Haodong
                 Wang and Chushu Liu",
  title =        "{NSDroid}: efficient multi-classification of {Android}
                 malware using neighborhood signature in local function
                 call graphs",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "1",
  pages =        "59--71",
  month =        feb,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00489-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 19 07:03:35 MST 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00489-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{VandenBroeck:2021:OIS,
  author =       "Jens {Van den Broeck} and Bart Coppens and Bjorn {De
                 Sutter}",
  title =        "Obfuscated integration of software protections",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "1",
  pages =        "73--101",
  month =        feb,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00494-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 19 07:03:35 MST 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00494-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Jia:2021:CNI,
  author =       "Huiwen Jia and Chunming Tang",
  title =        "Cryptanalysis of a non-interactive deniable ring
                 signature scheme",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "1",
  pages =        "103--112",
  month =        feb,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00497-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 19 07:03:35 MST 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00497-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Ibnugraha:2021:RMD,
  author =       "Prajna Deshanta Ibnugraha and Lukito Edi Nugroho and
                 Paulus Insap Santosa",
  title =        "Risk model development for information security in
                 organization environment based on business
                 perspectives",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "1",
  pages =        "113--126",
  month =        feb,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00495-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 19 07:03:35 MST 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00495-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Li:2021:TBB,
  author =       "Wenjuan Li and Yu Wang and Man Ho Au",
  title =        "Toward a blockchain-based framework for
                 challenge-based collaborative intrusion detection",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "2",
  pages =        "127--139",
  month =        apr,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00488-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Mar 23 08:25:39 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-020-00488-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
  online-date =  "Published: 11 February 2020 Pages: 127 - 139",
}

@Article{Xu:2021:SLR,
  author =       "Jia Xu and Jianying Zhou",
  title =        "Strong leakage-resilient encryption: enhancing data
                 confidentiality by hiding partial ciphertext",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "2",
  pages =        "141--159",
  month =        apr,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00487-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Mar 23 08:25:39 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-020-00487-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
  online-date =  "Published: 12 February 2020 Pages: 141 - 159",
}

@Article{Faisal:2021:SAT,
  author =       "Abu Faisal and Mohammad Zulkernine",
  title =        "A secure architecture for {TCP\slash UDP}-based cloud
                 communications",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "2",
  pages =        "161--179",
  month =        apr,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00511-w",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Mar 23 08:25:39 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-020-00511-w",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
  online-date =  "Published: 07 July 2020 Pages: 161 - 179",
}

@Article{Solano:2021:CBB,
  author =       "Jesus Solano and Luis Camacho and Mart{\'\i}n Ochoa",
  title =        "Combining behavioral biometrics and session context
                 analytics to enhance risk-based static authentication
                 in web applications",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "2",
  pages =        "181--197",
  month =        apr,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00510-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Mar 23 08:25:39 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-020-00510-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
  online-date =  "Published: 16 June 2020 Pages: 181 - 197",
}

@Article{Chatterjee:2021:SEW,
  author =       "Sanjit Chatterjee and Manish Kesarwani and Akash
                 Shah",
  title =        "Secure and efficient wildcard search over encrypted
                 data",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "2",
  pages =        "199--244",
  month =        apr,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00492-w",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Mar 23 08:25:39 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-020-00492-w",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
  online-date =  "Published: 30 March 2020 Pages: 199 - 244",
}

@Article{Medina-Lopez:2021:SAD,
  author =       "Crist{\'o}bal Medina-L{\'o}pez and L. G. Casado and
                 Yuansong Qiao",
  title =        "An {SDN} approach to detect targeted attacks in {P2P}
                 fully connected overlays",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "2",
  pages =        "245--255",
  month =        apr,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00499-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Mar 23 08:25:39 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-020-00499-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
  online-date =  "Published: 02 May 2020 Pages: 245 - 255",
}

@Article{Wang:2021:SLR,
  author =       "Yuntao Wang and Tsuyoshi Takagi",
  title =        "Studying lattice reduction algorithms improved by
                 quick reordering technique",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "2",
  pages =        "257--268",
  month =        apr,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00501-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Mar 23 08:25:39 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-020-00501-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
  online-date =  "Published: 13 May 2020 Pages: 257 - 268",
}

@Article{Benarfa:2021:CED,
  author =       "Abdelmadjid Benarfa and Muhammad Hassan and Eleonora
                 Losiouk and Alberto Compagno and Mohamed Bachir Yagoubi
                 and Mauro Conti",
  title =        "{ChoKIFA+}: an early detection and mitigation approach
                 against interest flooding attacks in {NDN}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "3",
  pages =        "269--285",
  month =        jun,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00500-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat May 29 07:09:27 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00500-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Manulis:2021:CSN,
  author =       "M. Manulis and C. P. Bridges and R. Harrison and V.
                 Sekar and A. Davis",
  title =        "Cyber security in New Space",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "3",
  pages =        "287--311",
  month =        jun,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00503-w",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat May 29 07:09:27 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00503-w;
                 http://link.springer.com/content/pdf/10.1007/s10207-020-00503-w.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Berger:2021:WTC,
  author =       "Harel Berger and Amit Z. Dvir and Moti Geva",
  title =        "A wrinkle in time: a case study in {DNS} poisoning",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "3",
  pages =        "313--329",
  month =        jun,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00502-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat May 29 07:09:27 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00502-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Ji:2021:EVA,
  author =       "Soo-Yeon Ji and Bong-Keun Jeong and Dong Hyun Jeong",
  title =        "Evaluating visualization approaches to detect abnormal
                 activities in network traffic data",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "3",
  pages =        "331--345",
  month =        jun,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00504-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat May 29 07:09:27 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00504-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Spathoulas:2021:UHE,
  author =       "Georgios Spathoulas and Georgios Theodoridis and
                 Georgios-Paraskevas Damiris",
  title =        "Using homomorphic encryption for privacy-preserving
                 clustering of intrusion detection alerts",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "3",
  pages =        "347--370",
  month =        jun,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00506-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat May 29 07:09:27 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00506-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Pitolli:2021:MAF,
  author =       "Gregorio Pitolli and Giuseppe Laurenza and Leonardo
                 Aniello and Leonardo Querzoni and Roberto Baldoni",
  title =        "{MalFamAware}: automatic family identification and
                 malware classification through online clustering",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "3",
  pages =        "371--386",
  month =        jun,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00509-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat May 29 07:09:27 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00509-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Mighan:2021:NSI,
  author =       "Soosan Naderi Mighan and Mohsen Kahani",
  title =        "A novel scalable intrusion detection system based on
                 deep learning",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "3",
  pages =        "387--403",
  month =        jun,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00508-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat May 29 07:09:27 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00508-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Mandal:2021:ATC,
  author =       "Mriganka Mandal",
  title =        "Anonymity in traceable cloud data broadcast system
                 with simultaneous individual messaging",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "3",
  pages =        "405--430",
  month =        jun,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00512-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat May 29 07:09:27 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00512-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Khan:2021:EAB,
  author =       "Fawad Khan and Hui Li and Yinghui Zhang and Haider
                 Abbas and Tahreem Yaqoob",
  title =        "Efficient attribute-based encryption with repeated
                 attributes optimization",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "3",
  pages =        "431--444",
  month =        jun,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00505-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat May 29 07:09:27 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00505-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Aniello:2021:ABT,
  author =       "Leonardo Aniello and Basel Halak and Peter Chai and
                 Riddhi Dhall and Mircea Mihalea and Adrian Wilczynski",
  title =        "{Anti-BlUFf}: towards counterfeit mitigation in {IC}
                 supply chains using blockchain and {PUF}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "3",
  pages =        "445--460",
  month =        jun,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00513-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat May 29 07:09:27 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00513-8;
                 http://link.springer.com/content/pdf/10.1007/s10207-020-00513-8.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Yamauchi:2021:AKO,
  author =       "Toshihiro Yamauchi and Yohei Akao and Ryota Yoshitani
                 and Yuichi Nakamura and Masaki Hashimoto",
  title =        "Additional kernel observer: privilege escalation
                 attack prevention mechanism focusing on system call
                 privilege changes",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "4",
  pages =        "461--473",
  month =        aug,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00514-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Jul 28 09:12:45 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00514-7;
                 http://link.springer.com/content/pdf/10.1007/s10207-020-00514-7.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kim:2021:ISD,
  author =       "Hyoseung Kim and Kwangsu Lee and Jong Hwan Park and
                 Dong Hoon Lee",
  title =        "Improving the security of direct anonymous attestation
                 under host corruptions",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "4",
  pages =        "475--492",
  month =        aug,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00507-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Jul 28 09:12:45 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00507-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Jouini:2021:QAS,
  author =       "Mouna Jouini and Latifa {Ben Arfa Rabai} and Ridha
                 Khedri",
  title =        "A quantitative assessment of security risks based on a
                 multifaceted classification approach",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "4",
  pages =        "493--510",
  month =        aug,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00515-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Jul 28 09:12:45 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00515-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Deldar:2021:EST,
  author =       "Fatemeh Deldar and Mahdi Abadi",
  title =        "Enhancing spatial and temporal utilities in
                 differentially private moving objects database
                 release",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "4",
  pages =        "511--533",
  month =        aug,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00516-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Jul 28 09:12:45 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00516-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bi:2021:MPA,
  author =       "Kun Bi and Dezhi Han and Guichen Zhang and Kuan-Ching
                 Li and Aniello Castiglione",
  title =        "{$K$} maximum probability attack paths generation
                 algorithm for target nodes in networked systems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "4",
  pages =        "535--551",
  month =        aug,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00517-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Jul 28 09:12:45 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00517-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Sermpinis:2021:DDT,
  author =       "Thomas Sermpinis and George Vlahavas and Konstantinos
                 Karasavvas and Athena Vakali",
  title =        "{DeTRACT}: a decentralized, transparent, immutable and
                 open {PKI} certificate framework",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "4",
  pages =        "553--570",
  month =        aug,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00518-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Jul 28 09:12:45 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00518-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Ferraris:2021:TMP,
  author =       "Davide Ferraris and Daniel Bastos and Carmen
                 Fernandez-Gago and Fadi El-Moussa",
  title =        "A trust model for popular smart home devices",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "4",
  pages =        "571--587",
  month =        aug,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00519-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Jul 28 09:12:45 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00519-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Lee:2021:BBM,
  author =       "Tian-Fu Lee and Hong-Ze Li and Yi-Pei Hsieh",
  title =        "A blockchain-based medical data preservation scheme
                 for telecare medical information systems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "4",
  pages =        "589--601",
  month =        aug,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00521-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Jul 28 09:12:45 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00521-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Parida:2021:PMC,
  author =       "Trushna Parida and Suvrojit Das",
  title =        "{PageDumper}: a mechanism to collect page table
                 manipulation information at run-time",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "4",
  pages =        "603--619",
  month =        aug,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00520-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Jul 28 09:12:45 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00520-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Ngamboe:2021:RAC,
  author =       "Mika{\"e}la Ngambo{\'e} and Paul Berthier and Nader
                 Ammari and Katia Dyrda and Jos{\'e} M. Fernandez",
  title =        "Risk assessment of cyber-attacks on telemetry-enabled
                 cardiac implantable electronic devices ({CIED})",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "4",
  pages =        "621--645",
  month =        aug,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00522-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Jul 28 09:12:45 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00522-7;
                 http://link.springer.com/content/pdf/10.1007/s10207-020-00522-7.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Gomez:2021:CCM,
  author =       "Juan Manuel Castelo G{\'o}mez and Javier Carrillo
                 Mond{\'e}jar and Jos{\'e} Rold{\'a}n G{\'o}mez and
                 Jos{\'e} Luis Mart{\'\i}nez Mart{\'\i}nez",
  title =        "A context-centered methodology for {IoT} forensic
                 investigations",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "5",
  pages =        "647--673",
  month =        oct,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00523-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Aug 14 05:33:52 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00523-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Chen:2021:PAS,
  author =       "Liqun Chen and Kaibin Huang and Mark Manulis and
                 Venkkatesh Sekar",
  title =        "Password-authenticated searchable encryption",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "5",
  pages =        "675--693",
  month =        oct,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00524-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Aug 14 05:33:52 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00524-5;
                 http://link.springer.com/content/pdf/10.1007/s10207-020-00524-5.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Sicari:2021:ABE,
  author =       "Sabrina Sicari and Alessandra Rizzardi and Gianluca
                 Dini and Pericle Perazzo and Michele {La Manna} and
                 Alberto Coen-Porisini",
  title =        "Attribute-based encryption and sticky policies for
                 data access control in a smart home scenario: a
                 comparison on networked smart object middleware",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "5",
  pages =        "695--713",
  month =        oct,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00526-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Aug 14 05:33:52 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00526-3;
                 http://link.springer.com/content/pdf/10.1007/s10207-020-00526-3.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Borges:2021:EPP,
  author =       "Ricard Borges and Francesc Seb{\'e}",
  title =        "An efficient privacy-preserving pay-by-phone system
                 for regulated parking areas",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "5",
  pages =        "715--727",
  month =        oct,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00527-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Aug 14 05:33:52 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00527-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Miyahara:2021:ECB,
  author =       "Daiki Miyahara and Itaru Ueda and Yu-ichi Hayashi and
                 Takaaki Mizuki and Hideaki Sone",
  title =        "Evaluating card-based protocols in terms of execution
                 time",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "5",
  pages =        "729--740",
  month =        oct,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00525-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Aug 14 05:33:52 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00525-4;
                 http://link.springer.com/content/pdf/10.1007/s10207-020-00525-4.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Menges:2021:DDI,
  author =       "Florian Menges and Benedikt Putz and G{\"u}nther
                 Pernul",
  title =        "{DEALER}: decentralized incentives for threat
                 intelligence reporting and exchange",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "5",
  pages =        "741--761",
  month =        oct,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00528-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Aug 14 05:33:52 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00528-1;
                 http://link.springer.com/content/pdf/10.1007/s10207-020-00528-1.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Granese:2021:EMP,
  author =       "Federica Granese and Daniele Gorla and Catuscia
                 Palamidessi",
  title =        "Enhanced models for privacy and utility in
                 continuous-time diffusion networks",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "5",
  pages =        "763--782",
  month =        oct,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00530-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Aug 14 05:33:52 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00530-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Josephlal:2021:EIR,
  author =       "Edwin Franco Myloth Josephlal and Sridhar Adepu and
                 Zheng Yang and Jianying Zhou",
  title =        "Enabling isolation and recovery in {PLC} redundancy
                 framework of metro train systems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "6",
  pages =        "783--795",
  month =        dec,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00529-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Oct 19 09:44:52 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00529-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Alecakir:2021:ATI,
  author =       "Huseyin Alecakir and Burcu Can and Sevil Sen",
  title =        "Attention: there is an inconsistency between {Android}
                 permissions and application metadata!",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "6",
  pages =        "797--815",
  month =        dec,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00536-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Oct 19 09:44:52 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00536-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Murvay:2021:SCA,
  author =       "Pal-Stefan Murvay and Lucian Popa and Bogdan Groza",
  title =        "Securing the controller area network with covert
                 voltage channels",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "6",
  pages =        "817--831",
  month =        dec,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00532-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Oct 19 09:44:52 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00532-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Imamura:2021:WAM,
  author =       "Yuta Imamura and Rintaro Orito and Hiroyuki Uekawa and
                 Kritsana Chaikaew and Pattara Leelaprute and Masaya
                 Sato and Toshihiro Yamauchi",
  title =        "{Web} access monitoring mechanism via {Android
                 WebView} for threat analysis",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "6",
  pages =        "833--847",
  month =        dec,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00534-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Oct 19 09:44:52 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00534-3;
                 http://link.springer.com/content/pdf/10.1007/s10207-020-00534-3.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Yankson:2021:CIP,
  author =       "Benjamin Yankson",
  title =        "Continuous improvement process ({CIP})-based
                 privacy-preserving framework for smart connected toys",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "6",
  pages =        "849--869",
  month =        dec,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00535-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Oct 19 09:44:52 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00535-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Cianciullo:2021:OCD,
  author =       "Louis Cianciullo and Hossein Ghodosi",
  title =        "Outsourced cheating detection for secret sharing",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "6",
  pages =        "871--878",
  month =        dec,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-021-00538-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Oct 19 09:44:52 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-021-00538-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bonte:2021:THM,
  author =       "Charlotte Bonte and Nigel P. Smart and Titouan
                 Tanguy",
  title =        "Thresholdizing {HashEdDSA}: {MPC} to the Rescue",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "6",
  pages =        "879--894",
  month =        dec,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-021-00539-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Oct 19 09:44:52 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-021-00539-6",
  abstract =     "Following recent comments in a NIST document related
                 to threshold cryptographic standards, we examine the
                 case of thresholdizing the HashEdDSA signature scheme.
                 This is a deterministic signature scheme based on
                 Edwards elliptic curves. Unlike DSA, it has a
                 Schnorr-like signature equation, which is an advantage
                 for threshold implementations, but it has the
                 disadvantage of having the ephemeral secret obtained by
                 hashing the secret key and the message. We show that
                 one can obtain relatively efficient implementations of
                 threshold HashEdDSA with no modifications to the
                 behaviour of the signing algorithm; we achieve this
                 using a doubly authenticated bit (daBit) generation
                 protocol tailored for $ Q_2 $ access structures that is
                 more efficient than prior work. However, if one was to
                 modify the standard algorithm to use an MPC-friendly
                 hash function, such as Rescue, the performance becomes
                 very fast indeed.",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kim:2022:DAD,
  author =       "Hee Yeon Kim and Ji Hoon Kim and Kyounggon Kim",
  title =        "{DAPP}: automatic detection and analysis of prototype
                 pollution vulnerability in \pkg{Node.js} modules",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "1",
  pages =        "1--23",
  month =        feb,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00537-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Mon Feb 14 11:57:44 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-020-00537-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Shin:2022:NSS,
  author =       "Hansub Shin and Sungyong Sim and Younho Lee",
  title =        "A new smart smudge attack using {CNN}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "1",
  pages =        "25--36",
  month =        feb,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-021-00540-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Mon Feb 14 11:57:44 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-021-00540-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Stergiopoulos:2022:AAA,
  author =       "George Stergiopoulos and Panagiotis Dedousis and
                 Dimitris Gritzalis",
  title =        "Automatic analysis of attack graphs for risk
                 mitigation and prioritization on large-scale and
                 complex networks in {Industry 4.0}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "1",
  pages =        "37--59",
  month =        feb,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00533-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Mon Feb 14 11:57:44 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-020-00533-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Lyvas:2022:MME,
  author =       "Christos Lyvas and Christoforos Ntantogian and
                 Christos Xenakis",
  title =        "\pkg{[m]allotROPism}: a metamorphic engine for
                 malicious software variation development",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "1",
  pages =        "61--78",
  month =        feb,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-021-00541-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Mon Feb 14 11:57:44 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-021-00541-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Sheikhalishahi:2022:PPD,
  author =       "Mina Sheikhalishahi and Andrea Saracino and Antonio
                 {La Marra}",
  title =        "Privacy preserving data sharing and analysis for
                 edge-based architectures",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "1",
  pages =        "79--101",
  month =        feb,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-021-00542-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Mon Feb 14 11:57:44 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-021-00542-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Braeken:2022:PKV,
  author =       "An Braeken",
  title =        "Public key versus symmetric key cryptography in
                 client--server authentication protocols",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "1",
  pages =        "103--114",
  month =        feb,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-021-00543-w",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Mon Feb 14 11:57:44 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-021-00543-w",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Yaacoub:2022:RCS,
  author =       "Jean-Paul A. Yaacoub and Hassan N. Noura and Ali
                 Chehab",
  title =        "Robotics cyber security: vulnerabilities, attacks,
                 countermeasures, and recommendations",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "1",
  pages =        "115--158",
  month =        feb,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-021-00545-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Mon Feb 14 11:57:44 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-021-00545-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Anonymous:2022:TS,
  author =       "Anonymous",
  title =        "Track for surveys",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "1",
  pages =        "159--159",
  month =        feb,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-021-00546-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Mon Feb 14 11:57:44 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-021-00546-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Yichiet:2022:SAL,
  author =       "Aun Yichiet and Yen-Min Jasmina Khaw and Vasaki
                 Ponnusamy",
  title =        "A semantic-aware log generation method for network
                 activities",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "2",
  pages =        "161--177",
  month =        apr,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-021-00547-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Thu Mar 24 07:43:45 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-021-00547-6",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Tommasi:2022:BMB,
  author =       "Franco Tommasi and Christian Catalano and Ivan
                 Taurino",
  title =        "{Browser-in-the-Middle (BitM)} attack",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "2",
  pages =        "179--189",
  month =        apr,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-021-00548-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Thu Mar 24 07:43:45 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-021-00548-5",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Melo:2022:IAI,
  author =       "Roberto Vasconcelos Melo and Douglas D. J. de Macedo
                 and Mauricio Martinuzzi Fiorenza",
  title =        "{ISM-AC}: an immune security model based on alert
                 correlation and software-defined networking",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "2",
  pages =        "191--205",
  month =        apr,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-021-00550-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Thu Mar 24 07:43:45 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-021-00550-x",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Hougaard:2022:ALO,
  author =       "Hector B. Hougaard and Atsuko Miyaji",
  title =        "Authenticated logarithmic-order supersingular isogeny
                 group key exchange",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "2",
  pages =        "207--221",
  month =        apr,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-021-00549-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Thu Mar 24 07:43:45 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-021-00549-4",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Munonye:2022:MLA,
  author =       "Kindson Munonye and Martinek P{\'e}ter",
  title =        "Machine learning approach to vulnerability detection
                 in {OAuth 2.0} authentication and authorization flow",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "2",
  pages =        "223--237",
  month =        apr,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-021-00551-w",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Thu Mar 24 07:43:45 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-021-00551-w",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Yildirim:2022:MIT,
  author =       "Metehan Yildirim and Emin Anarim",
  title =        "Mitigating insider threat by profiling users based on
                 mouse usage pattern: ensemble learning and frequency
                 domain analysis",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "2",
  pages =        "239--251",
  month =        apr,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-021-00544-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Thu Mar 24 07:43:45 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-021-00544-9",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bajic:2022:ABN,
  author =       "Alexander Bajic and Georg T. Becker",
  title =        "Automated benchmark network diversification for
                 realistic attack simulation with application to moving
                 target defense",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "2",
  pages =        "253--278",
  month =        apr,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-021-00552-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Thu Mar 24 07:43:45 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-021-00552-9",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Mimura:2022:ANT,
  author =       "Mamoru Mimura and Ryo Ito",
  title =        "Applying {NLP} techniques to malware detection in a
                 practical environment",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "2",
  pages =        "279--291",
  month =        apr,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-021-00553-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Thu Mar 24 07:43:45 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-021-00553-8",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Erdodi:2022:AWM,
  author =       "L{\'a}szl{\'o} Erd{\H{o}}di and Fabio Massimo
                 Zennaro",
  title =        "The {Agent Web Model}: modeling web hacking for
                 reinforcement learning",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "2",
  pages =        "293--309",
  month =        apr,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-021-00554-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Thu Mar 24 07:43:45 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-021-00554-7",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Lee:2022:SPM,
  author =       "Junwon Lee and Heejo Lee",
  title =        "An {SSH} predictive model using machine learning with
                 web proxy session logs",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "2",
  pages =        "311--322",
  month =        apr,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-021-00555-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Thu Mar 24 07:43:45 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-021-00555-6",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Hadjadj:2022:OPF,
  author =       "Taha Elamine Hadjadj and Adel Bouhoula and Riadh
                 Ksantini",
  title =        "Optimization of parallel firewalls filtering rules",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "2",
  pages =        "323--340",
  month =        apr,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-021-00557-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Thu Mar 24 07:43:45 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-021-00557-4",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Zhang:2022:THG,
  author =       "Zheng Zhang and Shaohao Xie and Fangguo Zhang",
  title =        "Topology-hiding garbled circuits without universal
                 circuits",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "2",
  pages =        "341--356",
  month =        apr,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-021-00556-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Thu Mar 24 07:43:45 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-021-00556-5",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kazoleas:2022:NMR,
  author =       "Ioannis Kazoleas and Panagiotis Karampelas",
  title =        "A novel malicious remote administration tool using
                 stealth and self-defense techniques",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "2",
  pages =        "357--378",
  month =        apr,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-021-00559-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Thu Mar 24 07:43:45 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-021-00559-2",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Ahmad:2022:EAC,
  author =       "Tahir Ahmad and Umberto Morelli and Nicola Zannone",
  title =        "Extending access control in {AWS} {IoT} through
                 event-driven functions: an experimental evaluation
                 using a smart lock system",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "2",
  pages =        "379--408",
  month =        apr,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-021-00558-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Thu Mar 24 07:43:45 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-021-00558-3",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Parish:2022:PGU,
  author =       "Zach Parish and Connor Cushing and Julie Thorpe",
  title =        "Password guessers under a microscope: an in-depth
                 analysis to inform deployments",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "2",
  pages =        "409--425",
  month =        apr,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-021-00560-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Thu Mar 24 07:43:45 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-021-00560-9",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bhattacharjya:2022:EVS,
  author =       "Sairath Bhattacharjya and Hossein Saiedian",
  title =        "Establishing and validating secured keys for {IoT}
                 devices: using {P3} connection model on a cloud-based
                 architecture",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "3",
  pages =        "427--436",
  month =        jun,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-021-00562-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat May 28 06:50:21 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-021-00562-7",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Spence:2022:SBC,
  author =       "Aaron Spence and Shaun Bangay",
  title =        "Security beyond cybersecurity: side-channel attacks
                 against non-cyber systems and their countermeasures",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "3",
  pages =        "437--453",
  month =        jun,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-021-00563-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat May 28 06:50:21 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-021-00563-6",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Park:2022:EDP,
  author =       "Cheolhee Park and Dowon Hong and Changho Seo",
  title =        "Evaluating differentially private decision tree model
                 over model inversion attack",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "3",
  pages =        "1--14",
  month =        jun,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-021-00564-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat May 28 06:50:21 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-021-00564-5",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Alghamdi:2022:NTA,
  author =       "Saleh A. Alghamdi",
  title =        "Novel trust-aware intrusion detection and prevention
                 system for {5G} {MANET-Cloud}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "3",
  pages =        "469--488",
  month =        jun,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00531-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat May 28 06:50:21 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-020-00531-6",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Ghorbel:2022:APP,
  author =       "Amal Ghorbel and Mahmoud Ghorbel and Mohamed Jmaiel",
  title =        "Accountable privacy preserving attribute-based access
                 control for cloud services enforced using blockchain",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "3",
  pages =        "489--508",
  month =        jun,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-021-00565-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat May 28 06:50:21 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-021-00565-4",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Zhang:2022:RLA,
  author =       "Lu Zhang and Arie Taal and Paola Grosso",
  title =        "A risk-level assessment system based on the
                 {STRIDE\slash DREAD} model for digital data
                 marketplaces",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "3",
  pages =        "509--525",
  month =        jun,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-021-00566-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat May 28 06:50:21 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-021-00566-3",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Singh:2022:IAM,
  author =       "Jaya Singh and Ayush Sinha and Om Prakash Vyas",
  title =        "Insider attack mitigation in a smart metering
                 infrastructure using reputation score and blockchain
                 technology",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "3",
  pages =        "527--546",
  month =        jun,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-021-00561-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat May 28 06:50:21 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-021-00561-8",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Soltani:2022:CBD,
  author =       "Mahdi Soltani and Mahdi Jafari Siavoshani and Amir
                 Hossein Jahangir",
  title =        "A content-based deep intrusion detection system",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "3",
  pages =        "547--562",
  month =        jun,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-021-00567-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat May 28 06:50:21 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-021-00567-2",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Tiplea:2022:NPD,
  author =       "Ferucio Laurentiu Tiplea",
  title =        "Narrow privacy and desynchronization in {Vaudenay}'s
                 {RFID} model",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "3",
  pages =        "563--575",
  month =        jun,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-021-00569-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat May 28 06:50:21 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-021-00569-0",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Khan:2022:PAK,
  author =       "Haibat Khan and Benjamin Dowling and Keith M. Martin",
  title =        "Pragmatic authenticated key agreement for {IEEE Std
                 802.15.6}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "3",
  pages =        "577--595",
  month =        jun,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-021-00570-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat May 28 06:50:21 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-021-00570-7",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Potteiger:2022:DSR,
  author =       "Bradley Potteiger and Feiyang Cai and Xenofon
                 Koutsoukos",
  title =        "Data space randomization for securing cyber-physical
                 systems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "3",
  pages =        "597--610",
  month =        jun,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-021-00568-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat May 28 06:50:21 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-021-00568-1",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Amraoui:2022:ABD,
  author =       "Noureddine Amraoui and Belhassen Zouari",
  title =        "Anomalous behavior detection-based approach for
                 authenticating smart home system users",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "3",
  pages =        "611--636",
  month =        jun,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-021-00571-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat May 28 06:50:21 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-021-00571-6",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Shah:2022:MLO,
  author =       "Ankit Shah and Rajesh Ganesan and Hasan Cam",
  title =        "Maintaining the level of operational effectiveness of
                 a {CSOC} under adverse conditions",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "3",
  pages =        "637--651",
  month =        jun,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-021-00573-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat May 28 06:50:21 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-021-00573-4",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Zulfiqar:2022:TAR,
  author =       "Maryam Zulfiqar and Muhammad Umar Janjua and Jack W.
                 Stokes",
  title =        "Tracking adoption of revocation and cryptographic
                 features in {X.509} certificates",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "3",
  pages =        "653--668",
  month =        jun,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-021-00572-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat May 28 06:50:21 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-021-00572-5",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{DArco:2022:GWP,
  author =       "P. D'Arco and R. {De Prisco} and R. Zaccagnino",
  title =        "{Gossamer}: weaknesses and performance",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "3",
  pages =        "669--687",
  month =        jun,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-021-00575-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat May 28 06:50:21 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-021-00575-2",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Zhang:2022:DTA,
  author =       "Xiaokuan Zhang and Jihun Hamm and Yinqian Zhang",
  title =        "Defeating traffic analysis via differential privacy: a
                 case study on streaming traffic",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "3",
  pages =        "689--706",
  month =        jun,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-021-00574-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat May 28 06:50:21 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-021-00574-3",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Huszti:2022:SPB,
  author =       "Andrea Huszti and Szabolcs Kov{\'a}cs and Norbert
                 Ol{\'a}h",
  title =        "Scalable, password-based and threshold authentication
                 for smart homes",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "4",
  pages =        "707--723",
  month =        aug,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00578-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Fri Jul 29 14:41:26 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00578-7",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kim:2022:MPD,
  author =       "Jinsung Kim and Younghoon Ban and Jeong Hyun Yi",
  title =        "{MAPAS}: a practical deep learning-based {Android}
                 malware detection system",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "4",
  pages =        "725--738",
  month =        aug,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00579-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Fri Jul 29 14:41:26 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00579-6",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Zabihimayvan:2022:FLR,
  author =       "Mahdieh Zabihimayvan and Derek Doran",
  title =        "A first look at references from the dark to the
                 surface web world: a case study in {Tor}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "4",
  pages =        "739--755",
  month =        aug,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00580-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Fri Jul 29 14:41:26 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00580-z",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Koike:2022:IOH,
  author =       "Kazuki Koike and Ryotaro Kobayashi and Masahiko
                 Katoh",
  title =        "{IoT}-oriented high-efficient anti-malware hardware
                 focusing on time series metadata extractable from
                 inside a processor core",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "4",
  pages =        "1--19",
  month =        aug,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-021-00577-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Fri Jul 29 14:41:26 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-021-00577-0",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Karl:2022:DNI,
  author =       "Ryan Karl and Hannah Burchfield and Taeho Jung",
  title =        "Developing non-interactive {MPC} with trusted hardware
                 for enhanced security",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "4",
  pages =        "777--797",
  month =        aug,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00583-w",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Fri Jul 29 14:41:26 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00583-w",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Gong:2022:TDR,
  author =       "Qian Gong and Phil DeMar and Mine Altunay",
  title =        "{ThunderSecure}: deploying real-time intrusion
                 detection for {100G} research networks by leveraging
                 stream-based features and one-class classification
                 network",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "4",
  pages =        "799--812",
  month =        aug,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00584-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Fri Jul 29 14:41:26 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00584-9",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Zenitani:2022:MOC,
  author =       "Kengo Zenitani",
  title =        "A multi-objective cost-benefit optimization algorithm
                 for network hardening",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "4",
  pages =        "813--832",
  month =        aug,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00586-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Fri Jul 29 14:41:26 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00586-7",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Komano:2022:CBS,
  author =       "Yuichi Komano and Takaaki Mizuki",
  title =        "Coin-based Secure Computations",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "4",
  pages =        "833--846",
  month =        aug,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00585-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Fri Jul 29 14:41:26 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00585-8",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Saifuzzaman:2022:SLR,
  author =       "Munshi Saifuzzaman and Tajkia Nuri Ananna and Farida
                 Chowdhury",
  title =        "A systematic literature review on wearable health data
                 publishing under differential privacy",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "4",
  pages =        "847--872",
  month =        aug,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-021-00576-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Fri Jul 29 14:41:26 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-021-00576-1",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Agrawal:2022:SAE,
  author =       "Ankit Agrawal and Ashutosh Bhatia and Rekha Kaushik",
  title =        "A survey on analyzing encrypted network traffic of
                 mobile devices",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "4",
  pages =        "873--915",
  month =        aug,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00581-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Fri Jul 29 14:41:26 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00581-y",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Zia:2022:SIE,
  author =       "Unsub Zia and Mark McCartney and Ali Sajjad",
  title =        "Survey on image encryption techniques using chaotic
                 maps in spatial, transform and spatiotemporal domains",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "4",
  pages =        "917--935",
  month =        aug,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00588-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Fri Jul 29 14:41:26 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00588-5",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Tan:2022:CPQ,
  author =       "Teik Guan Tan and Pawel Szalachowski and Jianying
                 Zhou",
  title =        "Challenges of post-quantum digital signing in
                 real-world applications: a survey",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "4",
  pages =        "937--952",
  month =        aug,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00587-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Fri Jul 29 14:41:26 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00587-6",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Park:2022:EVC,
  author =       "Jai Hyun Park and Jung Hee Cheon and Dongwoo Kim",
  title =        "Efficient verifiable computation over quotient
                 polynomial rings",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "5",
  pages =        "953--971",
  month =        oct,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00590-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Sep 24 10:44:14 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00590-x",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Lyvas:2022:EIS,
  author =       "Christos Lyvas and Costas Lambrinoudakis and Dimitris
                 Geneiatakis",
  title =        "\pkg{IntentAuth}: Securing {Android}'s intent-based
                 inter-process communication",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "5",
  pages =        "973--982",
  month =        oct,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00592-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Sep 24 10:44:14 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00592-9",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Singh:2022:DAI,
  author =       "Ram Govind Singh and Ananya Shrivastava and Sushmita
                 Ruj",
  title =        "A Digital Asset Inheritance Model to Convey Online
                 Persona Posthumously",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "5",
  pages =        "983--1003",
  month =        oct,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00593-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Sep 24 10:44:14 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00593-8",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Agostini:2022:BBM,
  author =       "E. Agostini and M. Bernaschi",
  title =        "{BitCracker}: {BitLocker} meets {GPUs}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "5",
  pages =        "1005--1018",
  month =        oct,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00589-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Sep 24 10:44:14 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00589-4",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Ahmim:2022:SAT,
  author =       "Ilyes Ahmim and Nacira Ghoualmi-Zine and Marwa Ahmim",
  title =        "Security analysis on ``{Three}-factor authentication
                 protocol using physical unclonable function for
                 {IoV}''",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "5",
  pages =        "1019--1026",
  month =        oct,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00595-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Sep 24 10:44:14 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00595-6",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Armour:2022:ASA,
  author =       "Marcel Armour and Bertram Poettering",
  title =        "Algorithm substitution attacks against receivers",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "5",
  pages =        "1027--1050",
  month =        oct,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00596-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Sep 24 10:44:14 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00596-5",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Camtepe:2022:ABC,
  author =       "Seyit Camtepe and Jarek Duda and Josef Pieprzyk",
  title =        "{ANS}-based compression and encryption with 128-bit
                 security",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "5",
  pages =        "1051--1067",
  month =        oct,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00597-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Sep 24 10:44:14 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00597-4",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Pericas-Gornals:2022:HPB,
  author =       "Rosa Peric{\`a}s-Gornals and Maci{\`a} Mut-Puigserver
                 and M. Magdalena Payeras-Capell{\`a}",
  title =        "Highly private blockchain-based management system for
                 digital {COVID-19} certificates",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "5",
  pages =        "1069--1090",
  month =        oct,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00598-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Sep 24 10:44:14 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00598-3",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Vlachos:2022:SOS,
  author =       "Vasileios Vlachos and Yannis C. Stamatiou and Sotiris
                 Nikoletseas",
  title =        "The {SAINT} observatory subsystem: an open-source
                 intelligence tool for uncovering cybersecurity
                 threats",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "5",
  pages =        "1091--1106",
  month =        oct,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00599-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Sep 24 10:44:14 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00599-2",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Cevik:2022:LAG,
  author =       "Beyza Cevik and Nur Altiparmak and Sevil Sen",
  title =        "{Lib2Desc}: automatic generation of security-centric
                 {Android} app descriptions using third-party
                 libraries",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "5",
  pages =        "1107--1125",
  month =        oct,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00601-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Sep 24 10:44:14 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00601-x",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Inayoshi:2022:VUT,
  author =       "Hiroki Inayoshi and Shohei Kakei and Shoichi Saito",
  title =        "Value-utilized taint propagation: toward precise
                 detection of apps' information flows across {Android}
                 {API} calls",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "5",
  pages =        "1127--1149",
  month =        oct,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00603-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Sep 24 10:44:14 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00603-9",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Borges:2022:AUE,
  author =       "Ricard Borges and Francesc Seb{\'e} and Magda Valls",
  title =        "An anonymous and unlinkable electronic toll collection
                 system",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "5",
  pages =        "1151--1162",
  month =        oct,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00604-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Sep 24 10:44:14 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00604-8",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Jeet:2022:SIP,
  author =       "Rabari Jeet and P. Arun Raj Kumar",
  title =        "A survey on interest packet flooding attacks and its
                 countermeasures in named data networking",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "5",
  pages =        "1163--1187",
  month =        oct,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00591-w",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Sep 24 10:44:14 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00591-w",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Syrmakesis:2022:CRA,
  author =       "Andrew D. Syrmakesis and Cristina Alcaraz and Nikos D.
                 Hatziargyriou",
  title =        "Classifying resilience approaches for protecting smart
                 grids against cyber threats",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "5",
  pages =        "1189--1210",
  month =        oct,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00594-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Sep 24 10:44:14 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00594-7",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Lygerou:2022:DHI,
  author =       "Irini Lygerou and Shreyas Srinivasa and Dimitris
                 Gritzalis",
  title =        "A decentralized honeypot for {IoT} Protocols based on
                 {Android} devices",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "6",
  pages =        "1211--1222",
  month =        dec,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00605-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Oct 15 16:48:15 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  note =         "See correction \cite{Lygerou:2023:CDH}.",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00605-7",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Fu:2022:CGP,
  author =       "Bingxue Fu and Xing Yu and Tao Feng",
  title =        "{CT-GCN}: a phishing identification model for
                 blockchain cryptocurrency transactions",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "6",
  pages =        "1223--1232",
  month =        dec,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00606-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Oct 15 16:48:15 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00606-6",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Templ:2022:SOM,
  author =       "Matthias Templ and Murat Sariyar",
  title =        "A systematic overview on methods to protect sensitive
                 data provided for various analyses",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "6",
  pages =        "1233--1246",
  month =        dec,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00607-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Oct 15 16:48:15 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00607-5",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kifouche:2022:DIN,
  author =       "Abdenour Kifouche and Mohamed Salah Azzaz and Remy
                 Kocik",
  title =        "Design and implementation of a new lightweight
                 chaos-based cryptosystem to secure {IoT}
                 communications",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "6",
  pages =        "1247--1262",
  month =        dec,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00609-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Oct 15 16:48:15 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00609-3",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Prajisha:2022:EID,
  author =       "C. Prajisha and A. R. Vasudevan",
  title =        "An efficient intrusion detection system for {MQTT-IoT}
                 using enhanced chaotic salp swarm algorithm and
                 {LightGBM}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "6",
  pages =        "1263--1282",
  month =        dec,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00611-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Oct 15 16:48:15 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00611-9",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Picazo-Sanchez:2022:CEC,
  author =       "Pablo Picazo-Sanchez and Lara Ortiz-Martin and Andrei
                 Sabelfeld",
  title =        "Are chrome extensions compliant with the spirit of
                 least privilege?",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "6",
  pages =        "1283--1297",
  month =        dec,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00610-w",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Oct 15 16:48:15 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00610-w",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Adewole:2022:DDL,
  author =       "Kayode S. Adewole and Vicen{\c{c}} Torra",
  title =        "{DFTMicroagg}: a dual-level anonymization algorithm
                 for smart grid data",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "6",
  pages =        "1299--1321",
  month =        dec,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00612-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Oct 15 16:48:15 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00612-8",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Skopik:2022:SDA,
  author =       "Florian Skopik and Arndt Bonitz and G{\"u}nter
                 G{\"o}hler",
  title =        "From scattered data to actionable knowledge: flexible
                 cyber security reporting in the military domain",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "6",
  pages =        "1323--1347",
  month =        dec,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00613-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Oct 15 16:48:15 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00613-7",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Torra:2022:PFP,
  author =       "Vicen{\c{c}} Torra and Edgar Galv{\'a}n and Guillermo
                 Navarro-Arribas",
  title =        "{PSO + FL = PAASO}: particle swarm optimization +
                 federated learning = privacy-aware agent swarm
                 optimization",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "6",
  pages =        "1349--1359",
  month =        dec,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00614-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Oct 15 16:48:15 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00614-6",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Yang:2022:SAI,
  author =       "Xiaodong Yang and Wenjia Wang and Caifen Wang",
  title =        "Security analysis and improvement of a
                 privacy-preserving authentication scheme in {VANET}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "6",
  pages =        "1361--1371",
  month =        dec,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00617-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Oct 15 16:48:15 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00617-3",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Abdussami:2022:LLA,
  author =       "Mohammad Abdussami and Ruhul Amin and Satyanarayana
                 Vollala",
  title =        "{LASSI}: a lightweight authenticated key agreement
                 protocol for fog-enabled {IoT} deployment",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "6",
  pages =        "1373--1387",
  month =        dec,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00619-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Oct 15 16:48:15 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00619-1",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kishore:2022:SPD,
  author =       "R. Kishore and I. Ioannou and A. Pitsillides",
  title =        "A security protocol for {D2D} communications in {5G}
                 networks using elliptic curve cryptography",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "6",
  pages =        "1389--1408",
  month =        dec,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00620-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Oct 15 16:48:15 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00620-8",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kumar:2022:SML,
  author =       "Raju Kumar and Aruna Bhat",
  title =        "A study of machine learning-based models for
                 detection, control, and mitigation of cyberbullying in
                 online social media",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "6",
  pages =        "1409--1431",
  month =        dec,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00600-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Oct 15 16:48:15 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00600-y",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Sah:2023:IDS,
  author =       "Gulab Sah and Subhasish Banerjee and Sweety Singh",
  title =        "Intrusion detection system over real-time data traffic
                 using machine learning methods with feature selection
                 approaches",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "1",
  pages =        "1--27",
  month =        feb,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00616-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Fri Mar 17 09:48:22 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00616-4",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Picazo-Sanchez:2023:GIP,
  author =       "Pablo Picazo-Sanchez and Magnus Almgren",
  title =        "{Gridchain}: an investigation of privacy for the
                 future local distribution grid",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "1",
  pages =        "29--46",
  month =        feb,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00622-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Fri Mar 17 09:48:22 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00622-6",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Hannousse:2023:DLM,
  author =       "Abdelhakim Hannousse and Mohamed Cherif Nait-Hamoud
                 and Salima Yahiouche",
  title =        "A deep learner model for multi-language webshell
                 detection",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "1",
  pages =        "47--61",
  month =        feb,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00615-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Fri Mar 17 09:48:22 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00615-5",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Sangari:2023:MRD,
  author =       "Seema Sangari and Eric Dallal and Michael Whitman",
  title =        "Modeling reporting delays in cyber incidents: an
                 industry-level comparison",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "1",
  pages =        "63--76",
  month =        feb,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00623-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Fri Mar 17 09:48:22 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00623-5",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Rajic:2023:EWA,
  author =       "Branislav Raji{\'c} and Zarko Stanisavljevi{\'c} and
                 Pavle Vuleti{\'c}",
  title =        "Early web application attack detection using network
                 traffic analysis",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "1",
  pages =        "77--91",
  month =        feb,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00627-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Fri Mar 17 09:48:22 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00627-1",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Rathore:2023:RDL,
  author =       "Nemi Chandra Rathore and Somanath Tripathy",
  title =        "Restricting data-leakage using fine-grained access
                 control on {OSN} objects",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "1",
  pages =        "93--106",
  month =        feb,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00629-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Fri Mar 17 09:48:22 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00629-z",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Balikcioglu:2023:MCD,
  author =       "Pinar G. Balikcioglu and Melih Sirlanci and Ozge A.
                 Kucuk and Bulut Ulukapi and Ramazan K. Turkmen and
                 Cengiz Acarturk",
  title =        "Malicious code detection in {Android}: the role of
                 sequence characteristics and disassembling methods",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "1",
  pages =        "107--118",
  month =        feb,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00626-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Fri Mar 17 09:48:22 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00626-2",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Sharma:2023:NAD,
  author =       "Amit Sharma and Brij B. Gupta and Awadhesh Kumar Singh
                 and V. K. Saraswat",
  title =        "A novel approach for detection of {APT} malware using
                 multi-dimensional hybrid {Bayesian} belief network",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "1",
  pages =        "119--135",
  month =        feb,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00631-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Fri Mar 17 09:48:22 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00631-5",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Hamzenejadi:2023:MBD,
  author =       "Sajad Hamzenejadi and Mahdieh Ghazvini and
                 Seyedamiryousef Hosseini",
  title =        "Mobile botnet detection: a comprehensive survey",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "1",
  pages =        "137--175",
  month =        feb,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00624-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Fri Mar 17 09:48:22 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00624-4",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Rastogi:2023:RFN,
  author =       "Shubhangi Rastogi and Divya Bansal",
  title =        "A review on fake news detection {3T's}: typology, time
                 of detection, taxonomies",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "1",
  pages =        "177--212",
  month =        feb,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00625-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Fri Mar 17 09:48:22 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00625-3",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Suren:2023:PPA,
  author =       "Emre S{\"u}ren and Fredrik Heiding and Johannes
                 Oleg{\aa}rd and Robert Lagerstr{\"o}m",
  title =        "{PatrIoT}: practical and agile threat research for
                 {IoT}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "1",
  pages =        "213--233",
  month =        feb,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00633-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Fri Mar 17 09:48:22 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00633-3",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Mohamed:2023:DSB,
  author =       "Safa Mohamed and Ridha Ejbali",
  title =        "Deep {SARSA}-based reinforcement learning approach for
                 anomaly network intrusion detection system",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "1",
  pages =        "235--247",
  month =        feb,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00634-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Fri Mar 17 09:48:22 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00634-2",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Amro:2023:CRM,
  author =       "Ahmed Amro and Vasileios Gkioulos",
  title =        "Cyber risk management for autonomous passenger ships
                 using threat-informed defense-in-depth",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "1",
  pages =        "249--288",
  month =        feb,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00638-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Fri Mar 17 09:48:22 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00638-y",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Alawneh:2023:UIU,
  author =       "Luay Alawneh and Mohammad Al-Zinati and Mahmoud
                 Al-Ayyoub",
  title =        "User identification using deep learning and human
                 activity mobile sensor data",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "1",
  pages =        "289--301",
  month =        feb,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00640-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Fri Mar 17 09:48:22 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00640-4",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Lygerou:2023:CDH,
  author =       "Irini Lygerou and Shreyas Srinivasa and Emmanouil
                 Vasilomanolakis and George Stergiopoulos and Dimitris
                 Gritzalis",
  title =        "Correction to: {A decentralized honeypot for IoT
                 Protocols based on Android devices}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "1",
  pages =        "303--303",
  month =        feb,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00628-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Fri Mar 17 09:48:22 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  note =         "See \cite{Lygerou:2022:DHI}.",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00628-0",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{An:2023:HEL,
  author =       "Qin An and Wilson Cheong Hin Hong and XiaoShu Xu and
                 Yunfeng Zhang and Kimberly Kolletar-Zhu",
  title =        "How education level influences {Internet} security
                 knowledge, behaviour, and attitude: a comparison among
                 undergraduates, postgraduates and working graduates",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "2",
  pages =        "305--317",
  month =        apr,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00637-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Fri Mar 17 09:48:23 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00637-z",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kuzlu:2023:ASM,
  author =       "Murat Kuzlu and Ferhat Ozgur Catak and Umit Cali and
                 Evren Catak and Ozgur Guler",
  title =        "Adversarial security mitigations of {mmWave}
                 beamforming prediction models using defensive
                 distillation and adversarial retraining",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "2",
  pages =        "319--332",
  month =        apr,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00644-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Fri Mar 17 09:48:23 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00644-0",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Swati:2023:DAD,
  author =       "Swati and Sangita Roy and Jawar Singh and Jimson
                 Mathew",
  title =        "Design and analysis of {DDoS} mitigating network
                 architecture",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "2",
  pages =        "333--345",
  month =        apr,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00635-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Fri Mar 17 09:48:23 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00635-1",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Chatzoglou:2023:RQA,
  author =       "Efstratios Chatzoglou and Vasileios Kouliaridis and
                 Georgios Karopoulos and Georgios Kambourakis",
  title =        "Revisiting {QUIC} attacks: a comprehensive review on
                 {QUIC} security and a hands-on study",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "2",
  pages =        "347--365",
  month =        apr,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00630-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Fri Mar 17 09:48:23 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00630-6",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Mohammadi:2023:HML,
  author =       "Reza Mohammadi and Chhagan Lal and Mauro Conti",
  title =        "{HTTPScout}: a Machine Learning based Countermeasure
                 for {HTTP} Flood Attacks in {SDN}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "2",
  pages =        "367--379",
  month =        apr,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00641-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Fri Mar 17 09:48:23 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00641-3",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Andriotis:2023:BDU,
  author =       "Panagiotis Andriotis and Myles Kirby and Atsuhiro
                 Takasu",
  title =        "\pkg{Bu-Dash}: a universal and dynamic graphical
                 password scheme (extended version)",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "2",
  pages =        "381--401",
  month =        apr,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00642-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Fri Mar 17 09:48:23 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00642-2",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Mishra:2023:SSU,
  author =       "Kailash Chandra Mishra and Subrata Dutta",
  title =        "A simple and secure user authentication scheme using
                 {Map Street View} with usability analysis based on
                 {ISO\slash IEC 25022}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "2",
  pages =        "403--415",
  month =        apr,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00636-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Fri Mar 17 09:48:23 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00636-0",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Gandhi:2023:TUS,
  author =       "Kapilan Kulayan Arumugam Gandhi and Chamundeswari
                 Arumugam",
  title =        "Toward a unified and secure approach for extraction of
                 forensic digital evidence from an {IoT} device",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "2",
  pages =        "417--431",
  month =        apr,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00645-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Fri Mar 17 09:48:23 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00645-z",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Zhou:2023:IDA,
  author =       "Hanxun Zhou and Longyu Kang and Hong Pan and Guo Wei
                 and Yong Feng",
  title =        "An intrusion detection approach based on incremental
                 long short-term memory",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "2",
  pages =        "433--446",
  month =        apr,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00632-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Fri Mar 17 09:48:23 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00632-4",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Guardiola-Muzquiz:2023:SCS,
  author =       "Gorka Guardiola-M{\'u}zquiz and Enrique
                 Soriano-Salvador",
  title =        "{SealFSv2}: combining storage-based and ratcheting for
                 tamper-evident logging",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "2",
  pages =        "447--466",
  month =        apr,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00643-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Fri Mar 17 09:48:23 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00643-1",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Alzahrani:2023:DAC,
  author =       "Bander Alzahrani and Nikos Fotiou and Aiiad Albeshri
                 and Abdullah Almuhaimeed and Khalid Alsubhi",
  title =        "Distributed access control for information-centric
                 networking architectures using verifiable credentials",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "2",
  pages =        "467--478",
  month =        apr,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00649-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Fri Mar 17 09:48:23 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00649-9",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bilgen:2023:AEA,
  author =       "Melike Burakgazi Bilgen and Osman Abul and Kemal
                 Bicakci",
  title =        "Authentication-enabled attribute-based access control
                 for smart homes",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "2",
  pages =        "479--495",
  month =        apr,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00639-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Fri Mar 17 09:48:23 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00639-x",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Wang:2023:DAM,
  author =       "Kai Wang and Jinxia Wu and Tianqing Zhu and Wei Ren
                 and Ying Hong",
  title =        "Defense against membership inference attack in graph
                 neural networks through graph perturbation",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "2",
  pages =        "497--509",
  month =        apr,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00646-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Fri Mar 17 09:48:23 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00646-y",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Ahmad:2023:TPB,
  author =       "Hira Ahmad and Muhammad Ahtazaz Ahsan and Adnan Noor
                 Mian",
  title =        "Trends in publishing blockchain surveys: a
                 bibliometric perspective",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "2",
  pages =        "511--523",
  month =        apr,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00653-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Fri Mar 17 09:48:23 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00653-z",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Brama:2023:ENN,
  author =       "Haya Brama and Lihi Dery and Tal Grinshpoun",
  title =        "Evaluation of neural networks defenses and attacks
                 using {NDCG} and reciprocal rank metrics",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "2",
  pages =        "525--540",
  month =        apr,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00652-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Fri Mar 17 09:48:23 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00652-0",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Celdran:2023:IBB,
  author =       "Alberto Huertas Celdr{\'a}n and Pedro Miguel
                 S{\'a}nchez S{\'a}nchez and Miguel Azor{\'{\i}}n
                 Castillo and G{\'e}r{\^o}me Bovet and Gregorio
                 Mart{\'{\i}}nez P{\'e}rez and Burkhard Stiller",
  title =        "Intelligent and behavioral-based detection of malware
                 in {IoT} spectrum sensors",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "3",
  pages =        "541--561",
  month =        jun,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00602-w",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Thu Jun 1 08:23:50 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00602-w",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Akbarzadeh:2023:DBS,
  author =       "Aida Akbarzadeh and Sokratis K. Katsikas",
  title =        "Dependency-based security risk assessment for
                 cyber-physical systems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "3",
  pages =        "563--578",
  month =        jun,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00608-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Thu Jun 1 08:23:50 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00608-4",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Higgins:2023:CPR,
  author =       "Martin Higgins and Wangkun Xu and Fei Teng and Thomas
                 Parisini",
  title =        "Cyber-physical risk assessment for false data
                 injection attacks considering moving target defences",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "3",
  pages =        "579--589",
  month =        jun,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00621-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Thu Jun 1 08:23:50 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00621-7",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bandara:2023:OPP,
  author =       "Eranga Bandara and Xueping Liang and Sachin Shetty and
                 Ravi Mukkamala and Peter Foytik and Nalin Ranasinghe
                 and Kasun {De Zoysa}",
  title =        "{Octopus}: privacy preserving peer-to-peer
                 transactions system with {InterPlanetary} file system
                 ({IPFS})",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "3",
  pages =        "591--609",
  month =        jun,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00650-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Thu Jun 1 08:23:50 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00650-2",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Al-Shehari:2023:RRA,
  author =       "Taher Al-Shehari and Rakan A. Alsowail",
  title =        "Random resampling algorithms for addressing the
                 imbalanced dataset classes in insider threat
                 detection",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "3",
  pages =        "611--629",
  month =        jun,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00651-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Thu Jun 1 08:23:50 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00651-1",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Orooji:2023:FAD,
  author =       "Marmar Orooji and Seyedeh Shaghayegh Rabbanian and
                 Gerald M. Knapp",
  title =        "Flexible adversary disclosure risk measure for
                 identity and attribute disclosure attacks",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "3",
  pages =        "631--645",
  month =        jun,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00654-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Thu Jun 1 08:23:50 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00654-y",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Ullah:2023:PTA,
  author =       "Imdad Ullah and Roksana Boreli and Salil S. Kanhere",
  title =        "Privacy in targeted advertising on mobile devices: a
                 survey",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "3",
  pages =        "647--678",
  month =        jun,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00655-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Thu Jun 1 08:23:50 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00655-x",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Chen:2023:EIS,
  author =       "Yingchun Chen and Jinguo Li and Naiwang Guo",
  title =        "Efficient and interpretable {SRU} combined with
                 {TabNet} for network intrusion detection in the big
                 data environment",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "3",
  pages =        "679--689",
  month =        jun,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00656-w",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Thu Jun 1 08:23:50 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00656-w",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Velasquez:2023:SRS,
  author =       "Juan Miguel L{\'o}pez Vel{\'a}squez and Sergio
                 Mauricio Mart{\'{\i}}nez Monterrubio and Luis Enrique
                 S{\'a}nchez Crespo and David Garcia Rosado",
  title =        "Systematic review of {SIEM} technology: {SIEM--SC}
                 birth",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "3",
  pages =        "691--711",
  month =        jun,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00657-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Thu Jun 1 08:23:50 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00657-9",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Lovrencic:2023:MCA,
  author =       "Rudolf Lovrenci{\'c} and Dejan Skvorc",
  title =        "Multi-cloud applications: data and code fragmentation
                 for improved security",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "3",
  pages =        "713--721",
  month =        jun,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00658-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Thu Jun 1 08:23:50 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00658-8",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Song:2023:NFS,
  author =       "Guangjia Song and Jianhua Hu and Hui Wang",
  title =        "A novel frame switching model based on virtual {MAC}
                 in {SDN}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "3",
  pages =        "723--736",
  month =        jun,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00659-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Thu Jun 1 08:23:50 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00659-7",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Tsohou:2023:CIS,
  author =       "Aggeliki Tsohou and Vasiliki Diamantopoulou and
                 Stefanos Gritzalis and Costas Lambrinoudakis",
  title =        "Cyber insurance: state of the art, trends and future
                 directions",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "3",
  pages =        "737--748",
  month =        jun,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00660-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Thu Jun 1 08:23:50 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00660-8",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kaur:2023:PPP,
  author =       "Jasleen Kaur and Alka Agrawal and Raees Ahmad Khan",
  title =        "{P2ADF}: a privacy-preserving attack detection
                 framework in {fog-IoT} environment",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "4",
  pages =        "749--762",
  month =        aug,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00661-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Aug 1 08:49:49 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00661-7",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Al-ani:2023:PSI,
  author =       "Ruqayah Al-ani and Thar Baker and Bo Zhou and Qi Shi",
  title =        "Privacy and safety improvement of {VANET} data via a
                 safety-related privacy scheme",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "4",
  pages =        "763--783",
  month =        aug,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00662-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Aug 1 08:49:49 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00662-6",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Molla:2023:ESS,
  author =       "Eirini Molla and Panagiotis Rizomiliotis and Stefanos
                 Gritzalis",
  title =        "Efficient searchable symmetric encryption supporting
                 range queries",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "4",
  pages =        "785--798",
  month =        aug,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00667-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Aug 1 08:49:49 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00667-1",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Mittal:2023:NTL,
  author =       "Shweta Mittal and Mohona Ghosh",
  title =        "A novel two-level secure access control approach for
                 blockchain platform in healthcare",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "4",
  pages =        "799--817",
  month =        aug,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00664-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Aug 1 08:49:49 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00664-4",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Grontas:2023:AEP,
  author =       "Panagiotis Grontas and Aris Pagourtzis",
  title =        "Anonymity and everlasting privacy in electronic
                 voting",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "4",
  pages =        "819--832",
  month =        aug,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00666-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Aug 1 08:49:49 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00666-2",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Chimuco:2023:SCB,
  author =       "Francisco T. Chimuco and Jo{\~a}o B. F. Sequeiros and
                 Carolina Galv{\~a}o Lopes and Tiago M. C. Sim{\~o}es
                 and M{\'a}rio M. Freire and Pedro R. M. In{\'a}cio",
  title =        "Secure cloud-based mobile apps: attack taxonomy,
                 requirements, mechanisms, tests and automation",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "4",
  pages =        "833--867",
  month =        aug,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00669-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Aug 1 08:49:49 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00669-z",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Menezes:2023:BSC,
  author =       "Leonardo Dias Menezes and Luciano Vieira de Ara{\'u}jo
                 and Marislei Nishijima",
  title =        "Blockchain and smart contract architecture for
                 notaries services under civil law: a {Brazilian}
                 experience",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "4",
  pages =        "869--880",
  month =        aug,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00673-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Aug 1 08:49:49 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00673-3",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Pandey:2023:PSN,
  author =       "Pankaj Pandey and Nishchol Mishra",
  title =        "{Phish-Sight}: a new approach for phishing detection
                 using dominant colors on web pages and machine
                 learning",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "4",
  pages =        "881--891",
  month =        aug,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00672-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Aug 1 08:49:49 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00672-4",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bowen:2023:BHD,
  author =       "Brandon Bowen and Anitha Chennamaneni and Ana Goulart
                 and Daisy Lin",
  title =        "{BLoCNet}: a hybrid, dataset-independent intrusion
                 detection system using deep learning",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "4",
  pages =        "893--917",
  month =        aug,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00663-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Aug 1 08:49:49 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00663-5",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Yang:2023:AEA,
  author =       "Zhen Yang and Shisong Yang and Yunbo Huang and
                 Jos{\'e}-Fern{\'a}n Mart{\'{\i}}nez and Lourdes
                 L{\'o}pez and Yuwen Chen",
  title =        "{AAIA}: an efficient aggregation scheme against
                 inverting attack for federated learning",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "4",
  pages =        "919--930",
  month =        aug,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00670-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Aug 1 08:49:49 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00670-6",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bhaskara:2023:CEA,
  author =       "Srividya Bhaskara and Santosh Singh Rathore",
  title =        "Causal effect analysis-based intrusion detection
                 system for {IoT} applications",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "4",
  pages =        "931--946",
  month =        aug,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00674-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Aug 1 08:49:49 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00674-2",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Sarhan:2023:ZSM,
  author =       "Mohanad Sarhan and Siamak Layeghy and Marcus Gallagher
                 and Marius Portmann",
  title =        "From zero-shot machine learning to zero-day attack
                 detection",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "4",
  pages =        "947--959",
  month =        aug,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00676-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Aug 1 08:49:49 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00676-0",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Seth:2023:LDD,
  author =       "Abhay Deep Seth and Santosh Biswas and Amit Kumar
                 Dhar",
  title =        "{LDES}: detector design for version number attack
                 detection using linear temporal logic based on discrete
                 event system",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "4",
  pages =        "961--985",
  month =        aug,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00665-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Aug 1 08:49:49 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00665-3",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Tuna:2023:TNH,
  author =       "Omer Faruk Tuna and Ferhat Ozgur Catak and M. Taner
                 Eskil",
  title =        "{TENET}: a new hybrid network architecture for
                 adversarial defense",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "4",
  pages =        "987--1004",
  month =        aug,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00675-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Aug 1 08:49:49 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00675-1",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Katsantonis:2023:CRD,
  author =       "M. N. Katsantonis and A. Manikas and I. Mavridis and
                 D. Gritzalis",
  title =        "Cyber range design framework for cyber security
                 education and training",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "4",
  pages =        "1005--1027",
  month =        aug,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00680-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Aug 1 08:49:49 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00680-4",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Alidoosti:2023:BLC,
  author =       "Mitra Alidoosti and Alireza Nowroozi and Ahmad
                 Nickabadi",
  title =        "Business-layer client-side racer: dynamic security
                 testing of the web application against client-side race
                 condition in the business layer",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "4",
  pages =        "1029--1054",
  month =        aug,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00671-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Aug 1 08:49:49 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00671-5",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Din:2023:TSM,
  author =       "Nizamud Din and Abdul Waheed and Shamsher Ullah and
                 Noor Ul Amin and Gautam Srivastava and Farhan Ullah and
                 Jerry Chun-Wei Lin",
  title =        "A typology of secure multicast communication over {5
                 G\slash 6 G} networks",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "4",
  pages =        "1055--1073",
  month =        aug,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00678-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Aug 1 08:49:49 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00678-y",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Zeghida:2023:SMP,
  author =       "Hayette Zeghida and Mehdi Boulaiche and Ramdane
                 Chikh",
  title =        "Securing {MQTT} protocol for {IoT} environment using
                 {IDS} based on ensemble learning",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "4",
  pages =        "1075--1086",
  month =        aug,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00681-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Aug 1 08:49:49 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00681-3",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kim:2023:ERS,
  author =       "Moon-Seok Kim and Sungho Kim and Sang-Kyung Yoo and
                 Bong-Soo Lee and Ji-Man Yu and Il-Woong Tcho and
                 Yang-Kyu Choi",
  title =        "Error reduction of {SRAM}-based physically unclonable
                 function for chip authentication",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "5",
  pages =        "1087--1098",
  month =        oct,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00668-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Sep 26 12:08:51 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00668-0",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Cai:2023:RTD,
  author =       "Feiyang Cai and Xenofon Koutsoukos",
  title =        "Real-time detection of deception attacks in
                 cyber-physical systems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "5",
  pages =        "1099--1114",
  month =        oct,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00677-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Sep 26 12:08:51 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  note =         "See correction \cite{Cai:2023:CRT}.",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00677-z",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Shi:2023:SAM,
  author =       "Sibo Shi and Shengwei Tian and Bo Wang and Tiejun Zhou
                 and Guanxin Chen",
  title =        "{SFCGDroid}: {Android} malware detection based on
                 sensitive function call graph",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "5",
  pages =        "1115--1124",
  month =        oct,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00679-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Sep 26 12:08:51 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00679-x",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Abdulganiyu:2023:SLR,
  author =       "Oluwadamilare Harazeem Abdulganiyu and Taha Ait
                 Tchakoucht and Yakub Kayode Saheed",
  title =        "A systematic literature review for network intrusion
                 detection system ({IDS})",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "5",
  pages =        "1125--1162",
  month =        oct,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00682-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Sep 26 12:08:51 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00682-2",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Mohammadi:2023:CBO,
  author =       "Reza Mohammadi",
  title =        "A comprehensive Blockchain-oriented secure framework
                 for {SDN\slash Fog}-based {IoUT}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "5",
  pages =        "1163--1175",
  month =        oct,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00683-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Sep 26 12:08:51 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00683-1",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Mohammadi:2023:NHH,
  author =       "Shahriar Mohammadi and Mehdi Babagoli",
  title =        "A novel hybrid hunger games algorithm for intrusion
                 detection systems based on nonlinear regression
                 modeling",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "5",
  pages =        "1177--1195",
  month =        oct,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00684-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Sep 26 12:08:51 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00684-0",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Ahmad:2023:PCS,
  author =       "Suhail Ahmad and Ajaz Hussain Mir",
  title =        "Protection of centralized {SDN} control plane from
                 high-rate {Packet--In} messages",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "5",
  pages =        "1197--1206",
  month =        oct,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00685-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Sep 26 12:08:51 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00685-z",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Naim:2023:MWI,
  author =       "Or Naim and Doron Cohen and Irad Ben-Gal",
  title =        "Malicious website identification using design
                 attribute learning",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "5",
  pages =        "1207--1217",
  month =        oct,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00686-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Sep 26 12:08:51 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00686-y",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Li:2023:BEC,
  author =       "Wenjuan Li and Yu Wang and Jin Li",
  title =        "A blockchain-enabled collaborative intrusion detection
                 framework for {SDN}-assisted cyber-physical systems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "5",
  pages =        "1219--1230",
  month =        oct,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00687-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Sep 26 12:08:51 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00687-x",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Gruner:2023:ACS,
  author =       "Andreas Gr{\"u}ner and Alexander M{\"u}hle and Niko
                 Lockenvitz and Christoph Meinel",
  title =        "Analyzing and comparing the security of self-sovereign
                 identity management systems through threat modeling",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "5",
  pages =        "1231--1248",
  month =        oct,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00688-w",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Sep 26 12:08:51 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00688-w",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Zhang:2023:ISF,
  author =       "Denghui Zhang and Zhaoquan Gu and Lijing Ren and
                 Muhammad Shafiq",
  title =        "An interpretability security framework for intelligent
                 decision support systems based on saliency map",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "5",
  pages =        "1249--1260",
  month =        oct,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00689-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Sep 26 12:08:51 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00689-9",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Panda:2023:SAP,
  author =       "Suryakanta Panda and Samrat Mondal and Ashok Kumar Das
                 and Willy Susilo",
  title =        "Secure access privilege delegation using
                 attribute-based encryption",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "5",
  pages =        "1261--1276",
  month =        oct,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00690-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Sep 26 12:08:51 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00690-2",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Baradaran:2023:UBS,
  author =       "Sara Baradaran and Mahdi Heidari and Ali Kamali and
                 Maryam Mouzarani",
  title =        "A unit-based symbolic execution method for detecting
                 memory corruption vulnerabilities in executable codes",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "5",
  pages =        "1277--1290",
  month =        oct,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00691-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Sep 26 12:08:51 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00691-1",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Prantl:2023:RSG,
  author =       "Thomas Prantl and Andr{\'e} Bauer and Lukas
                 Iffl{\"a}nder and Christian Krupitzer and Samuel
                 Kounev",
  title =        "Recommendation of secure group communication schemes
                 using multi-objective optimization",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "5",
  pages =        "1291--1332",
  month =        oct,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00692-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Sep 26 12:08:51 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00692-0",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Zacharis:2023:AAA,
  author =       "Alexandros Zacharis and Constantinos Patsakis",
  title =        "{AiCEF}: an {AI-assisted} cyber exercise content
                 generation framework using named entity recognition",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "5",
  pages =        "1333--1354",
  month =        oct,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00693-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Sep 26 12:08:51 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00693-z",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Mazumder:2023:CCB,
  author =       "Md. Mumtahin Habib Ullah Mazumder and Md. Eusha Kadir
                 and Sadia Sharmin and Md. Shariful Islam and Muhammad
                 Mahbub Alam",
  title =        "{cFEM}: a cluster based feature extraction method for
                 network intrusion detection",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "5",
  pages =        "1355--1369",
  month =        oct,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00694-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Sep 26 12:08:51 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00694-y",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Asha:2023:DFD,
  author =       "S. Asha and P. Vinod and Varun G. Menon",
  title =        "A defensive framework for deepfake detection under
                 adversarial settings using temporal and spatial
                 features",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "5",
  pages =        "1371--1382",
  month =        oct,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00695-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Sep 26 12:08:51 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00695-x",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Cai:2023:CRT,
  author =       "Feiyang Cai and Xenofon Koutsoukos",
  title =        "Correction: {Real-time detection of deception attacks
                 in cyber-physical systems}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "5",
  pages =        "1383--1383",
  month =        oct,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00696-w",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Sep 26 12:08:51 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  note =         "See \cite{Cai:2023:RTD}.",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00696-w",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Sepehrzadeh:2023:MIT,
  author =       "Hamed Sepehrzadeh",
  title =        "A method for insider threat assessment by modeling the
                 internal employee interactions",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "5",
  pages =        "1385--1393",
  month =        oct,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00697-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Sep 26 12:08:51 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00697-9",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Alcaraz:2023:OST,
  author =       "Cristina Alcaraz and Jesus Cumplido and Alicia
                 Trivi{\~n}o",
  title =        "{OCPP} in the spotlight: threats and countermeasures
                 for electric vehicle charging infrastructures 4.0",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "5",
  pages =        "1395--1421",
  month =        oct,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00698-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Sep 26 12:08:51 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00698-8",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Wang:2023:ANM,
  author =       "Runzheng Wang and Jian Gao and Shuhua Huang",
  title =        "{AIHGAT}: a novel method of malware detection and
                 homology analysis using assembly instruction
                 heterogeneous graph",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "5",
  pages =        "1423--1443",
  month =        oct,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00699-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Sep 26 12:08:51 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00699-7",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Gimenez-Aguilar:2023:MUB,
  author =       "Mar Gimenez-Aguilar and Jose Maria de Fuentes and
                 Lorena Gonzalez-Manzano",
  title =        "Malicious uses of blockchains by malware: from the
                 analysis to {Smart--Zephyrus}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "5",
  pages =        "1445--1480",
  month =        oct,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00700-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Sep 26 12:08:51 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00700-3",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Alhaj:2023:EAS,
  author =       "Taqwa Ahmed Alhaj and Maheyzah Md Siraj and Anazida
                 Zainal and Inshirah Idris and Anjum Nazir and Fatin
                 Elhaj and Tasneem Darwish",
  title =        "An effective attack scenario construction model based
                 on identification of attack steps and stages",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "5",
  pages =        "1481--1496",
  month =        oct,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00701-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Sep 26 12:08:51 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00701-2",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Zhang:2023:AOS,
  author =       "Yin Sheng Zhang",
  title =        "Analysis of {OSPU} security effect and data assembly
                 verification under semi-network {OS} architecture",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "5",
  pages =        "1497--1509",
  month =        oct,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00702-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Sep 26 12:08:51 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00702-1",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Papanikolaou:2023:ANT,
  author =       "Alexandros Papanikolaou and Aggelos Alevizopoulos and
                 Christos Ilioudis and Konstantinos Demertzis and
                 Konstantinos Rantos",
  title =        "An {autoML} network traffic analyzer for cyber threat
                 detection",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "5",
  pages =        "1511--1530",
  month =        oct,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00703-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Sep 26 12:08:51 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00703-0",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Chowdhury:2023:PLT,
  author =       "Nabin Chowdhury and Vasileios Gkioulos",
  title =        "A personalized learning theory-based cyber-security
                 training exercise",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "6",
  pages =        "1531--1546",
  month =        dec,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00704-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Sep 26 12:09:01 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00704-z",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Luong:2023:BML,
  author =       "Ngoc T. Luong and Doan Hoang",
  title =        "{BAPRP}: a machine learning approach to blackhole
                 attacks prevention routing protocol in vehicular Ad Hoc
                 networks",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "6",
  pages =        "1547--1566",
  month =        dec,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00705-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Sep 26 12:09:01 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00705-y",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Gonzalez-Manzano:2023:TCA,
  author =       "Lorena Gonz{\'a}lez-Manzano and Jos{\'e} M. de Fuentes
                 and Flavio Lombardi and Cristina Ramos",
  title =        "A technical characterization of {APTs} by leveraging
                 public resources",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "6",
  pages =        "1567--1584",
  month =        dec,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00706-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Sep 26 12:09:01 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00706-x",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Barhoun:2023:TMD,
  author =       "Rabie Barhoun and Maryam Ed-daibouni",
  title =        "Trust modeling in a distributed collaborative
                 environment: application to a collaborative healthcare
                 system",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "6",
  pages =        "1585--1604",
  month =        dec,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00707-w",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Sep 26 12:09:01 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00707-w",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Rovida:2023:FAH,
  author =       "Lorenzo Rovida",
  title =        "Fast but approximate homomorphic $k$-means based on
                 masking technique",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "6",
  pages =        "1605--1619",
  month =        dec,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00708-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Sep 26 12:09:01 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00708-9",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Shukla:2023:QFS,
  author =       "Ankur Shukla and Basel Katt and Muhammad Mudassar
                 Yamin",
  title =        "A quantitative framework for security assurance
                 evaluation and selection of cloud services: a case
                 study",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "6",
  pages =        "1621--1650",
  month =        dec,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00709-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Sep 26 12:09:01 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00709-8",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Ogunseyi:2023:SRP,
  author =       "Taiwo Blessing Ogunseyi and Cossi Blaise Avoussoukpo
                 and Yiqiang Jiang",
  title =        "A systematic review of privacy techniques in
                 recommendation systems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "6",
  pages =        "1651--1664",
  month =        dec,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00710-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Sep 26 12:09:01 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00710-1",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Lopez:2023:AAA,
  author =       "Christian L{\'o}pez and Jes{\'u}s Solano and Esteban
                 Rivera and Lizzy Tengana and Johana Florez-Lozano and
                 Alejandra Castelblanco and Mart{\'{\i}}n Ochoa",
  title =        "Adversarial attacks against mouse- and keyboard-based
                 biometric authentication: black-box versus
                 domain-specific techniques",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "6",
  pages =        "1665--1685",
  month =        dec,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00711-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Sep 26 12:09:01 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00711-0",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Zyout:2023:MCA,
  author =       "Mo'ath Zyout and Raed Shatnawi and Hassan Najadat",
  title =        "Malware classification approaches utilizing binary and
                 text encoding of permissions",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "6",
  pages =        "1687--1712",
  month =        dec,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00712-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Sep 26 12:09:01 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00712-z",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Ekstedt:2023:YAC,
  author =       "Mathias Ekstedt and Zeeshan Afzal and Preetam
                 Mukherjee and Simon Hacks and Robert Lagerstr{\"o}m",
  title =        "Yet another cybersecurity risk assessment framework",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "6",
  pages =        "1713--1729",
  month =        dec,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00713-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Sep 26 12:09:01 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00713-y",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kuppusamy:2023:APS,
  author =       "K. S. Kuppusamy and G. Balayogi",
  title =        "Accessible password strength assessment method for
                 visually challenged users",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "6",
  pages =        "1731--1741",
  month =        dec,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00714-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Sep 26 12:09:01 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00714-x",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Pandey:2023:EMC,
  author =       "Saurabh Pandey and Nitesh Kumar and Anand Handa and
                 Sandeep Kumar Shukla",
  title =        "Evading malware classifiers using {RL} agent with
                 action-mask",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "6",
  pages =        "1743--1763",
  month =        dec,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00715-w",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Sep 26 12:09:01 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00715-w",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Guan:2023:AHO,
  author =       "Zhenyu Guan and Lixin Zhang and Bohan Huang and Bihe
                 Zhao and Song Bian",
  title =        "Adaptive hyperparameter optimization for black-box
                 adversarial attack",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "6",
  pages =        "1765--1779",
  month =        dec,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00716-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Sep 26 12:09:01 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00716-9",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Ali:2023:ENI,
  author =       "Muhammad Ali and Mansoor-ul- Haque and Muhammad Hanif
                 Durad and Anila Usman and Syed Muhammad Mohsin and Hana
                 Mujlid and Carsten Maple",
  title =        "Effective network intrusion detection using
                 stacking-based ensemble approach",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "6",
  pages =        "1781--1798",
  month =        dec,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00718-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Sep 26 12:09:01 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00718-7",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Madabhushi:2023:SAD,
  author =       "Srinidhi Madabhushi and Rinku Dewri",
  title =        "A survey of anomaly detection methods for power
                 grids",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "6",
  pages =        "1799--1832",
  month =        dec,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00720-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Sep 26 12:09:01 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00720-z",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Baig:2023:PPC,
  author =       "Ahmed Fraz Baig and Sigurd Eskeland and Bian Yang",
  title =        "Privacy-preserving continuous authentication using
                 behavioral biometrics",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "6",
  pages =        "1833--1847",
  month =        dec,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00721-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Sep 26 12:09:01 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00721-y",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Ibrahim:2023:CSS,
  author =       "Nasir Ibrahim and Harin Sellahewa",
  title =        "A cross-setting study of user unlocking behaviour in a
                 graphical authentication scheme: a case study on
                 {Android Pattern Unlock}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "6",
  pages =        "1849--1863",
  month =        dec,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00722-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Sep 26 12:09:01 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00722-x",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Ziza:2023:DED,
  author =       "Kristijan Ziza and Predrag Tadi{\'c} and Pavle
                 Vuleti{\'c}",
  title =        "{DNS} exfiltration detection in the presence of
                 adversarial attacks and modified exfiltrator
                 behaviour",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "6",
  pages =        "1865--1880",
  month =        dec,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00723-w",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Sep 26 12:09:01 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00723-w",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Sneha:2023:RRT,
  author =       "M. Sneha and A. Keerthan Kumar and Nikhil V. Hegde and
                 A. S. Anish and G. Shobha",
  title =        "{RADS}: a real-time anomaly detection model for
                 software-defined networks using machine learning",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "6",
  pages =        "1881--1891",
  month =        dec,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00724-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Sep 26 12:09:01 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00724-9",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Smiliotopoulos:2023:DLM,
  author =       "Christos Smiliotopoulos and Georgios Kambourakis and
                 Konstantia Barbatsalou",
  title =        "On the detection of lateral movement through
                 supervised machine learning and an open-source tool to
                 create turnkey datasets from {Sysmon} logs",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "6",
  pages =        "1893--1919",
  month =        dec,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00725-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Sep 26 12:09:01 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00725-8",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Levshun:2023:TMA,
  author =       "Dmitry Levshun and Olga Tushkanova and Andrey
                 Chechulin",
  title =        "Two-model active learning approach for inappropriate
                 information classification in social networks",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "6",
  pages =        "1921--1936",
  month =        dec,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00726-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Sep 26 12:09:01 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00726-7",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Hamdi:2023:FLB,
  author =       "Najet Hamdi",
  title =        "Federated learning-based intrusion detection system
                 for {Internet of Things}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "6",
  pages =        "1937--1948",
  month =        dec,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00727-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Sep 26 12:09:01 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00727-6",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kaur:2023:IAL,
  author =       "Sarabjeet Kaur and Amanpreet Kaur Sandhu and Abhinav
                 Bhandari",
  title =        "Investigation of application layer {DDoS} attacks in
                 legacy and software-defined networks: a comprehensive
                 review",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "6",
  pages =        "1949--1988",
  month =        dec,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00728-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Sep 26 12:09:01 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00728-5",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Farhat:2023:CMD,
  author =       "Saida Farhat and Manel Abdelkader and Amel
                 Meddeb-Makhlouf and Faouzi Zarai",
  title =        "{CADS-ML\slash DL}: efficient cloud-based multi-attack
                 detection system",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "6",
  pages =        "1989--2013",
  month =        dec,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00729-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Sep 26 12:09:01 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00729-4",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Torra:2023:ADR,
  author =       "Vicen{\c{c}} Torra and Guillermo Navarro-Arribas",
  title =        "Attribute disclosure risk for $k$-anonymity: the case
                 of numerical data",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "6",
  pages =        "2015--2024",
  month =        dec,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00730-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Sep 26 12:09:01 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00730-x",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Rajasekaran:2024:FBA,
  author =       "Arun Sekar Rajasekaran and M. Azees",
  title =        "A fog-based anonymous authentication scheme with
                 location privacy for wireless body area network with
                 {FPGA} implementation",
  journal =      j-INT-J-INFO-SEC,
  volume =       "23",
  number =       "1",
  pages =        "1--13",
  month =        feb,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00717-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 27 06:06:19 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00717-8",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Rahal:2024:BBM,
  author =       "Hakima Rym Rahal and Sihem Slatnia and Okba Kazar and
                 Ezedin Barka and Saad Harous",
  title =        "Blockchain-based multi-diagnosis deep learning
                 application for various diseases classification",
  journal =      j-INT-J-INFO-SEC,
  volume =       "23",
  number =       "1",
  pages =        "15--30",
  month =        feb,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00733-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 27 06:06:19 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00733-8",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Silvestri:2024:CTA,
  author =       "Stefano Silvestri and Shareful Islam and Dmitry Amelin
                 and Gabriele Weiler and Spyridon Papastergiou and Mario
                 Ciampi",
  title =        "Cyber threat assessment and management for securing
                 healthcare ecosystems using natural language
                 processing",
  journal =      j-INT-J-INFO-SEC,
  volume =       "23",
  number =       "1",
  pages =        "31--50",
  month =        feb,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00769-w",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 27 06:06:19 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00769-w",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Rabie:2024:FPP,
  author =       "Osama Bassam J. Rabie and Shitharth Selvarajan and
                 Tawfiq Hasanin and Gouse Baig Mohammed and Abddulrhman
                 M. Alshareef and Mueen Uddin",
  title =        "A full privacy-preserving distributed batch-based
                 certificate-less aggregate signature authentication
                 scheme for healthcare wearable wireless medical sensor
                 networks ({HWMSNs})",
  journal =      j-INT-J-INFO-SEC,
  volume =       "23",
  number =       "1",
  pages =        "51--80",
  month =        feb,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00748-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 27 06:06:19 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00748-1",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Alharbi:2024:FTL,
  author =       "Afnan A. Alharbi",
  title =        "Federated transfer learning for attack detection for
                 {Internet of Medical Things}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "23",
  number =       "1",
  pages =        "81--100",
  month =        feb,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00805-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 27 06:06:19 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00805-9",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Rekeraho:2024:CCI,
  author =       "Alexandre Rekeraho and Daniel Tudor Cotfas and Petru
                 Adrian Cotfas and Titus Constantin B{\u{a}}lan and
                 Emmanuel Tuyishime and Rebecca Acheampong",
  title =        "Cybersecurity challenges in {IoT}-based smart
                 renewable energy",
  journal =      j-INT-J-INFO-SEC,
  volume =       "23",
  number =       "1",
  pages =        "101--117",
  month =        feb,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00732-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 27 06:06:19 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00732-9",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Lagraa:2024:RGB,
  author =       "Sofiane Lagraa and Martin Hus{\'a}k and Hamida Seba
                 and Satyanarayana Vuppala and Radu State and Moussa
                 Ouedraogo",
  title =        "A review on graph-based approaches for network
                 security monitoring and botnet detection",
  journal =      j-INT-J-INFO-SEC,
  volume =       "23",
  number =       "1",
  pages =        "119--140",
  month =        feb,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00742-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 27 06:06:19 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00742-7",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Ayodele:2024:SDM,
  author =       "Believe Ayodele and Victor Buttigieg",
  title =        "{SDN} as a defence mechanism: a comprehensive survey",
  journal =      j-INT-J-INFO-SEC,
  volume =       "23",
  number =       "1",
  pages =        "141--185",
  month =        feb,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00764-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 27 06:06:19 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00764-1",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Adamos:2024:EAR,
  author =       "Konstantinos Adamos and George Stergiopoulos and
                 Michalis Karamousadakis and Dimitris Gritzalis",
  title =        "Enhancing attack resilience of cyber-physical systems
                 through state dependency graph models",
  journal =      j-INT-J-INFO-SEC,
  volume =       "23",
  number =       "1",
  pages =        "187--198",
  month =        feb,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00731-w",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 27 06:06:19 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00731-w",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Dinesh:2024:EET,
  author =       "K. Dinesh and S. V. N. Santhosh Kumar",
  title =        "Energy-efficient trust-aware secured neuro-fuzzy
                 clustering with sparrow search optimization in wireless
                 sensor network",
  journal =      j-INT-J-INFO-SEC,
  volume =       "23",
  number =       "1",
  pages =        "199--223",
  month =        feb,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00737-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 27 06:06:19 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00737-4",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Sommervoll:2024:SAA,
  author =       "{\AA}vald {\AA}slaugson Sommervoll and L{\'a}szl{\'o}
                 Erd{\H{o}}di and Fabio Massimo Zennaro",
  title =        "Simulating all archetypes of {SQL} injection
                 vulnerability exploitation using reinforcement learning
                 agents",
  journal =      j-INT-J-INFO-SEC,
  volume =       "23",
  number =       "1",
  pages =        "225--246",
  month =        feb,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00738-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 27 06:06:19 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00738-3",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kekul:2024:EVM,
  author =       "Hakan Kek{\"u}l and Burhan Ergen and Halil Arslan",
  title =        "Estimating vulnerability metrics with word embedding
                 and multiclass classification methods",
  journal =      j-INT-J-INFO-SEC,
  volume =       "23",
  number =       "1",
  pages =        "247--270",
  month =        feb,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00734-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 27 06:06:19 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00734-7",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Vitel:2024:SVL,
  author =       "Silviu Vi{\c{t}}el and Marilena Lupa{\c{s}}cu and
                 Drago{\c{s}} Teodor Gavrilu{\c{t}} and Henri Luchian",
  title =        "Short- versus long-term performance of detection
                 models for obfuscated {MSOffice}-embedded malware",
  journal =      j-INT-J-INFO-SEC,
  volume =       "23",
  number =       "1",
  pages =        "271--297",
  month =        feb,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00736-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 27 06:06:19 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00736-5",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Ryu:2024:DAA,
  author =       "Gwonsang Ryu and Daeseon Choi",
  title =        "Detection of adversarial attacks based on differences
                 in image entropy",
  journal =      j-INT-J-INFO-SEC,
  volume =       "23",
  number =       "1",
  pages =        "299--314",
  month =        feb,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00735-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 27 06:06:19 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00735-6",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Dhingra:2024:RLM,
  author =       "Bhavya Dhingra and Vidhi Jain and Deepak Kumar Sharma
                 and Koyel Datta Gupta and Deepika Kukreja",
  title =        "{RLET}: a lightweight model for ubiquitous multi-class
                 intrusion detection in sustainable and secured smart
                 environment",
  journal =      j-INT-J-INFO-SEC,
  volume =       "23",
  number =       "1",
  pages =        "315--330",
  month =        feb,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00739-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 27 06:06:19 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00739-2",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Jin:2024:FID,
  author =       "Philgeun Jin and Namjun Kim and Sangjin Lee and Doowon
                 Jeong",
  title =        "Forensic investigation of the dark web on the {Tor}
                 network: pathway toward the surface web",
  journal =      j-INT-J-INFO-SEC,
  volume =       "23",
  number =       "1",
  pages =        "331--346",
  month =        feb,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00745-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 27 06:06:19 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00745-4",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Farao:2024:ICI,
  author =       "Aristeidis Farao and Georgios Paparis and Sakshyam
                 Panda and Emmanouil Panaousis and Apostolis Zarras and
                 Christos Xenakis",
  title =        "{INCHAIN}: a cyber insurance architecture with smart
                 contracts and self-sovereign identity on top of
                 blockchain",
  journal =      j-INT-J-INFO-SEC,
  volume =       "23",
  number =       "1",
  pages =        "347--371",
  month =        feb,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00741-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 27 06:06:19 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00741-8",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Mvah:2024:GGT,
  author =       "Fabrice Mvah and Vianney Kengne Tchendji and
                 Cl{\'e}mentin Tayou Djamegni and Ahmed H. Anwar and
                 Deepak K. Tosh and Charles Kamhoua",
  title =        "{GaTeBaSep}: game theory-based security protocol
                 against {ARP} spoofing attacks in software-defined
                 networks",
  journal =      j-INT-J-INFO-SEC,
  volume =       "23",
  number =       "1",
  pages =        "373--387",
  month =        feb,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00749-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 27 06:06:19 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00749-0",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Narita:2024:SDP,
  author =       "Jun Narita and Takao Murakami and Hideitsu Hino and
                 Masakatsu Nishigaki and Tetsushi Ohki",
  title =        "Synthesizing differentially private location traces
                 including co-locations",
  journal =      j-INT-J-INFO-SEC,
  volume =       "23",
  number =       "1",
  pages =        "389--410",
  month =        feb,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00740-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 27 06:06:19 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00740-9",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Feng:2024:SAI,
  author =       "Tao Feng and Wentao Jin and Minghu Zhang and Lu
                 Zheng",
  title =        "Security assessment and improvement of smart grid
                 {NIKE} protocol",
  journal =      j-INT-J-INFO-SEC,
  volume =       "23",
  number =       "1",
  pages =        "411--429",
  month =        feb,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00746-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 27 06:06:19 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00746-3",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Amine:2024:SEV,
  author =       "Oussama Amine and Karim Baghery and Zaira Pindado and
                 Carla R{\`a}fols",
  title =        "Simulation extractable versions of {Groth}'s
                 {zk-SNARK} revisited",
  journal =      j-INT-J-INFO-SEC,
  volume =       "23",
  number =       "1",
  pages =        "431--445",
  month =        feb,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00750-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 27 06:06:19 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00750-7",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Mangipudi:2024:PPM,
  author =       "Easwar Vivek Mangipudi and Krutarth Rao and Jeremy
                 Clark and Aniket Kate",
  title =        "{Pepal}: Penalizing multimedia breaches and partial
                 leakages",
  journal =      j-INT-J-INFO-SEC,
  volume =       "23",
  number =       "1",
  pages =        "447--465",
  month =        feb,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00744-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 27 06:06:19 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00744-5",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Elmiger:2024:STG,
  author =       "Marius Elmiger and Mouad Lemoudden and Nikolaos
                 Pitropakis and William J. Buchanan",
  title =        "Start thinking in graphs: using graphs to address
                 critical attack paths in a {Microsoft} cloud tenant",
  journal =      j-INT-J-INFO-SEC,
  volume =       "23",
  number =       "1",
  pages =        "467--485",
  month =        feb,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00751-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 27 06:06:19 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00751-6",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Chakraborty:2024:BBA,
  author =       "Partha Sarathi Chakraborty and Somanath Tripathy and
                 Sanjeet Kumar Nayak",
  title =        "{BASPED}: Blockchain assisted searchable public key
                 encryption over outsourced data",
  journal =      j-INT-J-INFO-SEC,
  volume =       "23",
  number =       "1",
  pages =        "487--503",
  month =        feb,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00753-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 27 06:06:19 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00753-4",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Adnan:2024:ISE,
  author =       "Muhammad Adnan and Muhammad Osama Imam and Muhammad
                 Furqan Javed and Iqbal Murtza",
  title =        "Improving spam email classification accuracy using
                 ensemble techniques: a stacking approach",
  journal =      j-INT-J-INFO-SEC,
  volume =       "23",
  number =       "1",
  pages =        "505--517",
  month =        feb,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00756-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 27 06:06:19 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00756-1",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Chanal:2024:BBD,
  author =       "Poornima M. Chanal and Mahabaleshwar S. Kakkasageri",
  title =        "Blockchain-based data integrity framework for
                 {Internet of Things}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "23",
  number =       "1",
  pages =        "519--532",
  month =        feb,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00719-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 27 06:06:19 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00719-6",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Ayub:2024:RSI,
  author =       "Md. Ahsan Ayub and Ambareen Siraj and Bobby Filar and
                 Maanak Gupta",
  title =        "{RWArmor}: a static-informed dynamic analysis approach
                 for early detection of cryptographic windows
                 ransomware",
  journal =      j-INT-J-INFO-SEC,
  volume =       "23",
  number =       "1",
  pages =        "533--556",
  month =        feb,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00758-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 27 06:06:19 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00758-z",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Jain:2024:IDL,
  author =       "Vikas Kumar Jain and Meenakshi Tripathi",
  title =        "An integrated deep learning model for {Ethereum} smart
                 contract vulnerability detection",
  journal =      j-INT-J-INFO-SEC,
  volume =       "23",
  number =       "1",
  pages =        "557--575",
  month =        feb,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00752-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 27 06:06:19 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00752-5",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Anjum:2024:HST,
  author =       "Anjum and Rahul Katarya",
  title =        "Hate speech, toxicity detection in online social
                 media: a recent survey of state of the art and
                 opportunities",
  journal =      j-INT-J-INFO-SEC,
  volume =       "23",
  number =       "1",
  pages =        "577--608",
  month =        feb,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00755-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 27 06:06:19 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00755-2",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Triakosia:2024:SOM,
  author =       "Aikaterini Triakosia and Panagiotis Rizomiliotis and
                 Cecilia Tonelli and Fabio Federici and Valerio Senni",
  title =        "Secure outsourcing of manufacturing compliance
                 checks",
  journal =      j-INT-J-INFO-SEC,
  volume =       "23",
  number =       "1",
  pages =        "609--627",
  month =        feb,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00747-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 27 06:06:19 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00747-2",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Hayata:2024:PIR,
  author =       "Junichiro Hayata and Jacob C. N. Schuldt and Goichiro
                 Hanaoka and Kanta Matsuura",
  title =        "On private information retrieval supporting range
                 queries",
  journal =      j-INT-J-INFO-SEC,
  volume =       "23",
  number =       "1",
  pages =        "629--647",
  month =        feb,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00743-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 27 06:06:19 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00743-6",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bansal:2024:MPP,
  author =       "Vidhi Bansal and Niyati Baliyan and Mohona Ghosh",
  title =        "{MLChain}: a privacy-preserving model learning
                 framework using blockchain",
  journal =      j-INT-J-INFO-SEC,
  volume =       "23",
  number =       "1",
  pages =        "649--677",
  month =        feb,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00754-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 27 06:06:19 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00754-3",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Patruni:2024:PMP,
  author =       "Muralidhara Rao Patruni and Abdul Gaffar Humayun",
  title =        "{PPAM-mIoMT}: a privacy-preserving authentication with
                 device verification for securing healthcare systems in
                 {5G} networks",
  journal =      j-INT-J-INFO-SEC,
  volume =       "23",
  number =       "1",
  pages =        "679--698",
  month =        feb,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00762-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 27 06:06:19 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00762-3",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Patsakis:2024:CCS,
  author =       "Constantinos Patsakis and Eugenia Politou and
                 Efthimios Alepis and Julio Hernandez-Castro",
  title =        "Cashing out crypto: state of practice in ransom
                 payments",
  journal =      j-INT-J-INFO-SEC,
  volume =       "23",
  number =       "2",
  pages =        "699--712",
  month =        apr,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00766-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 27 06:06:20 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00766-z",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Hamdi:2024:VAA,
  author =       "Ahlem Hamdi and Lamia Fourati and Samiha Ayed",
  title =        "Vulnerabilities and attacks assessments in blockchain
                 1.0, 2.0 and 3.0: tools, analysis and countermeasures",
  journal =      j-INT-J-INFO-SEC,
  volume =       "23",
  number =       "2",
  pages =        "713--757",
  month =        apr,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00765-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 27 06:06:20 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00765-0",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Zouhri:2024:EIF,
  author =       "Houssam Zouhri and Ali Idri and Ahmed Ratnani",
  title =        "Evaluating the impact of filter-based feature
                 selection in intrusion detection systems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "23",
  number =       "2",
  pages =        "759--785",
  month =        apr,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00767-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 27 06:06:20 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00767-y",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Olivero:2024:SMS,
  author =       "Miguel Angel Olivero and Antonia Bertolino and
                 Francisco Jos{\'e} Dominguez-Mayo and Mar{\'\i}a
                 Jos{\'e} Escalona and Ilaria Matteucci",
  title =        "A systematic mapping study on security for systems of
                 systems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "23",
  number =       "2",
  pages =        "787--817",
  month =        apr,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00757-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 27 06:06:20 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00757-0",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Goenka:2024:CSP,
  author =       "Richa Goenka and Meenu Chawla and Namita Tiwari",
  title =        "A comprehensive survey of phishing: mediums, intended
                 targets, attack and defence techniques and a novel
                 taxonomy",
  journal =      j-INT-J-INFO-SEC,
  volume =       "23",
  number =       "2",
  pages =        "819--848",
  month =        apr,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00768-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 27 06:06:20 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00768-x",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Maddu:2024:NID,
  author =       "Mamatha Maddu and Yamarthi Narasimha Rao",
  title =        "Network intrusion detection and mitigation in {SDN}
                 using deep learning models",
  journal =      j-INT-J-INFO-SEC,
  volume =       "23",
  number =       "2",
  pages =        "849--862",
  month =        apr,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00771-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 27 06:06:20 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00771-2",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Ali:2024:RSP,
  author =       "Auwal Shehu Ali and Zarul Fitri Zaaba and Manmeet
                 Mahinderjit Singh",
  title =        "The rise of ``security and privacy'': bibliometric
                 analysis of computer privacy research",
  journal =      j-INT-J-INFO-SEC,
  volume =       "23",
  number =       "2",
  pages =        "863--885",
  month =        apr,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00761-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 27 06:06:20 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00761-4",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Alkhateeb:2024:SRT,
  author =       "Ehab Alkhateeb and Ali Ghorbani and Arash Habibi
                 Lashkari",
  title =        "A survey on run-time packers and mitigation
                 techniques",
  journal =      j-INT-J-INFO-SEC,
  volume =       "23",
  number =       "2",
  pages =        "887--913",
  month =        apr,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00759-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 27 06:06:20 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00759-y",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bhale:2024:HID,
  author =       "Pradeepkumar Bhale and Santosh Biswas and Sukumar
                 Nandi",
  title =        "A hybrid {IDS} for detection and mitigation of
                 sinkhole attack in {6LoWPAN} networks",
  journal =      j-INT-J-INFO-SEC,
  volume =       "23",
  number =       "2",
  pages =        "915--934",
  month =        apr,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00763-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 27 06:06:20 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00763-2",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Tyagi:2024:EUA,
  author =       "Gaurav Tyagi and Rahul Kumar",
  title =        "An efficient user authentication and key agreement
                 scheme for wireless sensor networks using physically
                 unclonable function",
  journal =      j-INT-J-INFO-SEC,
  volume =       "23",
  number =       "2",
  pages =        "935--962",
  month =        apr,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00770-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 27 06:06:20 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00770-3",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Villalon-Huerta:2024:SCC,
  author =       "Antonio Villal{\'o}n-Huerta and Ismael Ripoll-Ripoll
                 and Hector Marco-Gisbert",
  title =        "A survey and characterization of {Close Access
                 Cyberspace Operations}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "23",
  number =       "2",
  pages =        "963--980",
  month =        apr,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00772-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 27 06:06:20 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00772-1",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Toreini:2024:FSF,
  author =       "Ehsan Toreini and Maryam Mehrnezhad and Aad van
                 Moorsel",
  title =        "{Fairness as a Service} ({FaaS}): verifiable and
                 privacy-preserving fairness auditing of machine
                 learning systems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "23",
  number =       "2",
  pages =        "981--997",
  month =        apr,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00774-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 27 06:06:20 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00774-z",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Xun:2024:LCA,
  author =       "Peng Xun and Ziyu Yang and Haoyang Zhu and Zhu Tang",
  title =        "Locating collaborative attack targets based on
                 physical invariants toward cyber-physical systems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "23",
  number =       "2",
  pages =        "999--1017",
  month =        apr,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00773-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 27 06:06:20 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00773-0",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Patruni:2024:PCP,
  author =       "Muralidhara Rao Patruni and Abdul Gaffar Humayun",
  title =        "Publisher Correction: {PPAM-mIoMT}: a
                 privacy-preserving authentication with device
                 verification for securing healthcare systems in {5G}
                 networks",
  journal =      j-INT-J-INFO-SEC,
  volume =       "23",
  number =       "2",
  pages =        "1019--1019",
  month =        apr,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00775-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 27 06:06:20 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00775-y",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Goncalves:2024:OGC,
  author =       "Ricardo Martins Gon{\c{c}}alves and Miguel Mira da
                 Silva and Paulo Rupino da Cunha",
  title =        "{Olympus}: a {GDPR} compliant blockchain system",
  journal =      j-INT-J-INFO-SEC,
  volume =       "23",
  number =       "2",
  pages =        "1021--1036",
  month =        apr,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00782-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 27 06:06:20 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00782-z",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Saikam:2024:EAB,
  author =       "Jalaiah Saikam and Koteswararao Ch",
  title =        "An ensemble approach-based intrusion detection system
                 utilizing {ISHO--HBA} and {SE--ResNet152}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "23",
  number =       "2",
  pages =        "1037--1054",
  month =        apr,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00777-w",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 27 06:06:20 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00777-w",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Ariyadasa:2024:SRL,
  author =       "Subhash Ariyadasa and Shantha Fernando and Subha
                 Fernando",
  title =        "{SmartiPhish}: a reinforcement learning-based
                 intelligent anti-phishing solution to detect spoofed
                 website attacks",
  journal =      j-INT-J-INFO-SEC,
  volume =       "23",
  number =       "2",
  pages =        "1055--1076",
  month =        apr,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00778-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 27 06:06:20 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00778-9",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Xu:2024:GAE,
  author =       "Lei Xu and Junhai Zhai",
  title =        "Generating adversarial examples with collaborative
                 generative models",
  journal =      j-INT-J-INFO-SEC,
  volume =       "23",
  number =       "2",
  pages =        "1077--1091",
  month =        apr,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00780-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 27 06:06:20 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00780-1",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Gomez:2024:IEC,
  author =       "Juan Manuel Castelo G{\'o}mez and Sergio
                 Ruiz-Villafranca",
  title =        "Integrating the edge computing paradigm into the
                 development of {IoT} forensic methodologies",
  journal =      j-INT-J-INFO-SEC,
  volume =       "23",
  number =       "2",
  pages =        "1093--1116",
  month =        apr,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00776-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 27 06:06:20 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00776-x",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Ince:2024:EPD,
  author =       "Kenan Ince",
  title =        "Exploring the potential of deep learning and machine
                 learning techniques for randomness analysis to enhance
                 security on {IoT}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "23",
  number =       "2",
  pages =        "1117--1130",
  month =        apr,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00783-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 27 06:06:20 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00783-y",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Hamila:2024:ESF,
  author =       "Firas Hamila and Mohammad Hamad and Daniel Costa
                 Salgado and Sebastian Steinhorst",
  title =        "Enhancing security in {Fiat--Shamir}
                 transformation-based non-interactive zero-knowledge
                 protocols for {IoT} authentication",
  journal =      j-INT-J-INFO-SEC,
  volume =       "23",
  number =       "2",
  pages =        "1131--1148",
  month =        apr,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00779-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 27 06:06:20 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00779-8",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Prantl:2024:BHI,
  author =       "Thomas Prantl and Lukas Horn and Simon Engel and Lukas
                 Iffl{\"a}nder and Lukas Beierlieb and Christian
                 Krupitzer and Andr{\'e} Bauer and Mansi Sakarvadia and
                 Ian Foster and Samuel Kounev",
  title =        "{De Bello Homomorphico}: Investigation of the
                 extensibility of the {OpenFHE} library with basic
                 mathematical functions by means of common approaches
                 using the example of the {CKKS} cryptosystem",
  journal =      j-INT-J-INFO-SEC,
  volume =       "23",
  number =       "2",
  pages =        "1149--1169",
  month =        apr,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00781-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 27 06:06:20 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00781-0",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Heluany:2024:RDT,
  author =       "Jessica B. Heluany and Vasileios Gkioulos",
  title =        "A review on digital twins for power generation and
                 distribution",
  journal =      j-INT-J-INFO-SEC,
  volume =       "23",
  number =       "2",
  pages =        "1171--1195",
  month =        apr,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00784-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 27 06:06:20 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00784-x",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Ali:2024:FIS,
  author =       "Rao Faizan Ali and P. D. D. Dominic and Sadaf Hina and
                 Sheraz Naseer",
  title =        "Fostering information security policies compliance
                 with {ISA-95}-based framework: an empirical study of
                 oil and gas employees",
  journal =      j-INT-J-INFO-SEC,
  volume =       "23",
  number =       "2",
  pages =        "1197--1213",
  month =        apr,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00786-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 27 06:06:20 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00786-9",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Empl:2024:GIV,
  author =       "Philip Empl and Daniel Schlette and Lukas St{\"o}ger
                 and G{\"u}nther Pernul",
  title =        "Generating {ICS} vulnerability playbooks with open
                 standards",
  journal =      j-INT-J-INFO-SEC,
  volume =       "23",
  number =       "2",
  pages =        "1215--1230",
  month =        apr,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00760-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 27 06:06:20 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00760-5",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Amin:2024:BBM,
  author =       "Habib {El Amin} and Lina Oueidat and Maroun Chamoun
                 and Abed {Ellatif Samhat} and Antoine Feghali",
  title =        "Blockchain-based multi-organizational cyber risk
                 management framework for collaborative environments",
  journal =      j-INT-J-INFO-SEC,
  volume =       "23",
  number =       "2",
  pages =        "1231--1249",
  month =        apr,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00788-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 27 06:06:20 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00788-7",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Nandanwar:2024:TBI,
  author =       "Himanshu Nandanwar and Rahul Katarya",
  title =        "{TL-BILSTM IoT}: transfer learning model for
                 prediction of intrusion detection system in {IoT}
                 environment",
  journal =      j-INT-J-INFO-SEC,
  volume =       "23",
  number =       "2",
  pages =        "1251--1277",
  month =        apr,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00787-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 27 06:06:20 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00787-8",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Rao:2024:CDM,
  author =       "Dimmiti Srinivasa Rao and Ajith Jubilson Emerson",
  title =        "Cyberattack defense mechanism using deep learning
                 techniques in software-defined networks",
  journal =      j-INT-J-INFO-SEC,
  volume =       "23",
  number =       "2",
  pages =        "1279--1291",
  month =        apr,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00785-w",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 27 06:06:20 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00785-w",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Niktabe:2024:DCP,
  author =       "Sepideh Niktabe and Arash Habibi Lashkari and Dilli
                 Prasad Sharma",
  title =        "Detection, characterization, and profiling {DoH}
                 Malicious traffic using statistical pattern
                 recognition",
  journal =      j-INT-J-INFO-SEC,
  volume =       "23",
  number =       "2",
  pages =        "1293--1316",
  month =        apr,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00790-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 27 06:06:20 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00790-z",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Dasgupta:2024:IDP,
  author =       "Rupshali Dasgupta and Meghabriti Pramanik and Pabitra
                 Mitra and Dipanwita Roy Chowdhury",
  title =        "Intrusion detection for power grid: a review",
  journal =      j-INT-J-INFO-SEC,
  volume =       "23",
  number =       "2",
  pages =        "1317--1329",
  month =        apr,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00789-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 27 06:06:20 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00789-6",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Asad:2024:PRA,
  author =       "H. Asad and S. Adhikari and Ilir Gashi",
  title =        "A perspective-retrospective analysis of diversity in
                 signature-based open-source network intrusion detection
                 systems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "23",
  number =       "2",
  pages =        "1331--1346",
  month =        apr,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00794-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 27 06:06:20 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00794-9",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Alqahtani:2024:SBR,
  author =       "Sultan S. Alqahtani",
  title =        "Security bug reports classification using {\em
                 fasttext}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "23",
  number =       "2",
  pages =        "1347--1358",
  month =        apr,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00793-w",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 27 06:06:20 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00793-w",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{ElMendili:2024:EDM,
  author =       "Fatna {El Mendili} and Mohammed Fattah and Nisrine
                 Berros and Youness Filaly and Youn{\`e}s {El Bouzekri
                 El Idrissi}",
  title =        "Enhancing detection of malicious profiles and spam
                 tweets with an automated honeypot framework powered by
                 deep learning",
  journal =      j-INT-J-INFO-SEC,
  volume =       "23",
  number =       "2",
  pages =        "1359--1388",
  month =        apr,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00796-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 27 06:06:20 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00796-7",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Abbas:2024:RFF,
  author =       "Sohail Abbas and Manar Abu Talib and Qassim Nasir and
                 Sally Idhis and Mariam Alaboudi and Ali Mohamed",
  title =        "Radio frequency fingerprinting techniques for device
                 identification: a survey",
  journal =      j-INT-J-INFO-SEC,
  volume =       "23",
  number =       "2",
  pages =        "1389--1427",
  month =        apr,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00801-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 27 06:06:20 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00801-z",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Martinez:2024:MCP,
  author =       "Ferney Mart{\'\i}nez and Luis Enrique S{\`a}nchez and
                 Antonio Santos-Olmo and David G. Rosado and Eduardo
                 Fern{\`a}ndez-Medina",
  title =        "Maritime cybersecurity: protecting digital seas",
  journal =      j-INT-J-INFO-SEC,
  volume =       "23",
  number =       "2",
  pages =        "1429--1457",
  month =        apr,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00800-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 27 06:06:20 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00800-0",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Ukeje:2024:ISP,
  author =       "Ndukwe Ukeje and Jairo Gutierrez and Krassie Petrova",
  title =        "Information security and privacy challenges of cloud
                 computing for government adoption: a systematic
                 review",
  journal =      j-INT-J-INFO-SEC,
  volume =       "23",
  number =       "2",
  pages =        "1459--1475",
  month =        apr,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00797-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 27 06:06:20 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00797-6",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Oruc:2024:MCS,
  author =       "Aybars Oruc and Nabin Chowdhury and Vasileios
                 Gkioulos",
  title =        "A modular cyber security training programme for the
                 maritime domain",
  journal =      j-INT-J-INFO-SEC,
  volume =       "23",
  number =       "2",
  pages =        "1477--1512",
  month =        apr,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00799-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 27 06:06:20 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00799-4",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Zuo:2024:VDB,
  author =       "Fei Zuo and Junghwan Rhee",
  title =        "Vulnerability discovery based on source code patch
                 commit mining: a systematic literature review",
  journal =      j-INT-J-INFO-SEC,
  volume =       "23",
  number =       "2",
  pages =        "1513--1526",
  month =        apr,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00795-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 27 06:06:20 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00795-8",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Frati:2024:CTH,
  author =       "Fulvio Frati and Georgiana Darau and Nikos Salamanos
                 and Pantelitsa Leonidou and Costas Iordanou and
                 Dimitris Plachouris and Efstratios Syrmas and Evangelos
                 Floros and George Nikitakis and George Spanoudakis and
                 Konstantinos Kalais and Stella Tsichlaki and Ernesto
                 Damiani and George C. Kagadis and Jihane Najar and
                 Michael Sirivianos",
  title =        "Cybersecurity training and healthcare: the {AERAS}
                 approach",
  journal =      j-INT-J-INFO-SEC,
  volume =       "23",
  number =       "2",
  pages =        "1527--1539",
  month =        apr,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00802-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 27 06:06:20 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00802-y",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kakisim:2024:DLA,
  author =       "Arzu Gorgulu Kakisim",
  title =        "A deep learning approach based on multi-view consensus
                 for {SQL} injection detection",
  journal =      j-INT-J-INFO-SEC,
  volume =       "23",
  number =       "2",
  pages =        "1541--1556",
  month =        apr,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-023-00791-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 27 06:06:20 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-023-00791-y",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}