@Preamble{
"\ifx \undefined \booktitle \def \booktitle#1{{{\em #1}}} \fi" #
"\ifx \undefined \pkg \def \pkg #1{{{\tt #1}}} \fi"
}
@String{ack-nhfb = "Nelson H. F. Beebe,
University of Utah,
Department of Mathematics, 110 LCB,
155 S 1400 E RM 233,
Salt Lake City, UT 84112-0090, USA,
Tel: +1 801 581 5254,
FAX: +1 801 581 4148,
e-mail: \path|beebe@math.utah.edu|,
\path|beebe@acm.org|,
\path|beebe@computer.org| (Internet),
URL: \path|https://www.math.utah.edu/~beebe/|"}
@String{j-INT-J-INFO-SEC = "International Journal of Information
Security"}
@Article{Gollman:2001:E,
author = "Dieter Gollman and Catherine A. Meadows and Eiji
Okamoto",
title = "Editorial",
journal = j-INT-J-INFO-SEC,
volume = "1",
number = "1",
pages = "1--2",
month = aug,
year = "2001",
CODEN = "????",
DOI = "https://doi.org/10.1007/s102070100004",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:21 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s102070100004",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Landwehr:2001:CS,
author = "Carl E. Landwehr",
title = "Computer security",
journal = j-INT-J-INFO-SEC,
volume = "1",
number = "1",
pages = "3--13",
month = aug,
year = "2001",
CODEN = "????",
DOI = "https://doi.org/10.1007/s102070100003",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:21 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s102070100003",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{McHugh:2001:IID,
author = "John McHugh",
title = "Intrusion and intrusion detection",
journal = j-INT-J-INFO-SEC,
volume = "1",
number = "1",
pages = "14--35",
month = aug,
year = "2001",
CODEN = "????",
DOI = "https://doi.org/10.1007/s102070100001",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:21 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s102070100001",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Johnson:2001:ECD,
author = "Don Johnson and Alfred Menezes and Scott Vanstone",
title = "The {Elliptic Curve Digital Signature Algorithm
(ECDSA)}",
journal = j-INT-J-INFO-SEC,
volume = "1",
number = "1",
pages = "36--63",
month = aug,
year = "2001",
CODEN = "????",
DOI = "https://doi.org/10.1007/s102070100002",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:21 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s102070100002",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Blundo:2001:PDI,
author = "Carlo Blundo and Paolo D'Arco and Alfredo {De
Santis}",
title = "A $t$-private $k$-database information retrieval
scheme",
journal = j-INT-J-INFO-SEC,
volume = "1",
number = "1",
pages = "64--68",
month = aug,
year = "2001",
CODEN = "????",
DOI = "https://doi.org/10.1007/s102070100005",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:21 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s102070100005",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Monrose:2002:PHB,
author = "Fabian Monrose and Michael K. Reiter and Susanne
Wetzel",
title = "Password hardening based on keystroke dynamics",
journal = j-INT-J-INFO-SEC,
volume = "1",
number = "2",
pages = "69--83",
month = feb,
year = "2002",
CODEN = "????",
DOI = "https://doi.org/10.1007/s102070100006",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:21 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s102070100006",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Rodeh:2002:UAT,
author = "Ohad Rodeh and Kenneth P. Birman and Danny Dolev",
title = "Using {AVL} trees for fault-tolerant group key
management",
journal = j-INT-J-INFO-SEC,
volume = "1",
number = "2",
pages = "84--99",
month = feb,
year = "2002",
CODEN = "????",
DOI = "https://doi.org/10.1007/s102070100008",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:21 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s102070100008",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Damiani:2002:SSS,
author = "E. Damiani and S. {De Capitani di Vimercati} and S.
Paraboschi and P. Samarati",
title = "Securing {SOAP} e-services",
journal = j-INT-J-INFO-SEC,
volume = "1",
number = "2",
pages = "100--115",
month = feb,
year = "2002",
CODEN = "????",
DOI = "https://doi.org/10.1007/s102070100009",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:21 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s102070100009",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Kudo:2002:PPB,
author = "Michiharu Kudo",
title = "{PBAC}: Provision-based access control model",
journal = j-INT-J-INFO-SEC,
volume = "1",
number = "2",
pages = "116--130",
month = feb,
year = "2002",
CODEN = "????",
DOI = "https://doi.org/10.1007/s102070100010",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:21 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s102070100010",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Mizuki:2002:CCF,
author = "Takaaki Mizuki and Hiroki Shizuya and Takao
Nishizeki",
title = "A complete characterization of a family of key
exchange protocols",
journal = j-INT-J-INFO-SEC,
volume = "1",
number = "2",
pages = "131--142",
month = feb,
year = "2002",
CODEN = "????",
DOI = "https://doi.org/10.1007/s102070100011",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:21 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s102070100011",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Steinwandt:2002:APB,
author = "Rainer Steinwandt and Willi Geiselmann and Regine
Endsuleit",
title = "Attacking a polynomial-based cryptosystem: {Polly}
Cracker",
journal = j-INT-J-INFO-SEC,
volume = "1",
number = "3",
pages = "143--148",
month = nov,
year = "2002",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-002-0012-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:21 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-002-0012-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Itakura:2002:PPI,
author = "Yukio Itakura and Masaki Hashiyada and Toshio
Nagashima and Shigeo Tsujii",
title = "Proposal on personal identifiers generated from the
{STR} information of {DNA}",
journal = j-INT-J-INFO-SEC,
volume = "1",
number = "3",
pages = "149--160",
month = nov,
year = "2002",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-002-0013-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:21 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-002-0013-1",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Nieto:2002:KRC,
author = "J. M. Gonz{\'a}les Nieto and K. Viswanathan and C.
Boyd and A. Clark and E. Dawson",
title = "Key recovery for the commercial environment",
journal = j-INT-J-INFO-SEC,
volume = "1",
number = "3",
pages = "161--174",
month = nov,
year = "2002",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-002-0014-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:21 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-002-0014-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Kim:2002:NEC,
author = "S. Kim and H. Oh",
title = "A new electronic check system with reusable refunds",
journal = j-INT-J-INFO-SEC,
volume = "1",
number = "3",
pages = "175--188",
month = nov,
year = "2002",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-002-0015-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:21 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-002-0015-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Dawson:2002:CCP,
author = "Ed Dawson and Kapali Viswanathan and Colin Boyd",
title = "Compliant cryptologic protocols",
journal = j-INT-J-INFO-SEC,
volume = "1",
number = "3",
pages = "189--202",
month = nov,
year = "2002",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-002-0016-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:21 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-002-0016-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Korzhik:2003:HAB,
author = "Valery Korzhik and Guillermo Morales-Luna",
title = "Hybrid authentication based on noisy channels",
journal = j-INT-J-INFO-SEC,
volume = "1",
number = "4",
pages = "203--210",
month = jul,
year = "2003",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-002-0017-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:22 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-002-0017-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Ruan:2003:FGB,
author = "Chun Ruan and Vijay Varadharajan",
title = "A formal graph based framework for supporting
authorization delegations and conflict resolutions",
journal = j-INT-J-INFO-SEC,
volume = "1",
number = "4",
pages = "211--222",
month = jul,
year = "2003",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-003-0018-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:22 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-003-0018-4",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Kremer:2003:FMP,
author = "Steve Kremer and Olivier Markowitch",
title = "Fair multi-party non-repudiation protocols",
journal = j-INT-J-INFO-SEC,
volume = "1",
number = "4",
pages = "223--235",
month = jul,
year = "2003",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-003-0019-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:22 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-003-0019-3",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Carminati:2003:MAC,
author = "Barbara Carminati and Elena Ferrari",
title = "Management of access control policies for {XML}
document sources",
journal = j-INT-J-INFO-SEC,
volume = "1",
number = "4",
pages = "236--260",
month = jul,
year = "2003",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-003-0020-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:22 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-003-0020-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{MacKenzie:2003:NCD,
author = "Philip MacKenzie and Michael K. Reiter",
title = "Networked cryptographic devices resilient to capture",
journal = j-INT-J-INFO-SEC,
volume = "2",
number = "1",
pages = "1--20",
month = nov,
year = "2003",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-003-0022-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:22 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-003-0022-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Gurgens:2003:ACP,
author = "Sigrid G{\"u}rgens and Javier Lopez and Ren{\'e}
Peralta",
title = "Analysis of e-commerce protocols: Adapting a
traditional technique",
journal = j-INT-J-INFO-SEC,
volume = "2",
number = "1",
pages = "21--36",
month = nov,
year = "2003",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-003-0021-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:22 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-003-0021-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Baek:2003:ZSP,
author = "Joonsang Baek and Yuliang Zheng",
title = "{Zheng} and {Seberry}'s public key encryption scheme
revisited",
journal = j-INT-J-INFO-SEC,
volume = "2",
number = "1",
pages = "37--44",
month = nov,
year = "2003",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-003-0023-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:22 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-003-0023-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Bertino:2003:CBF,
author = "Elisa Bertino and Elena Ferrari and Andrea Perego",
title = "Content-based filtering of {Web} documents: the {MaX}
system and the {EUFORBIA} project",
journal = j-INT-J-INFO-SEC,
volume = "2",
number = "1",
pages = "45--58",
month = nov,
year = "2003",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-003-0024-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:22 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-003-0024-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Geiselmann:2003:AIP,
author = "Willi Geiselmann and Willi Meier and Rainer
Steinwandt",
title = "An attack on the isomorphisms of polynomials problem
with one secret",
journal = j-INT-J-INFO-SEC,
volume = "2",
number = "1",
pages = "59--64",
month = nov,
year = "2003",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-003-0025-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:22 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-003-0025-5",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Dawson:2004:PSI,
author = "E. Dawson",
title = "Preface to the special issue on {PKI}",
journal = j-INT-J-INFO-SEC,
volume = "2",
number = "2",
pages = "65--65",
month = jan,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-003-0031-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:22 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-003-0031-7;
http://link.springer.com/content/pdf/10.1007/s10207-003-0031-7.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Blakley:2004:ASN,
author = "B. Blakley and G. R. Blakley",
title = "All sail, no anchor {II}: Acceptable high-end {PKI}",
journal = j-INT-J-INFO-SEC,
volume = "2",
number = "2",
pages = "66--77",
month = jan,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-003-0029-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:22 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-003-0029-1",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Russell:2004:TBR,
author = "Selwyn Russell",
title = "Theory and benefits of recursive certificate
structures",
journal = j-INT-J-INFO-SEC,
volume = "2",
number = "2",
pages = "78--90",
month = jan,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-003-0028-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:22 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-003-0028-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Lopez:2004:PDB,
author = "Javier Lopez and Antonio Ma{\~n}a and Jose A.
Montenegro and Juan J. Ortega",
title = "{PKI} design based on the use of on-line certification
authorities",
journal = j-INT-J-INFO-SEC,
volume = "2",
number = "2",
pages = "91--102",
month = jan,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-003-0027-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:22 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-003-0027-3",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Laih:2004:GVR,
author = "C. S. Laih and K. Y. Chen",
title = "Generating visible {RSA} public keys for {PKI}",
journal = j-INT-J-INFO-SEC,
volume = "2",
number = "2",
pages = "103--109",
month = jan,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-003-0030-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:22 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-003-0030-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Munoz:2004:CRS,
author = "Jose L. Mu{\~n}oz and Jordi Forne and Oscar Esparza
and Miguel Soriano",
title = "Certificate revocation system implementation based on
the {Merkle} hash tree",
journal = j-INT-J-INFO-SEC,
volume = "2",
number = "2",
pages = "110--124",
month = jan,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-003-0026-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:22 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/hash.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-003-0026-4",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Priami:2004:PSI,
author = "Corrado Priami",
title = "Preface to the special issue on {Security in Global
Computing}",
journal = j-INT-J-INFO-SEC,
volume = "2",
number = "3--4",
pages = "125--125",
month = aug,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-004-0034-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:23 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-004-0034-z;
http://link.springer.com/content/pdf/10.1007/s10207-004-0034-z.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Teller:2004:UAC,
author = "David Teller and Pascal Zimmer and Daniel Hirschkoff",
title = "Using ambients to control resources",
journal = j-INT-J-INFO-SEC,
volume = "2",
number = "3--4",
pages = "126--144",
month = aug,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-004-0035-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:23 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-004-0035-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Buchholtz:2004:CCF,
author = "Mikael Buchholtz and Hanne Riis Nielson and Flemming
Nielson",
title = "A calculus for control flow analysis of security
protocols",
journal = j-INT-J-INFO-SEC,
volume = "2",
number = "3--4",
pages = "145--167",
month = aug,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-004-0036-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:23 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-004-0036-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Gorrieri:2004:AAT,
author = "Roberto Gorrieri and Ruggero Lanotte and Andrea
Maggiolo-Schettini and Fabio Martinelli and Simone Tini
and Enrico Tronci",
title = "Automated analysis of timed security: a case study on
web privacy",
journal = j-INT-J-INFO-SEC,
volume = "2",
number = "3--4",
pages = "168--186",
month = aug,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-004-0037-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:23 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-004-0037-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Bartoletti:2004:SIS,
author = "Massimo Bartoletti and Pierpaolo Degano and Gian Luigi
Ferrari",
title = "Stack inspection and secure program transformations",
journal = j-INT-J-INFO-SEC,
volume = "2",
number = "3--4",
pages = "187--217",
month = aug,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-004-0038-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:23 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-004-0038-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{MacKenzie:2004:TPG,
author = "Philip MacKenzie and Michael K. Reiter",
title = "Two-party generation of {DSA} signatures",
journal = j-INT-J-INFO-SEC,
volume = "2",
number = "3--4",
pages = "218--239",
month = aug,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-004-0041-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:23 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-004-0041-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Waidner:2004:P,
author = "Michael Waidner",
title = "Preface",
journal = j-INT-J-INFO-SEC,
volume = "3",
number = "1",
pages = "1--1",
month = oct,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-004-0051-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:23 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-004-0051-y;
http://link.springer.com/content/pdf/10.1007/s10207-004-0051-y.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Hopcroft:2004:ASA,
author = "Philippa Hopcroft and Gavin Lowe",
title = "Analysing a stream authentication protocol using model
checking",
journal = j-INT-J-INFO-SEC,
volume = "3",
number = "1",
pages = "2--13",
month = oct,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-004-0040-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:23 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-004-0040-1",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Biskup:2004:CQE,
author = "Joachim Biskup and Piero Bonatti",
title = "Controlled query evaluation for enforcing
confidentiality in complete information systems",
journal = j-INT-J-INFO-SEC,
volume = "3",
number = "1",
pages = "14--27",
month = oct,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-004-0032-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:23 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-004-0032-1",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Smith:2004:OAP,
author = "Sean W. Smith",
title = "Outbound authentication for programmable secure
coprocessors",
journal = j-INT-J-INFO-SEC,
volume = "3",
number = "1",
pages = "28--41",
month = oct,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-004-0033-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:23 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-004-0033-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Backes:2004:CPN,
author = "Michael Backes and Birgit Pfitzmann",
title = "Computational probabilistic noninterference",
journal = j-INT-J-INFO-SEC,
volume = "3",
number = "1",
pages = "42--60",
month = oct,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-004-0039-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:23 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-004-0039-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Daza:2004:PUI,
author = "Vanesa Daza and Javier Herranz and Germ{\'a}n
S{\'a}ez",
title = "Protocols useful on the {Internet} from distributed
signature schemes",
journal = j-INT-J-INFO-SEC,
volume = "3",
number = "2",
pages = "61--69",
month = nov,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-004-0043-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:23 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-004-0043-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Burgess:2004:GTM,
author = "Mark Burgess and Geoffrey Canright and Kenth
Eng{\o}-Monsen",
title = "A graph-theoretical model of computer security",
journal = j-INT-J-INFO-SEC,
volume = "3",
number = "2",
pages = "70--85",
month = nov,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-004-0044-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:23 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-004-0044-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Hitchcock:2004:ESM,
author = "Yvonne Hitchcock and Paul Montague and Gary Carter and
Ed Dawson",
title = "The efficiency of solving multiple discrete logarithm
problems and the implications for the security of fixed
elliptic curves",
journal = j-INT-J-INFO-SEC,
volume = "3",
number = "2",
pages = "86--98",
month = nov,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-004-0045-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:23 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-004-0045-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Mana:2004:FSE,
author = "Antonio Ma{\~n}a and Javier Lopez and Juan J. Ortega
and Ernesto Pimentel and Jose M. Troya",
title = "A framework for secure execution of software",
journal = j-INT-J-INFO-SEC,
volume = "3",
number = "2",
pages = "99--112",
month = nov,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-004-0048-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:23 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-004-0048-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Abie:2004:DDR,
author = "Habtamu Abie and P{\aa}l Spilling and Bent Foyn",
title = "A distributed digital rights management model for
secure information-distribution systems",
journal = j-INT-J-INFO-SEC,
volume = "3",
number = "2",
pages = "113--128",
month = nov,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-004-0058-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:23 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-004-0058-4",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Autexier:2005:PSI,
author = "Serge Autexier and Iliano Cervesato and Heiko Mantel",
title = "Preface to the special issue of selected papers from
{FCS\slash VERIFY 2002}",
journal = j-INT-J-INFO-SEC,
volume = "4",
number = "1--2",
pages = "1--1",
month = feb,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-004-0053-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:24 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-004-0053-9;
http://link.springer.com/content/pdf/10.1007/s10207-004-0053-9.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Ligatti:2005:EAE,
author = "Jay Ligatti and Lujo Bauer and David Walker",
title = "Edit automata: enforcement mechanisms for run-time
security policies",
journal = j-INT-J-INFO-SEC,
volume = "4",
number = "1--2",
pages = "2--16",
month = feb,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-004-0046-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:24 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-004-0046-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Bella:2005:OVS,
author = "Giampaolo Bella and Fabio Massacci and Lawrence C.
Paulson",
title = "An overview of the verification of {SET}",
journal = j-INT-J-INFO-SEC,
volume = "4",
number = "1--2",
pages = "17--28",
month = feb,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-004-0047-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:24 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-004-0047-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Guttman:2005:RAN,
author = "Joshua D. Guttman and Amy L. Herzog",
title = "Rigorous automated network security management",
journal = j-INT-J-INFO-SEC,
volume = "4",
number = "1--2",
pages = "29--48",
month = feb,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-004-0052-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:24 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-004-0052-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Kusters:2005:DCP,
author = "Ralf K{\"u}sters",
title = "On the decidability of cryptographic protocols with
open-ended data structures",
journal = j-INT-J-INFO-SEC,
volume = "4",
number = "1--2",
pages = "49--70",
month = feb,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-004-0050-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:24 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-004-0050-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Lye:2005:GSN,
author = "Kong-wei Lye and Jeannette M. Wing",
title = "Game strategies in network security",
journal = j-INT-J-INFO-SEC,
volume = "4",
number = "1--2",
pages = "71--86",
month = feb,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-004-0060-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:24 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-004-0060-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Skalka:2005:SUB,
author = "Christian Skalka and Scott Smith",
title = "Static use-based object confinement",
journal = j-INT-J-INFO-SEC,
volume = "4",
number = "1--2",
pages = "87--104",
month = feb,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-004-0049-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:24 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-004-0049-5",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Lhee:2005:DFB,
author = "Kyung-suk Lhee and Steve J. Chapin",
title = "Detection of file-based race conditions",
journal = j-INT-J-INFO-SEC,
volume = "4",
number = "1--2",
pages = "105--119",
month = feb,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-004-0068-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:24 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-004-0068-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Bai:2005:SAP,
author = "Yun Bai and Yan Zhang and Vijay Varadharajan",
title = "On the sequence of authorization policy
transformations",
journal = j-INT-J-INFO-SEC,
volume = "4",
number = "1--2",
pages = "120--131",
month = feb,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-004-0069-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:24 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-004-0069-1",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Snekkenes:2005:PSI,
author = "Einar Snekkenes",
title = "Preface to the special issue on {ESORICS 2003}",
journal = j-INT-J-INFO-SEC,
volume = "4",
number = "3",
pages = "133--134",
month = jun,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-004-0054-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:24 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-004-0054-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Backes:2005:SAS,
author = "Michael Backes and Birgit Pfitzmann and Michael
Waidner",
title = "Symmetric authentication in a simulatable
{Dolev--Yao}-style cryptographic library",
journal = j-INT-J-INFO-SEC,
volume = "4",
number = "3",
pages = "135--154",
month = jun,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-004-0056-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:24 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-004-0056-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{vonOheimb:2005:ASM,
author = "David von Oheimb and Volkmar Lotz and Georg Walter",
title = "Analyzing {SLE 88} memory management security using
{Interacting State Machines}",
journal = j-INT-J-INFO-SEC,
volume = "4",
number = "3",
pages = "155--171",
month = jun,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-004-0057-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:24 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-004-0057-5",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Serjantov:2005:PAA,
author = "Andrei Serjantov and Peter Sewell",
title = "Passive-attack analysis for connection-based anonymity
systems",
journal = j-INT-J-INFO-SEC,
volume = "4",
number = "3",
pages = "172--180",
month = jun,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-004-0059-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:24 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-004-0059-3",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Basin:2005:OSM,
author = "David Basin and Sebastian M{\"o}dersheim and Luca
Vigan{\`o}",
title = "{OFMC}: a symbolic model checker for security
protocols",
journal = j-INT-J-INFO-SEC,
volume = "4",
number = "3",
pages = "181--208",
month = jun,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-004-0055-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:24 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-004-0055-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Trostle:2005:TIS,
author = "Jonathan Trostle and Bill Gossman",
title = "Techniques for improving the security and
manageability of {IPsec} policy",
journal = j-INT-J-INFO-SEC,
volume = "4",
number = "3",
pages = "209--226",
month = jun,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-004-0064-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:24 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-004-0064-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Boyd:2005:PSI,
author = "Colin Boyd and Wenbo Mao",
title = "Preface to the special issue on {ISC 2003}",
journal = j-INT-J-INFO-SEC,
volume = "4",
number = "4",
pages = "227--227",
month = oct,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-004-0066-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:25 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-004-0066-4",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Galindo:2005:FOH,
author = "David Galindo and Sebasti{\`a} Mart{\'\i}n and Paz
Morillo and Jorge L. Villar",
title = "{Fujisaki--Okamoto} hybrid encryption revisited",
journal = j-INT-J-INFO-SEC,
volume = "4",
number = "4",
pages = "228--241",
month = oct,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-004-0042-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:25 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-004-0042-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Backes:2005:RSS,
author = "Michael Backes and Birgit Pfitzmann and Michael
Waidner",
title = "Reactively secure signature schemes",
journal = j-INT-J-INFO-SEC,
volume = "4",
number = "4",
pages = "242--252",
month = oct,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-004-0062-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:25 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-004-0062-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Gurgens:2005:SFN,
author = "Sigrid G{\"u}rgens and Carsten Rudolph and Holger
Vogt",
title = "On the security of fair non-repudiation protocols",
journal = j-INT-J-INFO-SEC,
volume = "4",
number = "4",
pages = "253--262",
month = oct,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-004-0063-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:25 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-004-0063-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Baldwin:2005:ESA,
author = "Adrian Baldwin and Simon Shiu",
title = "Enabling shared audit data",
journal = j-INT-J-INFO-SEC,
volume = "4",
number = "4",
pages = "263--276",
month = oct,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-004-0061-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:25 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-004-0061-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Atallah:2005:SOS,
author = "Mikhail J. Atallah and Jiangtao Li",
title = "Secure outsourcing of sequence comparisons",
journal = j-INT-J-INFO-SEC,
volume = "4",
number = "4",
pages = "277--287",
month = oct,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-005-0070-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:25 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-005-0070-3",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Itakura:2005:PMB,
author = "Yukio Itakura and Shigeo Tsujii",
title = "Proposal on a multifactor biometric authentication
method based on cryptosystem keys containing biometric
signatures",
journal = j-INT-J-INFO-SEC,
volume = "4",
number = "4",
pages = "288--296",
month = oct,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-004-0065-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:25 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-004-0065-5",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Gritzalis:2006:PKI,
author = "Stefanos Gritzalis",
title = "{Public Key Infrastructure}: Research and
Applications",
journal = j-INT-J-INFO-SEC,
volume = "5",
number = "1",
pages = "1--2",
month = jan,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-005-0075-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:25 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-005-0075-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Vanrenen:2006:DSM,
author = "Gabriel Vanrenen and Sean Smith and John Marchesini",
title = "Distributing security-mediated {PKI}",
journal = j-INT-J-INFO-SEC,
volume = "5",
number = "1",
pages = "3--17",
month = jan,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-005-0076-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:25 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-005-0076-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Lioy:2006:PPP,
author = "Antonio Lioy and Marius Marian and Natalia Moltchanova
and Massimiliano Pala",
title = "{PKI} past, present and future",
journal = j-INT-J-INFO-SEC,
volume = "5",
number = "1",
pages = "18--29",
month = jan,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-005-0077-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:25 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-005-0077-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Bohli:2006:KSA,
author = "Jens-Matthias Bohli and Stefan R{\"o}hrich and Rainer
Steinwandt",
title = "Key substitution attacks revisited: Taking into
account malicious signers",
journal = j-INT-J-INFO-SEC,
volume = "5",
number = "1",
pages = "30--36",
month = jan,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-005-0071-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:25 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-005-0071-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Zhou:2006:MTI,
author = "Jianying Zhou and Feng Bao and Robert Deng",
title = "Minimizing {TTP}'s involvement in signature
validation",
journal = j-INT-J-INFO-SEC,
volume = "5",
number = "1",
pages = "37--47",
month = jan,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-005-0072-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:25 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-005-0072-1",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Li:2006:USS,
author = "Ninghui Li and John C. Mitchell",
title = "Understanding {SPKI\slash SDSI} using first-order
logic",
journal = j-INT-J-INFO-SEC,
volume = "5",
number = "1",
pages = "48--64",
month = jan,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-005-0073-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:25 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-005-0073-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Zhou:2006:P,
author = "Jianying Zhou and Javier Lopez",
title = "Preface",
journal = j-INT-J-INFO-SEC,
volume = "5",
number = "2",
pages = "65--66",
month = apr,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-006-0087-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:25 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-006-0087-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Young:2006:CEU,
author = "Adam L. Young",
title = "Cryptoviral extortion using {Microsoft}'s Crypto
{API}",
journal = j-INT-J-INFO-SEC,
volume = "5",
number = "2",
pages = "67--76",
month = apr,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-006-0082-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:25 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-006-0082-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Sidiroglou:2006:ETD,
author = "Stelios Sidiroglou and Angelos D. Keromytis",
title = "Execution transactions for defending against software
failures: use and evaluation",
journal = j-INT-J-INFO-SEC,
volume = "5",
number = "2",
pages = "77--91",
month = apr,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-006-0083-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:25 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-006-0083-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Nali:2006:HTB,
author = "Deholo Nali and Carlisle Adams and Ali Miri",
title = "Hierarchical time-based information release",
journal = j-INT-J-INFO-SEC,
volume = "5",
number = "2",
pages = "92--104",
month = apr,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-006-0084-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:25 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-006-0084-5",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Chakrabarti:2006:KPD,
author = "Dibyendu Chakrabarti and Subhamoy Maitra and Bimal
Roy",
title = "A key pre-distribution scheme for wireless sensor
networks: merging blocks in combinatorial design",
journal = j-INT-J-INFO-SEC,
volume = "5",
number = "2",
pages = "105--114",
month = apr,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-006-0085-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:25 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-006-0085-4",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Yeo:2006:SWE,
author = "Gary S.-W. Yeo and Raphael C.-W. Phan",
title = "On the security of the {WinRAR} encryption feature",
journal = j-INT-J-INFO-SEC,
volume = "5",
number = "2",
pages = "115--123",
month = apr,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-006-0086-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:25 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-006-0086-3",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Mayer:2006:OFA,
author = "Alain Mayer and Avishai Wool and Elisha Ziskind",
title = "Offline firewall analysis",
journal = j-INT-J-INFO-SEC,
volume = "5",
number = "3",
pages = "125--144",
month = jul,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-005-0074-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:26 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-005-0074-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Crescini:2006:PSD,
author = "Vino Fernando Crescini and Yan Zhang",
title = "{PolicyUpdater}: a system for dynamic access control",
journal = j-INT-J-INFO-SEC,
volume = "5",
number = "3",
pages = "145--165",
month = jul,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-005-0078-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:26 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-005-0078-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Tsunoo:2006:ICA,
author = "Yukiyasu Tsunoo and Etsuko Tsujihara and Maki Shigeri
and Hiroyasu Kubo and Kazuhiko Minematsu",
title = "Improving cache attacks by considering cipher
structure",
journal = j-INT-J-INFO-SEC,
volume = "5",
number = "3",
pages = "166--176",
month = jul,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-005-0079-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:26 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-005-0079-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Okeya:2006:SAC,
author = "Katsuyuki Okeya and Tsuyoshi Takagi",
title = "Security analysis of {CRT}-based cryptosystems",
journal = j-INT-J-INFO-SEC,
volume = "5",
number = "3",
pages = "177--185",
month = jul,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-005-0080-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:26 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-005-0080-1",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{vanOorschot:2006:MSD,
author = "Paul C. van Oorschot and Jean-Marc Robert and Miguel
Vargas Martin",
title = "A monitoring system for detecting repeated packets
with applications to computer worms",
journal = j-INT-J-INFO-SEC,
volume = "5",
number = "3",
pages = "186--199",
month = jul,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-006-0081-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:26 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-006-0081-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Brandt:2006:HOF,
author = "Felix Brandt",
title = "How to obtain full privacy in auctions",
journal = j-INT-J-INFO-SEC,
volume = "5",
number = "4",
pages = "201--216",
month = oct,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-006-0001-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:26 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-006-0001-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Al-Riyami:2006:EFE,
author = "S. S. Al-Riyami and J. Malone-Lee and N. P. Smart",
title = "Escrow-free encryption supporting cryptographic
workflow",
journal = j-INT-J-INFO-SEC,
volume = "5",
number = "4",
pages = "217--229",
month = oct,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-006-0002-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:26 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-006-0002-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Ding:2006:CNT,
author = "Jintai Ding and Dieter Schmidt and Zhijun Yin",
title = "Cryptanalysis of the new {TTS} scheme in {CHES 2004}",
journal = j-INT-J-INFO-SEC,
volume = "5",
number = "4",
pages = "231--240",
month = oct,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-006-0003-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:26 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-006-0003-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Nguyen:2006:VSF,
author = "Lan Nguyen and Rei Safavi-Naini and Kaoru Kurosawa",
title = "Verifiable shuffles: a formal model and a
Paillier-based three-round construction with provable
security",
journal = j-INT-J-INFO-SEC,
volume = "5",
number = "4",
pages = "241--255",
month = oct,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-006-0004-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:26 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-006-0004-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Giorgini:2006:RET,
author = "Paolo Giorgini and Fabio Massacci and John Mylopoulos
and Nicola Zannone",
title = "Requirements engineering for trust management: model,
methodology, and reasoning",
journal = j-INT-J-INFO-SEC,
volume = "5",
number = "4",
pages = "257--274",
month = oct,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-006-0005-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:26 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-006-0005-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Clarke:2007:AMP,
author = "N. L. Clarke and S. M. Furnell",
title = "Authenticating mobile phone users using keystroke
analysis",
journal = j-INT-J-INFO-SEC,
volume = "6",
number = "1",
pages = "1--14",
month = jan,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-006-0006-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:26 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-006-0006-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Blundo:2007:LRC,
author = "Carlo Blundo and Clemente Galdi and Giuseppe
Persiano",
title = "Low-randomness constant-round private {XOR}
computations",
journal = j-INT-J-INFO-SEC,
volume = "6",
number = "1",
pages = "15--26",
month = jan,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-006-0007-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:26 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-006-0007-5",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Wang:2007:HDA,
author = "Shujing Wang and Yan Zhang",
title = "Handling distributed authorization with delegation
through answer set programming",
journal = j-INT-J-INFO-SEC,
volume = "6",
number = "1",
pages = "27--46",
month = jan,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-006-0008-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:26 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-006-0008-4",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Konstantinou:2007:EGS,
author = "Elisavet Konstantinou and Yannis C. Stamatiou and
Christos Zaroliagis",
title = "Efficient generation of secure elliptic curves",
journal = j-INT-J-INFO-SEC,
volume = "6",
number = "1",
pages = "47--63",
month = jan,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-006-0009-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:26 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-006-0009-3",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Dimitrakos:2007:GEP,
author = "Theo Dimitrakos and Fabio Martinelli and Peter Y. A.
Ryan and Steve Schneider",
title = "{Guest Editors}' Preface",
journal = j-INT-J-INFO-SEC,
volume = "6",
number = "2--3",
pages = "65--66",
month = mar,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0012-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:27 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0012-3",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Zheng:2007:DSL,
author = "Lantian Zheng and Andrew C. Myers",
title = "Dynamic security labels and static information flow
control",
journal = j-INT-J-INFO-SEC,
volume = "6",
number = "2--3",
pages = "67--84",
month = mar,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0019-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:27 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0019-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{DeFrancesco:2007:ILS,
author = "Nicoletta {De Francesco} and Luca Martini",
title = "Instruction-level security typing by abstract
interpretation",
journal = j-INT-J-INFO-SEC,
volume = "6",
number = "2--3",
pages = "85--106",
month = mar,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0015-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:27 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0015-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Kopf:2007:TTU,
author = "Boris K{\"o}pf and Heiko Mantel",
title = "Transformational typing and unification for
automatically correcting insecure programs",
journal = j-INT-J-INFO-SEC,
volume = "6",
number = "2--3",
pages = "107--131",
month = mar,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0016-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:27 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0016-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Cederquist:2007:ABC,
author = "J. G. Cederquist and R. Corin and M. A. C. Dekker and
S. Etalle and J. I. den Hartog and G. Lenzini",
title = "Audit-based compliance control",
journal = j-INT-J-INFO-SEC,
volume = "6",
number = "2--3",
pages = "133--151",
month = mar,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0017-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:27 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0017-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Krukow:2007:TS,
author = "Karl Krukow and Mogens Nielsen",
title = "Trust structures",
journal = j-INT-J-INFO-SEC,
volume = "6",
number = "2--3",
pages = "153--181",
month = mar,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0014-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:27 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0014-1",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Delicata:2007:AAV,
author = "Rob Delicata and Steve Schneider",
title = "An algebraic approach to the verification of a class
of {Diffie--Hellman} protocols",
journal = j-INT-J-INFO-SEC,
volume = "6",
number = "2--3",
pages = "183--196",
month = mar,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0013-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:27 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0013-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Gritzalis:2007:PMO,
author = "S. Gritzalis and A. N. Yannacopoulos and C.
Lambrinoudakis and P. Hatzopoulos and S. K. Katsikas",
title = "A probabilistic model for optimal insurance contracts
against security risks and privacy violation in {IT}
outsourcing environments",
journal = j-INT-J-INFO-SEC,
volume = "6",
number = "4",
pages = "197--211",
month = jul,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-006-0010-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:27 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-006-0010-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Chen:2007:IBK,
author = "L. Chen and Z. Cheng and N. P. Smart",
title = "Identity-based key agreement protocols from pairings",
journal = j-INT-J-INFO-SEC,
volume = "6",
number = "4",
pages = "213--241",
month = jul,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-006-0011-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:27 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-006-0011-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Bohli:2007:SGK,
author = "Jens-Matthias Bohli and Mar{\'\i}a Isabel Gonz{\'a}lez
Vasco and Rainer Steinwandt",
title = "Secure group key establishment revisited",
journal = j-INT-J-INFO-SEC,
volume = "6",
number = "4",
pages = "243--254",
month = jul,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0018-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:27 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0018-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Bertino:2007:SSP,
author = "Elisa Bertino and Elena Ferrari and Federica Paci and
Loredana Parasiliti Provenza",
title = "A system for securing push-based distribution of {XML}
documents",
journal = j-INT-J-INFO-SEC,
volume = "6",
number = "4",
pages = "255--284",
month = jul,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0020-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:27 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0020-3",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Knight:2007:IJI,
author = "Scott Knight and Scott Buffett and Patrick C. K.
Hung",
title = "The {{\booktitle{International Journal of Information
Security}}} Special Issue on privacy, security and
trust technologies and E-business services",
journal = j-INT-J-INFO-SEC,
volume = "6",
number = "5",
pages = "285--286",
month = sep,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0036-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:27 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0036-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Wu:2007:RFT,
author = "Zhengping Wu and Alfred C. Weaver",
title = "Requirements of federated trust management for
service-oriented architectures",
journal = j-INT-J-INFO-SEC,
volume = "6",
number = "5",
pages = "287--296",
month = sep,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0027-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:27 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0027-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Liu:2007:ICR,
author = "Jinshan Liu and Val{\'e}rie Issarny",
title = "An incentive compatible reputation mechanism for
ubiquitous computing environments",
journal = j-INT-J-INFO-SEC,
volume = "6",
number = "5",
pages = "297--311",
month = sep,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0029-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:27 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0029-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Levin:2007:WSL,
author = "Avner Levin",
title = "Is workplace surveillance legal in {Canada}?",
journal = j-INT-J-INFO-SEC,
volume = "6",
number = "5",
pages = "313--321",
month = sep,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0026-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:27 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0026-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Lauer:2007:BOT,
author = "Thomas W. Lauer and Xiaodong Deng",
title = "Building online trust through privacy practices",
journal = j-INT-J-INFO-SEC,
volume = "6",
number = "5",
pages = "323--331",
month = sep,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0028-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:27 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0028-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Zhang:2007:FBT,
author = "Jie Zhang and Ali A. Ghorbani and Robin Cohen",
title = "A familiarity-based trust model for effective
selection of sellers in multiagent e-commerce systems",
journal = j-INT-J-INFO-SEC,
volume = "6",
number = "5",
pages = "333--344",
month = sep,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0025-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:27 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0025-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Zulkernine:2007:ISS,
author = "Mohammad Zulkernine and Mathews Graves and Muhammad
Umair Ahmed Khan",
title = "Integrating software specifications into intrusion
detection",
journal = j-INT-J-INFO-SEC,
volume = "6",
number = "5",
pages = "345--357",
month = sep,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0023-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:27 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0023-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Backes:2007:P,
author = "Michael Backes and Stefanos Gritzalis and Bart
Preneel",
title = "Preface",
journal = j-INT-J-INFO-SEC,
volume = "6",
number = "6",
pages = "359--360",
month = oct,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0034-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:28 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0034-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Anagnostakis:2007:CDR,
author = "Kostas G. Anagnostakis and Michael B. Greenwald and
Sotiris Ioannidis and Angelos D. Keromytis",
title = "{COVERAGE}: detecting and reacting to worm epidemics
using cooperation and validation",
journal = j-INT-J-INFO-SEC,
volume = "6",
number = "6",
pages = "361--378",
month = oct,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0032-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:28 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0032-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Bononi:2007:IDS,
author = "Luciano Bononi and Carlo Tacconi",
title = "Intrusion detection for secure clustering and routing
in {Mobile Multi-hop Wireless Networks}",
journal = j-INT-J-INFO-SEC,
volume = "6",
number = "6",
pages = "379--392",
month = oct,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0035-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:28 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0035-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Danezis:2007:BFM,
author = "George Danezis",
title = "Breaking four mix-related schemes based on {Universal
Re-encryption}",
journal = j-INT-J-INFO-SEC,
volume = "6",
number = "6",
pages = "393--402",
month = oct,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0033-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:28 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0033-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
keywords = "Anonymous communications; El-Gamal encryption; rWonGoo
anonymous channel; Traffic analysis; Universal
re-encryption",
remark = "From the abstract: ``Universal Re-encryption allows
El-Gamal ciphertexts to be re-encrypted without
knowledge of their corresponding public keys. This has
made it an enticing building block for anonymous
communications protocols. \ldots{} [we] find serious
weaknesses in all of them.''",
}
@Article{Esponda:2007:PDP,
author = "Fernando Esponda and Elena S. Ackley and Paul Helman
and Haixia Jia and Stephanie Forrest",
title = "Protecting data privacy through hard-to-reverse
negative databases",
journal = j-INT-J-INFO-SEC,
volume = "6",
number = "6",
pages = "403--415",
month = oct,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0030-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:28 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0030-1",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Klinkoff:2007:ENS,
author = "Patrick Klinkoff and Engin Kirda and Christopher
Kruegel and Giovanni Vigna",
title = "Extending {.NET} security to unmanaged code",
journal = j-INT-J-INFO-SEC,
volume = "6",
number = "6",
pages = "417--428",
month = oct,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0031-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:28 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0031-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Degano:2008:P,
author = "Pierpaolo Degano and Luca Vigan{\`o}",
title = "Preface",
journal = j-INT-J-INFO-SEC,
volume = "7",
number = "1",
pages = "1--1",
month = jan,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0038-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:28 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0038-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Armando:2008:SBM,
author = "Alessandro Armando and Luca Compagna",
title = "{SAT}-based model-checking for security protocols
analysis",
journal = j-INT-J-INFO-SEC,
volume = "7",
number = "1",
pages = "3--32",
month = jan,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0041-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:28 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0041-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Backes:2008:LBU,
author = "Michael Backes and Birgit Pfitzmann",
title = "Limits of the {BRSIM\slash UC} soundness of
{Dolev--Yao}-style {XOR}",
journal = j-INT-J-INFO-SEC,
volume = "7",
number = "1",
pages = "33--54",
month = jan,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0040-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:28 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0040-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Bracciali:2008:SFM,
author = "Andrea Bracciali and Gianluigi Ferrari and Emilio
Tuosto",
title = "A symbolic framework for multi-faceted security
protocol analysis",
journal = j-INT-J-INFO-SEC,
volume = "7",
number = "1",
pages = "55--84",
month = jan,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0043-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:28 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0043-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Estevez-Tapiador:2008:BRE,
author = "Juan M. Estevez-Tapiador and Almudena Alcaide and
Julio C. Hernandez-Castro and Arturo Ribagorda",
title = "{Bayesian} rational exchange",
journal = j-INT-J-INFO-SEC,
volume = "7",
number = "1",
pages = "85--100",
month = jan,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0039-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:28 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0039-5",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Gollmann:2008:E,
author = "Dieter Gollmann",
title = "Editorial",
journal = j-INT-J-INFO-SEC,
volume = "7",
number = "2",
pages = "101--101",
month = apr,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0052-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:28 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0052-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Alfaro:2008:CAC,
author = "J. G. Alfaro and N. Boulahia-Cuppens and F. Cuppens",
title = "Complete analysis of configuration rules to guarantee
reliable network security policies",
journal = j-INT-J-INFO-SEC,
volume = "7",
number = "2",
pages = "103--122",
month = apr,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0045-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:28 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0045-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Crampton:2008:DRB,
author = "Jason Crampton and Hemanth Khambhammettu",
title = "Delegation in role-based access control",
journal = j-INT-J-INFO-SEC,
volume = "7",
number = "2",
pages = "123--136",
month = apr,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0044-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:28 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0044-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Fong:2008:DCC,
author = "Philip W. L. Fong",
title = "Discretionary capability confinement",
journal = j-INT-J-INFO-SEC,
volume = "7",
number = "2",
pages = "137--154",
month = apr,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0047-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:28 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0047-5",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Backes:2008:CRS,
author = "Michael Backes and Markus D{\"u}rmuth and Dennis
Hofheinz and Ralf K{\"u}sters",
title = "Conditional reactive simulatability",
journal = j-INT-J-INFO-SEC,
volume = "7",
number = "2",
pages = "155--169",
month = apr,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0046-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:28 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0046-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Huang:2008:SUD,
author = "Xinyi Huang and Willy Susilo and Yi Mu and Wei Wu",
title = "Secure universal designated verifier signature without
random oracles",
journal = j-INT-J-INFO-SEC,
volume = "7",
number = "3",
pages = "171--183",
month = jun,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0021-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:29 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0021-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Chen:2008:IID,
author = "Pei-Te Chen and Chi-Sung Laih",
title = "{IDSIC}: an intrusion detection system with
identification capability",
journal = j-INT-J-INFO-SEC,
volume = "7",
number = "3",
pages = "185--197",
month = jun,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0024-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:29 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0024-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Biskup:2008:KSI,
author = "Joachim Biskup and Torben Weibert",
title = "Keeping secrets in incomplete databases",
journal = j-INT-J-INFO-SEC,
volume = "7",
number = "3",
pages = "199--217",
month = jun,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0037-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:29 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0037-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Aldini:2008:EMI,
author = "Alessandro Aldini and Alessandra {Di Pierro}",
title = "Estimating the maximum information leakage",
journal = j-INT-J-INFO-SEC,
volume = "7",
number = "3",
pages = "219--242",
month = jun,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0050-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:29 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0050-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Wang:2008:MLF,
author = "XiaoFeng Wang and Michael K. Reiter",
title = "A multi-layer framework for puzzle-based
denial-of-service defense",
journal = j-INT-J-INFO-SEC,
volume = "7",
number = "4",
pages = "243--263",
month = aug,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0042-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:29 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0042-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Tartary:2008:CAM,
author = "Christophe Tartary and Huaxiong Wang and Josef
Pieprzyk",
title = "A coding approach to the multicast stream
authentication problem",
journal = j-INT-J-INFO-SEC,
volume = "7",
number = "4",
pages = "265--283",
month = aug,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0048-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:29 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0048-4",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Cuppens:2008:MCS,
author = "Fr{\'e}d{\'e}ric Cuppens and Nora Cuppens-Boulahia",
title = "Modeling contextual security policies",
journal = j-INT-J-INFO-SEC,
volume = "7",
number = "4",
pages = "285--305",
month = aug,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0051-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:29 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0051-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Aimeur:2008:LPP,
author = "Esma A{\"\i}meur and Gilles Brassard and Jos{\'e} M.
Fernandez and Flavien Serge Mani Onana",
title = "{{\sc Alambic}}: a privacy-preserving recommender
system for electronic commerce",
journal = j-INT-J-INFO-SEC,
volume = "7",
number = "5",
pages = "307--334",
month = oct,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0049-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:29 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0049-3",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Corbett:2008:PCW,
author = "Cherita L. Corbett and Raheem A. Beyah and John A.
Copeland",
title = "Passive classification of wireless {NICs} during
active scanning",
journal = j-INT-J-INFO-SEC,
volume = "7",
number = "5",
pages = "335--348",
month = oct,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0053-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:29 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0053-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Dent:2008:SCE,
author = "Alexander W. Dent",
title = "A survey of certificateless encryption schemes and
security models",
journal = j-INT-J-INFO-SEC,
volume = "7",
number = "5",
pages = "349--377",
month = oct,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-008-0055-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:29 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-008-0055-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Zhao:2008:NAP,
author = "Chang-An Zhao and Fangguo Zhang and Jiwu Huang",
title = "A note on the {Ate} pairing",
journal = j-INT-J-INFO-SEC,
volume = "7",
number = "6",
pages = "379--382",
month = nov,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-008-0054-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:30 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-008-0054-1",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Imamoto:2008:AEC,
author = "Kenji Imamoto and Jianying Zhou and Kouichi Sakurai",
title = "Achieving evenhandedness in certified email system for
contract signing",
journal = j-INT-J-INFO-SEC,
volume = "7",
number = "6",
pages = "383--394",
month = nov,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-008-0056-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:30 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-008-0056-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Balopoulos:2008:SIP,
author = "Theodoros Balopoulos and Stefanos Gritzalis and
Sokratis K. Katsikas",
title = "Specifying and implementing privacy-preserving
cryptographic protocols",
journal = j-INT-J-INFO-SEC,
volume = "7",
number = "6",
pages = "395--420",
month = nov,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-008-0057-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:30 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-008-0057-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Bryans:2008:OGT,
author = "Jeremy W. Bryans and Maciej Koutny and Laurent
Mazar{\'e} and Peter Y. A. Ryan",
title = "Opacity generalised to transition systems",
journal = j-INT-J-INFO-SEC,
volume = "7",
number = "6",
pages = "421--435",
month = nov,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-008-0058-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:30 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-008-0058-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Lu:2009:RKR,
author = "Jiqiang Lu",
title = "Related-key rectangle attack on 36 rounds of the
{XTEA} block cipher",
journal = j-INT-J-INFO-SEC,
volume = "8",
number = "1",
pages = "1--11",
month = feb,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-008-0059-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:30 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-008-0059-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Yoshino:2009:BMM,
author = "Masayuki Yoshino and Katsuyuki Okeya and Camille
Vuillaume",
title = "Bipartite modular multiplication with twice the
bit-length of multipliers",
journal = j-INT-J-INFO-SEC,
volume = "8",
number = "1",
pages = "13--23",
month = feb,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-008-0060-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:30 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-008-0060-3",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Tian:2009:LSN,
author = "Daxin Tian and Yanheng Liu and Yang Xiang",
title = "Large-scale network intrusion detection based on
distributed learning algorithm",
journal = j-INT-J-INFO-SEC,
volume = "8",
number = "1",
pages = "25--35",
month = feb,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-008-0061-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:30 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-008-0061-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Cheng:2009:CKA,
author = "Jiin-Chiou Cheng and Chi-Sung Laih",
title = "Conference key agreement protocol with non-interactive
fault-tolerance over broadcast network",
journal = j-INT-J-INFO-SEC,
volume = "8",
number = "1",
pages = "37--48",
month = feb,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-008-0062-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:30 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-008-0062-1",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Mashatan:2009:ITC,
author = "Atefeh Mashatan and Douglas R. Stinson",
title = "Interactive two-channel message authentication based
on {Interactive--Collision Resistant} hash functions",
journal = j-INT-J-INFO-SEC,
volume = "8",
number = "1",
pages = "49--60",
month = feb,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-008-0063-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:30 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/hash.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-008-0063-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
keywords = "Interactive--Collision Resistant (ICR) hash function",
}
@Article{Narasimha:2009:PPR,
author = "M. Narasimha and J. Solis and G. Tsudik",
title = "Privacy-preserving revocation checking",
journal = j-INT-J-INFO-SEC,
volume = "8",
number = "1",
pages = "61--75",
month = feb,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-008-0064-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:30 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-008-0064-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Elmufti:2009:MWS,
author = "Kalid Elmufti and Dasun Weerasinghe and M. Rajarajan
and Veselin Rakocevic and Sanowar Khan and John A.
MacDonald",
title = "Mobile {Web} services authentication using {SAML} and
{3GPP} generic bootstrapping architecture",
journal = j-INT-J-INFO-SEC,
volume = "8",
number = "2",
pages = "77--87",
month = apr,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-008-0065-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:30 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-008-0065-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Li:2009:DSA,
author = "Jiangtao Li and Ninghui Li and XiaoFeng Wang and Ting
Yu",
title = "Denial of service attacks and defenses in
decentralized trust management",
journal = j-INT-J-INFO-SEC,
volume = "8",
number = "2",
pages = "89--101",
month = apr,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-008-0068-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:30 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-008-0068-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Quinn:2009:AAE,
author = "Karl Quinn and David Lewis and Declan O'Sullivan and
Vincent P. Wade",
title = "An analysis of accuracy experiments carried out over
of a multi-faceted model of trust",
journal = j-INT-J-INFO-SEC,
volume = "8",
number = "2",
pages = "103--119",
month = apr,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-008-0069-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:30 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-008-0069-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Vasserman:2009:IKN,
author = "Eugene Y. Vasserman and Nicholas Hopper and James
Tyra",
title = "{{\sc SilentKnock}}: practical, provably undetectable
authentication",
journal = j-INT-J-INFO-SEC,
volume = "8",
number = "2",
pages = "121--135",
month = apr,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-008-0070-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:30 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-008-0070-1",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Chadwick:2009:ASX,
author = "David W. Chadwick and Sassa Otenko and Tuan Anh
Nguyen",
title = "Adding support to {XACML} for multi-domain user to
user dynamic delegation of authority",
journal = j-INT-J-INFO-SEC,
volume = "8",
number = "2",
pages = "137--152",
month = apr,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-008-0073-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:30 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-008-0073-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Wu:2009:IDV,
author = "Yu-Sung Wu and Vinita Apte and Saurabh Bagchi and
Sachin Garg and Navjot Singh",
title = "Intrusion detection in voice over {IP} environments",
journal = j-INT-J-INFO-SEC,
volume = "8",
number = "3",
pages = "153--172",
month = jun,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-008-0071-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:31 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-008-0071-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Kuper:2009:GXS,
author = "Gabriel Kuper and Fabio Massacci and Nataliya
Rassadko",
title = "Generalized {XML} security views",
journal = j-INT-J-INFO-SEC,
volume = "8",
number = "3",
pages = "173--203",
month = jun,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-008-0074-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:31 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-008-0074-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Harn:2009:EIB,
author = "Lein Harn and Jian Ren and Changlu Lin",
title = "Efficient identity-based {GQ} multisignatures",
journal = j-INT-J-INFO-SEC,
volume = "8",
number = "3",
pages = "205--210",
month = jun,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-008-0072-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:31 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-008-0072-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Cook:2009:EBC,
author = "Debra L. Cook and Moti Yung and Angelos D. Keromytis",
title = "Elastic block ciphers: method, security and
instantiations",
journal = j-INT-J-INFO-SEC,
volume = "8",
number = "3",
pages = "211--231",
month = jun,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-008-0075-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:31 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-008-0075-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Sourour:2009:ESD,
author = "Meharouech Sourour and Bouhoula Adel and Abbes Tarek",
title = "Ensuring security in depth based on heterogeneous
network security technologies",
journal = j-INT-J-INFO-SEC,
volume = "8",
number = "4",
pages = "233--246",
month = aug,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-009-0077-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:31 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-009-0077-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Desoky:2009:LLB,
author = "Abdelrahman Desoky",
title = "{Listega}: list-based steganography methodology",
journal = j-INT-J-INFO-SEC,
volume = "8",
number = "4",
pages = "247--261",
month = aug,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-009-0079-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:31 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-009-0079-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
keywords = "List-Based Steganography Methodology (Listega)",
}
@Article{Lee:2009:RTB,
author = "Sangho Lee and Jong Kim and Sung Je Hong",
title = "Redistributing time-based rights between consumer
devices for content sharing in {DRM} system",
journal = j-INT-J-INFO-SEC,
volume = "8",
number = "4",
pages = "263--273",
month = aug,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-009-0082-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:31 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-009-0082-5",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Shay:2009:CST,
author = "Richard Shay and Elisa Bertino",
title = "A comprehensive simulation tool for the analysis of
password policies",
journal = j-INT-J-INFO-SEC,
volume = "8",
number = "4",
pages = "275--289",
month = aug,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-009-0084-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:31 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-009-0084-3",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Koshutanski:2009:EGS,
author = "Hristo Koshutanski and Aliaksandr Lazouski and Fabio
Martinelli and Paolo Mori",
title = "Enhancing grid security by fine-grained behavioral
control and negotiation-based authorization",
journal = j-INT-J-INFO-SEC,
volume = "8",
number = "4",
pages = "291--314",
month = aug,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-009-0083-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:31 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-009-0083-4",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Brickell:2009:SSN,
author = "Ernie Brickell and Liqun Chen and Jiangtao Li",
title = "Simplified security notions of direct anonymous
attestation and a concrete scheme from pairings",
journal = j-INT-J-INFO-SEC,
volume = "8",
number = "5",
pages = "315--330",
month = oct,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-009-0076-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:31 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-009-0076-3",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Esponda:2009:NRI,
author = "Fernando Esponda and Stephanie Forrest and Paul
Helman",
title = "Negative representations of information",
journal = j-INT-J-INFO-SEC,
volume = "8",
number = "5",
pages = "331--345",
month = oct,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-009-0078-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:31 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-009-0078-1",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Hasegawa:2009:PFC,
author = "Shingo Hasegawa and Shuji Isobe and Hiroki Shizuya and
Katsuhiro Tashiro",
title = "On the pseudo-freeness and the {CDH} assumption",
journal = j-INT-J-INFO-SEC,
volume = "8",
number = "5",
pages = "347--355",
month = oct,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-009-0087-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:31 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-009-0087-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Geron:2009:CCR,
author = "Erel Geron and Avishai Wool",
title = "{CRUST}: cryptographic remote untrusted storage
without public keys",
journal = j-INT-J-INFO-SEC,
volume = "8",
number = "5",
pages = "357--377",
month = oct,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-009-0081-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:31 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-009-0081-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Qin:2009:SSS,
author = "Huawang Qin and Yuewei Dai and Zhiquan Wang",
title = "A secret sharing scheme based on $ (t, n) $ threshold
and adversary structure",
journal = j-INT-J-INFO-SEC,
volume = "8",
number = "5",
pages = "379--385",
month = oct,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-009-0085-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:31 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-009-0085-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Chiasson:2009:UID,
author = "Sonia Chiasson and Alain Forget and Robert Biddle and
P. C. van Oorschot",
title = "User interface design affects security: patterns in
click-based graphical passwords",
journal = j-INT-J-INFO-SEC,
volume = "8",
number = "6",
pages = "387--398",
month = dec,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-009-0080-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:32 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-009-0080-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Hammer:2009:FSC,
author = "Christian Hammer and Gregor Snelting",
title = "Flow-sensitive, context-sensitive, and
object-sensitive information flow control based on
program dependence graphs",
journal = j-INT-J-INFO-SEC,
volume = "8",
number = "6",
pages = "399--422",
month = dec,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-009-0086-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:32 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-009-0086-1",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{An:2009:UIC,
author = "Xiangdong An and Dawn Jutla and Nick Cercone and
Charnyote Pluempitiwiriyawej and Hai Wang",
title = "Uncertain inference control in privacy protection",
journal = j-INT-J-INFO-SEC,
volume = "8",
number = "6",
pages = "423--431",
month = dec,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-009-0088-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:32 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-009-0088-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Sajedi:2009:SSB,
author = "Hedieh Sajedi and Mansour Jamzad",
title = "Secure steganography based on embedding capacity",
journal = j-INT-J-INFO-SEC,
volume = "8",
number = "6",
pages = "433--445",
month = dec,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-009-0089-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:32 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-009-0089-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Plaga:2009:BKS,
author = "Rainer Plaga",
title = "Biometric keys: suitable use cases and achievable
information content",
journal = j-INT-J-INFO-SEC,
volume = "8",
number = "6",
pages = "447--454",
month = dec,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-009-0090-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:32 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-009-0090-5",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Kozina:2009:MIW,
author = "Mario Kozina and Marin Golub and Stjepan Gros",
title = "A method for identifying {Web} applications",
journal = j-INT-J-INFO-SEC,
volume = "8",
number = "6",
pages = "455--467",
month = dec,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-009-0092-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:32 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-009-0092-3",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Zheng:2010:AAB,
author = "Ruijuan Zheng and Mingchuan Zhang and Qingtao Wu and
Shibao Sun and Jiexin Pu",
title = "Analysis and application of {Bio-Inspired Multi-Net
Security Model}",
journal = j-INT-J-INFO-SEC,
volume = "9",
number = "1",
pages = "1--17",
month = feb,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-009-0091-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:32 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-009-0091-4",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Han:2010:CBI,
author = "Shui-Hua Han and Chao-Hsien Chu",
title = "Content-based image authentication: current status,
issues, and challenges",
journal = j-INT-J-INFO-SEC,
volume = "9",
number = "1",
pages = "19--32",
month = feb,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-009-0093-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:32 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-009-0093-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Goldschlag:2010:THB,
author = "David M. Goldschlag and Stuart G. Stubblebine and Paul
F. Syverson",
title = "Temporarily hidden bit commitment and lottery
applications",
journal = j-INT-J-INFO-SEC,
volume = "9",
number = "1",
pages = "33--50",
month = feb,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-009-0094-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:32 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-009-0094-1",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Chakraborty:2010:CDB,
author = "Anindya Chakraborty and Arun K. Majumdar and Shamik
Sural",
title = "A column dependency-based approach for static and
dynamic recovery of databases from malicious
transactions",
journal = j-INT-J-INFO-SEC,
volume = "9",
number = "1",
pages = "51--67",
month = feb,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-009-0095-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:32 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-009-0095-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Bayly:2010:FBS,
author = "Duncan Bayly and Maurice Castro and Arathi Arakala and
Jason Jeffers and Kathy Horadam",
title = "Fractional biometrics: safeguarding privacy in
biometric applications",
journal = j-INT-J-INFO-SEC,
volume = "9",
number = "1",
pages = "69--82",
month = feb,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-009-0096-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:32 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-009-0096-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Bella:2010:PGA,
author = "Giampaolo Bella",
title = "The principle of guarantee availability for security
protocol analysis",
journal = j-INT-J-INFO-SEC,
volume = "9",
number = "2",
pages = "83--97",
month = apr,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-009-0097-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:32 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-009-0097-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{deAlbuquerque:2010:FVA,
author = "Jo{\~a}o Porto de Albuquerque and Heiko Krumm and
Paulo L{\'\i}cio de Geus",
title = "Formal validation of automated policy refinement in
the management of network security systems",
journal = j-INT-J-INFO-SEC,
volume = "9",
number = "2",
pages = "99--125",
month = apr,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-010-0101-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:32 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-010-0101-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Knudsen:2010:CEA,
author = "Lars R. Knudsen and Charlotte V. Miolane",
title = "Counting equations in algebraic attacks on block
ciphers",
journal = j-INT-J-INFO-SEC,
volume = "9",
number = "2",
pages = "127--135",
month = apr,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-009-0099-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:32 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-009-0099-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Gauravaram:2010:HFU,
author = "Praveen Gauravaram and John Kelsey and Lars R. Knudsen
and S{\o}ren S. Thomsen",
title = "On hash functions using checksums",
journal = j-INT-J-INFO-SEC,
volume = "9",
number = "2",
pages = "137--151",
month = apr,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-009-0100-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:32 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/hash.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-009-0100-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
remark = "From the abstract: ``We analyse the security of
iterated hash functions that compute an input dependent
checksum which is processed as part of the hash
computation. We show that a large class of such
schemes, including those using non-linear or even
one-way checksum functions, is not secure against the
second preimage attack of Kelsey and Schneier, the
herding attack of Kelsey and Kohno and the
multicollision attack of Joux. Our attacks also apply
to a large class of cascaded hash functions.''",
}
@Article{Lin:2010:MTE,
author = "Ching Lin and Vijay Varadharajan",
title = "{MobileTrust}: a trust enhanced security architecture
for mobile agent systems",
journal = j-INT-J-INFO-SEC,
volume = "9",
number = "3",
pages = "153--178",
month = jun,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-009-0098-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:33 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-009-0098-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Kundu:2010:DID,
author = "Amlan Kundu and Shamik Sural and A. K. Majumdar",
title = "Database intrusion detection using sequence
alignment",
journal = j-INT-J-INFO-SEC,
volume = "9",
number = "3",
pages = "179--191",
month = jun,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-010-0102-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:33 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-010-0102-5",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Buhan:2010:ERC,
author = "Ileana Buhan and Jeroen Doumen and Pieter Hartel and
Qian Tang and Raymond Veldhuis",
title = "Embedding renewable cryptographic keys into noisy
data",
journal = j-INT-J-INFO-SEC,
volume = "9",
number = "3",
pages = "193--208",
month = jun,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-010-0103-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:33 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-010-0103-4",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Ben-Ghorbel-Talbi:2010:DME,
author = "Meriam Ben-Ghorbel-Talbi and Fr{\'e}d{\'e}ric Cuppens
and Nora Cuppens-Boulahia and Adel Bouhoula",
title = "A delegation model for extended {RBAC}",
journal = j-INT-J-INFO-SEC,
volume = "9",
number = "3",
pages = "209--236",
month = jun,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-010-0104-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:33 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-010-0104-3",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Ding:2010:NHA,
author = "Xuhua Ding and Yanjiang Yang and Robert H. Deng and
Shuhong Wang",
title = "A new hardware-assisted {PIR} with {$ O(n) $} shuffle
cost",
journal = j-INT-J-INFO-SEC,
volume = "9",
number = "4",
pages = "237--252",
month = aug,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-010-0105-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:33 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-010-0105-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
keywords = "private information retrieval (PIR)",
}
@Article{Lin:2010:ECE,
author = "Dan Lin and Prathima Rao and Elisa Bertino and Ninghui
Li and Jorge Lobo",
title = "{EXAM}: a comprehensive environment for the analysis
of access control policies",
journal = j-INT-J-INFO-SEC,
volume = "9",
number = "4",
pages = "253--273",
month = aug,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-010-0106-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:33 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-010-0106-1",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Pais:2010:NPR,
author = "Alwyn R. Pais and Shankar Joshi",
title = "A new probabilistic rekeying method for secure
multicast groups",
journal = j-INT-J-INFO-SEC,
volume = "9",
number = "4",
pages = "275--286",
month = aug,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-010-0108-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:33 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-010-0108-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Liu:2010:EOO,
author = "Joseph K. Liu and Joonsang Baek and Jianying Zhou and
Yanjiang Yang and Jun Wen Wong",
title = "Efficient online\slash offline identity-based
signature for wireless sensor network",
journal = j-INT-J-INFO-SEC,
volume = "9",
number = "4",
pages = "287--296",
month = aug,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-010-0109-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:33 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-010-0109-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Yuen:2010:HCI,
author = "Tsz Hon Yuen and Willy Susilo and Yi Mu",
title = "How to construct identity-based signatures without the
key escrow problem",
journal = j-INT-J-INFO-SEC,
volume = "9",
number = "4",
pages = "297--311",
month = aug,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-010-0110-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:33 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-010-0110-5",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Dupasquier:2010:AIL,
author = "Beno{\^\i}t Dupasquier and Stefan Burschka and Kieran
McLaughlin and Sakir Sezer",
title = "Analysis of information leakage from encrypted {Skype}
conversations",
journal = j-INT-J-INFO-SEC,
volume = "9",
number = "5",
pages = "313--325",
month = oct,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-010-0111-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:33 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-010-0111-4",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Skoric:2010:FDS,
author = "Boris Skori{\'c} and Marc X. Makkes",
title = "Flowchart description of security primitives for
controlled physical unclonable functions",
journal = j-INT-J-INFO-SEC,
volume = "9",
number = "5",
pages = "327--335",
month = oct,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-010-0113-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:33 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-010-0113-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Sajedi:2010:UCT,
author = "Hedieh Sajedi and Mansour Jamzad",
title = "Using contourlet transform and cover selection for
secure steganography",
journal = j-INT-J-INFO-SEC,
volume = "9",
number = "5",
pages = "337--352",
month = oct,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-010-0112-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:33 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-010-0112-3",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Chen:2010:HSS,
author = "Haiyong Chen and Hailiang Chen",
title = "A hybrid scheme for securing fingerprint templates",
journal = j-INT-J-INFO-SEC,
volume = "9",
number = "5",
pages = "353--361",
month = oct,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-010-0114-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:33 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-010-0114-1",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Baek:2010:RAR,
author = "Yoo-Jin Baek",
title = "Regular $ 2^w$-ary right-to-left exponentiation
algorithm with very efficient {DPA} and {FA}
countermeasures",
journal = j-INT-J-INFO-SEC,
volume = "9",
number = "5",
pages = "363--370",
month = oct,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-010-0118-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:33 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-010-0118-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Damgaard:2010:GPP,
author = "Ivan Damg{\aa}rd and Mads Jurik and Jesper Buus
Nielsen",
title = "A generalization of {Paillier}'s public-key system
with applications to electronic voting",
journal = j-INT-J-INFO-SEC,
volume = "9",
number = "6",
pages = "371--385",
month = dec,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-010-0119-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:34 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-010-0119-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{MacKenzie:2010:PAK,
author = "Philip MacKenzie and Sarvar Patel and Ram
Swaminathan",
title = "Password-authenticated key exchange based on {RSA}",
journal = j-INT-J-INFO-SEC,
volume = "9",
number = "6",
pages = "387--410",
month = dec,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-010-0120-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:34 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-010-0120-3",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Naor:2010:ETR,
author = "Moni Naor and Benny Pinkas",
title = "Efficient trace and revoke schemes",
journal = j-INT-J-INFO-SEC,
volume = "9",
number = "6",
pages = "411--424",
month = dec,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-010-0121-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:34 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-010-0121-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Baumgarten:2011:CSH,
author = "Alex Baumgarten and Michael Steffen and Matthew
Clausman and Joseph Zambreno",
title = "A case study in hardware {Trojan} design and
implementation",
journal = j-INT-J-INFO-SEC,
volume = "10",
number = "1",
pages = "1--14",
month = feb,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-010-0115-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:34 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-010-0115-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Lim:2011:IBC,
author = "Hoon Wei Lim and Kenneth G. Paterson",
title = "Identity-based cryptography for grid security",
journal = j-INT-J-INFO-SEC,
volume = "10",
number = "1",
pages = "15--32",
month = feb,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-010-0116-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:34 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-010-0116-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Peng:2011:MOS,
author = "Kun Peng and Ed Dawson and Feng Bao",
title = "Modification and optimisation of a shuffling scheme:
stronger security, formal analysis and higher
efficiency",
journal = j-INT-J-INFO-SEC,
volume = "10",
number = "1",
pages = "33--47",
month = feb,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-010-0117-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:34 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-010-0117-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Peng:2011:GEC,
author = "Kun Peng",
title = "A general and efficient countermeasure to relation
attacks in mix-based e-voting",
journal = j-INT-J-INFO-SEC,
volume = "10",
number = "1",
pages = "49--60",
month = feb,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-010-0122-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:34 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-010-0122-1",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Anonymous:2011:P,
author = "Anonymous",
title = "Preface",
journal = j-INT-J-INFO-SEC,
volume = "10",
number = "2",
pages = "61--61",
month = jun,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-011-0134-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:35 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-011-0134-5;
http://link.springer.com/content/pdf/10.1007/s10207-011-0134-5.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Coker:2011:PRA,
author = "George Coker and Joshua Guttman and Peter Loscocco and
Amy Herzog and Jonathan Millen and Brian O'Hanlon and
John Ramsdell and Ariel Segall and Justin Sheehy and
Brian Sniffen",
title = "Principles of remote attestation",
journal = j-INT-J-INFO-SEC,
volume = "10",
number = "2",
pages = "63--81",
month = jun,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-011-0124-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:35 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-011-0124-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{DiPierro:2011:PTC,
author = "Alessandra {Di Pierro} and Chris Hankin and Herbert
Wiklicky",
title = "Probabilistic timing covert channels: to close or not
to close?",
journal = j-INT-J-INFO-SEC,
volume = "10",
number = "2",
pages = "83--106",
month = jun,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-010-0107-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:35 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-010-0107-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Backes:2011:CSS,
author = "Michael Backes and Iliano Cervesato and Aaron D.
Jaggard and Andre Scedrov and Joe-Kai Tsay",
title = "Cryptographically sound security proofs for basic and
public-key {Kerberos}",
journal = j-INT-J-INFO-SEC,
volume = "10",
number = "2",
pages = "107--134",
month = jun,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-011-0125-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:35 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-011-0125-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Anonymous:2011:SIS,
author = "Anonymous",
title = "Special issue on ``{SCADA} and control system
security''",
journal = j-INT-J-INFO-SEC,
volume = "10",
number = "2",
pages = "135--136",
month = jun,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-011-0128-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:35 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-011-0128-3",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Crampton:2011:UFC,
author = "Jason Crampton and Hoon Wei Lim and Kenneth G.
Paterson and Geraint Price",
title = "User-friendly and certificate-free grid security
infrastructure",
journal = j-INT-J-INFO-SEC,
volume = "10",
number = "3",
pages = "137--153",
month = jun,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-011-0123-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:35 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-011-0123-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Zhu:2011:SLA,
author = "Wen Tao Zhu and Yang Xiang and Jianying Zhou and
Robert H. Deng and Feng Bao",
title = "Secure localization with attack detection in wireless
sensor networks",
journal = j-INT-J-INFO-SEC,
volume = "10",
number = "3",
pages = "155--171",
month = jun,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-011-0127-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:35 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-011-0127-4",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Roelse:2011:DST,
author = "Peter Roelse",
title = "Dynamic subtree tracing and its application in
pay-{TV} systems",
journal = j-INT-J-INFO-SEC,
volume = "10",
number = "3",
pages = "173--187",
month = jun,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-011-0126-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:35 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
note = "See erratum \cite{Roelse:2011:EDS}.",
URL = "http://link.springer.com/article/10.1007/s10207-011-0126-5",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Kate:2011:GCB,
author = "Aniket Kate and Ian Goldberg",
title = "Generalizing cryptosystems based on the subset sum
problem",
journal = j-INT-J-INFO-SEC,
volume = "10",
number = "3",
pages = "189--199",
month = jun,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-011-0129-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:35 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-011-0129-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Ustaoglu:2011:IIB,
author = "Berkant Ustao{\u{g}}lu",
title = "Integrating identity-based and certificate-based
authenticated key exchange protocols",
journal = j-INT-J-INFO-SEC,
volume = "10",
number = "4",
pages = "201--212",
month = aug,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-011-0136-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:35 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-011-0136-3",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Saxena:2011:DRE,
author = "Nitesh Saxena and Jonathan Voris",
title = "Data remanence effects on memory-based entropy
collection for {RFID} systems",
journal = j-INT-J-INFO-SEC,
volume = "10",
number = "4",
pages = "213--222",
month = aug,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-011-0139-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:35 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-011-0139-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Bouzida:2011:CAB,
author = "Yacine Bouzida and Luigi Logrippo and Serge
Mankovski",
title = "Concrete- and abstract-based access control",
journal = j-INT-J-INFO-SEC,
volume = "10",
number = "4",
pages = "223--238",
month = aug,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-011-0138-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:35 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-011-0138-1",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Bielova:2011:DYR,
author = "Nataliia Bielova and Fabio Massacci",
title = "Do you really mean what you actually enforced?",
journal = j-INT-J-INFO-SEC,
volume = "10",
number = "4",
pages = "239--254",
month = aug,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-011-0137-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:35 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-011-0137-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Hanley:2011:UTD,
author = "Neil Hanley and Michael Tunstall and William P.
Marnane",
title = "Using templates to distinguish multiplications from
squaring operations",
journal = j-INT-J-INFO-SEC,
volume = "10",
number = "4",
pages = "255--266",
month = aug,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-011-0135-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:35 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-011-0135-4",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Jajodia:2011:MGE,
author = "Sushil Jajodia and Jianying Zhou",
title = "Message from the {Guest Editors}",
journal = j-INT-J-INFO-SEC,
volume = "10",
number = "5",
pages = "267--268",
month = oct,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-011-0131-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:36 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-011-0131-8;
http://link.springer.com/content/pdf/10.1007/s10207-011-0131-8.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Kong:2011:SSA,
author = "Deguang Kong and Yoon-Chan Jhi and Tao Gong and Sencun
Zhu and Peng Liu and Hongsheng Xi",
title = "{SAS}: semantics aware signature generation for
polymorphic worm detection",
journal = j-INT-J-INFO-SEC,
volume = "10",
number = "5",
pages = "269--283",
month = oct,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-011-0132-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:36 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-011-0132-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Chang:2011:EHS,
author = "Ee-Chien Chang and Liming Lu and Yongzheng Wu and
Roland H. C. Yap and Jie Yu",
title = "Enhancing host security using external environment
sensors",
journal = j-INT-J-INFO-SEC,
volume = "10",
number = "5",
pages = "285--299",
month = oct,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-011-0130-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:36 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-011-0130-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Marconi:2011:CPE,
author = "Luciana Marconi and Mauro Conti and Roberto {Di
Pietro}",
title = "{CASSANDRA}: a probabilistic, efficient, and
privacy-preserving solution to compute set
intersection",
journal = j-INT-J-INFO-SEC,
volume = "10",
number = "5",
pages = "301--319",
month = oct,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-011-0133-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:36 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-011-0133-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Gyorffy:2011:TBG,
author = "John Charles Gyorffy and Andrew F. Tappenden and James
Miller",
title = "Token-based graphical password authentication",
journal = j-INT-J-INFO-SEC,
volume = "10",
number = "6",
pages = "321--336",
month = nov,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-011-0147-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:36 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-011-0147-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Glisson:2011:ERW,
author = "William Bradley Glisson and Tim Storer and Gavin
Mayall and Iain Moug and George Grispos",
title = "Electronic retention: what does your mobile phone
reveal about you?",
journal = j-INT-J-INFO-SEC,
volume = "10",
number = "6",
pages = "337--349",
month = nov,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-011-0144-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:36 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-011-0144-3",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Garcia:2011:SID,
author = "Sergio S{\'a}nchez Garc{\'\i}a and Ana G{\'o}mez Oliva
and Emilia P{\'e}rez Belleboni and Iv{\'a}n Pau de la
Cruz",
title = "Solving identity delegation problem in the
e-government environment",
journal = j-INT-J-INFO-SEC,
volume = "10",
number = "6",
pages = "351--372",
month = nov,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-011-0140-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:36 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-011-0140-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Huang:2011:ESD,
author = "Qiong Huang and Guomin Yang and Duncan S. Wong and
Willy Susilo",
title = "Efficient strong designated verifier signature schemes
without random oracle or with non-delegatability",
journal = j-INT-J-INFO-SEC,
volume = "10",
number = "6",
pages = "373--385",
month = nov,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-011-0146-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:36 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-011-0146-1",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Miret:2011:CAH,
author = "Josep M. Miret and Francesc Seb{\'e}",
title = "Cryptanalysis of an ad-hoc cryptosystem for mix-based
e-voting robust against relation attacks",
journal = j-INT-J-INFO-SEC,
volume = "10",
number = "6",
pages = "387--389",
month = nov,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-011-0145-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:36 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-011-0145-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Roelse:2011:EDS,
author = "Peter Roelse",
title = "Erratum to: {Dynamic subtree tracing and its
application in pay-TV systems}",
journal = j-INT-J-INFO-SEC,
volume = "10",
number = "6",
pages = "391--391",
month = nov,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-011-0141-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:36 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
note = "See \cite{Roelse:2011:DST}.",
URL = "http://link.springer.com/article/10.1007/s10207-011-0141-6;
http://link.springer.com/content/pdf/10.1007/s10207-011-0141-6.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Fiore:2012:RBS,
author = "D. Fiore and R. Gennaro and N. P. Smart",
title = "Relations between the security models for
certificateless encryption and {ID}-based key
agreement",
journal = j-INT-J-INFO-SEC,
volume = "11",
number = "1",
pages = "1--22",
month = feb,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-011-0149-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:36 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-011-0149-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Peng:2012:TDA,
author = "Kun Peng",
title = "Threshold distributed access control with public
verification: a practical application of {PVSS}",
journal = j-INT-J-INFO-SEC,
volume = "11",
number = "1",
pages = "23--31",
month = feb,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-011-0151-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:36 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-011-0151-4",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Ates:2012:WHI,
author = "Mika{\"e}l Ates and Francesco Buccafurri and Jacques
Fayolle and Gianluca Lax",
title = "A warning on how to implement anonymous credential
protocols into the information card framework",
journal = j-INT-J-INFO-SEC,
volume = "11",
number = "1",
pages = "33--40",
month = feb,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-011-0150-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:36 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-011-0150-5",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Wang:2012:SGN,
author = "Yuanzhuo Wang and Min Yu and Jingyuan Li and Kun Meng
and Chuang Lin and Xueqi Cheng",
title = "Stochastic game net and applications in security
analysis for enterprise network",
journal = j-INT-J-INFO-SEC,
volume = "11",
number = "1",
pages = "41--52",
month = feb,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-011-0148-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:36 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-011-0148-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Huang:2012:NEO,
author = "Qiong Huang and Guomin Yang and Duncan S. Wong and
Willy Susilo",
title = "A new efficient optimistic fair exchange protocol
without random oracles",
journal = j-INT-J-INFO-SEC,
volume = "11",
number = "1",
pages = "53--63",
month = feb,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-011-0152-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:36 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-011-0152-3",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Guerra-Casanova:2012:AMD,
author = "J. Guerra-Casanova and C. S{\'a}nchez-{\'A}vila and G.
Bailador and A. de Santos Sierra",
title = "Authentication in mobile devices through hand gesture
recognition",
journal = j-INT-J-INFO-SEC,
volume = "11",
number = "2",
pages = "65--83",
month = apr,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-012-0154-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:37 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-012-0154-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Nuida:2012:SCS,
author = "Koji Nuida",
title = "Short collusion-secure fingerprint codes against three
pirates",
journal = j-INT-J-INFO-SEC,
volume = "11",
number = "2",
pages = "85--102",
month = apr,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-012-0155-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:37 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-012-0155-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Andreeva:2012:SAS,
author = "Elena Andreeva and Andrey Bogdanov and Bart Mennink
and Bart Preneel and Christian Rechberger",
title = "On security arguments of the second round {SHA-3}
candidates",
journal = j-INT-J-INFO-SEC,
volume = "11",
number = "2",
pages = "103--120",
month = apr,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-012-0156-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:37 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/hash.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-012-0156-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
keywords = "Classification; Differential attacks; Hash functions;
Security reductions; SHA-3 competition; US National
Institute for Standards and Technology (NIST)
cryptographic hash algorithm design competition",
}
@Article{Gritzalis:2012:FAR,
author = "Dimitris Gritzalis and Panagiotis Katsaros and
Stylianos Basagiannis and Yannis Soupionis",
title = "Formal analysis for robust anti-{SPIT} protection
using model checking",
journal = j-INT-J-INFO-SEC,
volume = "11",
number = "2",
pages = "121--135",
month = apr,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-012-0159-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:37 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-012-0159-4",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Niebuhr:2012:SPS,
author = "Robert Niebuhr and Mohammed Meziani and Stanislav
Bulygin and Johannes Buchmann",
title = "Selecting parameters for secure {McEliece}-based
cryptosystems",
journal = j-INT-J-INFO-SEC,
volume = "11",
number = "3",
pages = "137--147",
month = jun,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-011-0153-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:37 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-011-0153-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Andreeva:2012:PFG,
author = "Elena Andreeva and Bart Mennink and Bart Preneel",
title = "The parazoa family: generalizing the sponge hash
functions",
journal = j-INT-J-INFO-SEC,
volume = "11",
number = "3",
pages = "149--165",
month = jun,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-012-0157-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:37 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/hash.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-012-0157-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Dewri:2012:OSH,
author = "Rinku Dewri and Indrajit Ray and Nayot Poolsappasit
and Darrell Whitley",
title = "Optimal security hardening on attack tree models of
networks: a cost-benefit analysis",
journal = j-INT-J-INFO-SEC,
volume = "11",
number = "3",
pages = "167--188",
month = jun,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-012-0160-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:37 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-012-0160-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Das:2012:RKE,
author = "Ashok Kumar Das",
title = "A random key establishment scheme for multi-phase
deployment in large-scale distributed sensor networks",
journal = j-INT-J-INFO-SEC,
volume = "11",
number = "3",
pages = "189--211",
month = jun,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-012-0162-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:37 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-012-0162-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Ahmed:2012:MGE,
author = "Irfan Ahmed and Martin Naedele and Bradley Schatz and
Ryoichi Sasaki and Andrew West",
title = "Message from the guest editors",
journal = j-INT-J-INFO-SEC,
volume = "11",
number = "4",
pages = "213--213",
month = aug,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-012-0168-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:37 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-012-0168-3;
http://link.springer.com/content/pdf/10.1007/s10207-012-0168-3.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Reaves:2012:OVT,
author = "Bradley Reaves and Thomas Morris",
title = "An open virtual testbed for industrial control system
security research",
journal = j-INT-J-INFO-SEC,
volume = "11",
number = "4",
pages = "215--229",
month = aug,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-012-0164-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:37 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-012-0164-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Hadziosmanovic:2012:LMA,
author = "Dina Hadziosmanovi{\'c} and Damiano Bolzoni and Pieter
H. Hartel",
title = "A log mining approach for process monitoring in
{SCADA}",
journal = j-INT-J-INFO-SEC,
volume = "11",
number = "4",
pages = "231--251",
month = aug,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-012-0163-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:37 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-012-0163-8;
http://link.springer.com/content/pdf/10.1007/s10207-012-0163-8.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Sole:2012:EMT,
author = "Marc Sol{\'e} and Victor Munt{\'e}s-Mulero and Jordi
Nin",
title = "Efficient microaggregation techniques for large
numerical data volumes",
journal = j-INT-J-INFO-SEC,
volume = "11",
number = "4",
pages = "253--267",
month = aug,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-012-0158-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:37 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-012-0158-5",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Yaseen:2012:ITM,
author = "Qussai Yaseen and Brajendra Panda",
title = "Insider threat mitigation: preventing unauthorized
knowledge acquisition",
journal = j-INT-J-INFO-SEC,
volume = "11",
number = "4",
pages = "269--280",
month = aug,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-012-0165-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:37 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-012-0165-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Huber:2012:PSS,
author = "Michael Huber",
title = "Perfect secrecy systems immune to spoofing attacks",
journal = j-INT-J-INFO-SEC,
volume = "11",
number = "4",
pages = "281--289",
month = aug,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-012-0166-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:37 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-012-0166-5",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Zhou:2012:MGE,
author = "Jianying Zhou and Xuejia Lai and Hui Li",
title = "Message from the {Guest Editors}",
journal = j-INT-J-INFO-SEC,
volume = "11",
number = "5",
pages = "291--292",
month = oct,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-012-0172-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:38 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-012-0172-7;
http://link.springer.com/content/pdf/10.1007/s10207-012-0172-7.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Xin:2012:RAA,
author = "Zhi Xin and Huiyu Chen and Xinche Wang and Peng Liu
and Sencun Zhu and Bing Mao and Li Xie",
title = "Replacement attacks: automatically evading
behavior-based software birthmark",
journal = j-INT-J-INFO-SEC,
volume = "11",
number = "5",
pages = "293--304",
month = oct,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-012-0170-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:38 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-012-0170-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Chen:2012:DHP,
author = "Liqun Chen and Yu Chen",
title = "The $n$-{Diffie--Hellman} problem and multiple-key
encryption",
journal = j-INT-J-INFO-SEC,
volume = "11",
number = "5",
pages = "305--320",
month = oct,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-012-0171-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:38 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-012-0171-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Kontaxis:2012:MID,
author = "Georgios Kontaxis and Michalis Polychronakis and
Evangelos P. Markatos",
title = "Minimizing information disclosure to third parties in
social login platforms",
journal = j-INT-J-INFO-SEC,
volume = "11",
number = "5",
pages = "321--332",
month = oct,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-012-0173-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:38 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-012-0173-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Golic:2012:NAM,
author = "Jovan Dj. Goli{\'c}",
title = "A new authentication model for ad hoc networks",
journal = j-INT-J-INFO-SEC,
volume = "11",
number = "5",
pages = "333--347",
month = oct,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-012-0167-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:38 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-012-0167-4",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Camacho:2012:SAC,
author = "Philippe Camacho and Alejandro Hevia and Marcos Kiwi
and Roberto Opazo",
title = "Strong accumulators from collision-resistant hashing",
journal = j-INT-J-INFO-SEC,
volume = "11",
number = "5",
pages = "349--363",
month = oct,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-012-0169-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:38 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/hash.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-012-0169-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Perez-Mendez:2012:CLS,
author = "Alejandro P{\'e}rez-M{\'e}ndez and Fernando
Pere{\~n}{\'\i}guez-Garc{\'\i}a and Rafael
Mar{\'\i}n-L{\'o}pez and Gabriel L{\'o}pez-Mill{\'a}n",
title = "A cross-layer {SSO} solution for federating access to
kerberized services in the {eduroam\slash DAMe}
network",
journal = j-INT-J-INFO-SEC,
volume = "11",
number = "6",
pages = "365--388",
month = nov,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-012-0174-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:38 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-012-0174-5",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Han:2012:NCO,
author = "Jinguang Han and Willy Susilo and Yi Mu and Jun Yan",
title = "New constructions of {OSBE} schemes and their
applications in oblivious access control",
journal = j-INT-J-INFO-SEC,
volume = "11",
number = "6",
pages = "389--401",
month = nov,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-012-0176-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:38 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-012-0176-3",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Bogdanov:2012:HPS,
author = "Dan Bogdanov and Margus Niitsoo and Tomas Toft and Jan
Willemson",
title = "High-performance secure multi-party computation for
data mining applications",
journal = j-INT-J-INFO-SEC,
volume = "11",
number = "6",
pages = "403--418",
month = nov,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-012-0177-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:38 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-012-0177-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Bagheri:2012:SFP,
author = "Nasour Bagheri and Praveen Gauravaram and Lars R.
Knudsen and Erik Zenner",
title = "The suffix-free-prefix-free hash function construction
and its indifferentiability security analysis",
journal = j-INT-J-INFO-SEC,
volume = "11",
number = "6",
pages = "419--434",
month = nov,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-012-0175-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:38 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/hash.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-012-0175-4",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{DArco:2013:TTR,
author = "Paolo D'Arco and Angel Perez del Pozo",
title = "Toward tracing and revoking schemes secure against
collusion and any form of secret information leakage",
journal = j-INT-J-INFO-SEC,
volume = "12",
number = "1",
pages = "1--17",
month = feb,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-012-0186-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:38 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-012-0186-1",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Abe:2013:DTA,
author = "Masayuki Abe and Sherman S. M. Chow and Kristiyan
Haralambiev and Miyako Ohkubo",
title = "Double-trapdoor anonymous tags for traceable
signatures",
journal = j-INT-J-INFO-SEC,
volume = "12",
number = "1",
pages = "19--31",
month = feb,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-012-0184-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:38 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-012-0184-3",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Catalano:2013:FNI,
author = "Dario Catalano and Mario {Di Raimondo} and Dario Fiore
and Rosario Gennaro and Orazio Puglisi",
title = "Fully non-interactive onion routing with forward
secrecy",
journal = j-INT-J-INFO-SEC,
volume = "12",
number = "1",
pages = "33--47",
month = feb,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-012-0185-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:38 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-012-0185-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{DeCristofaro:2013:PDC,
author = "Emiliano {De Cristofaro} and Mark Manulis and Bertram
Poettering",
title = "Private discovery of common social contacts",
journal = j-INT-J-INFO-SEC,
volume = "12",
number = "1",
pages = "49--65",
month = feb,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-012-0183-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:38 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-012-0183-4",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Marmol:2013:PEA,
author = "F{\'e}lix G{\'o}mez M{\'a}rmol and Christoph Sorge and
Ronald Petrlic and Osman Ugus and Dirk Westhoff and
Gregorio Mart{\'\i}nez P{\'e}rez",
title = "Privacy-enhanced architecture for smart metering",
journal = j-INT-J-INFO-SEC,
volume = "12",
number = "2",
pages = "67--82",
month = apr,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-012-0181-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:39 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-012-0181-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Asghar:2013:CCH,
author = "Hassan Jameel Asghar and Shujun Li and Josef Pieprzyk
and Huaxiong Wang",
title = "Cryptanalysis of the convex hull click human
identification protocol",
journal = j-INT-J-INFO-SEC,
volume = "12",
number = "2",
pages = "83--96",
month = apr,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-012-0161-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:39 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-012-0161-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Alsaleh:2013:EAA,
author = "Mansour Alsaleh and P. C. van Oorschot",
title = "Evaluation in the absence of absolute ground truth:
toward reliable evaluation methodology for scan
detectors",
journal = j-INT-J-INFO-SEC,
volume = "12",
number = "2",
pages = "97--110",
month = apr,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-012-0178-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:39 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-012-0178-1",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Abbadi:2013:FET,
author = "Imad M. Abbadi",
title = "A framework for establishing trust in Cloud
provenance",
journal = j-INT-J-INFO-SEC,
volume = "12",
number = "2",
pages = "111--128",
month = apr,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-012-0179-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:39 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-012-0179-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Rebollo-Monedero:2013:MPA,
author = "David Rebollo-Monedero and Javier Parra-Arnau and
Claudia Diaz and Jordi Forn{\'e}",
title = "On the measurement of privacy as an attacker's
estimation error",
journal = j-INT-J-INFO-SEC,
volume = "12",
number = "2",
pages = "129--149",
month = apr,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-012-0182-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:39 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-012-0182-5",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Rizomiliotis:2013:SAP,
author = "Panagiotis Rizomiliotis and Stefanos Gritzalis",
title = "On the security of {AUTH}, a provably secure
authentication protocol based on the subspace {LPN}
problem",
journal = j-INT-J-INFO-SEC,
volume = "12",
number = "2",
pages = "151--154",
month = apr,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-012-0188-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:39 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-012-0188-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Xu:2013:VBP,
author = "Wenjuan Xu and Mohamed Shehab and Gail-Joon Ahn",
title = "Visualization-based policy analysis for {SELinux}:
framework and user study",
journal = j-INT-J-INFO-SEC,
volume = "12",
number = "3",
pages = "155--171",
month = jun,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-012-0180-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:39 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-012-0180-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Tormo:2013:DAI,
author = "Gin{\'e}s D{\'o}lera Tormo and Gabriel L{\'o}pez
Mill{\'a}n and Gregorio Mart{\'\i}nez P{\'e}rez",
title = "Definition of an advanced identity management
infrastructure",
journal = j-INT-J-INFO-SEC,
volume = "12",
number = "3",
pages = "173--200",
month = jun,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-012-0189-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:39 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-012-0189-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Vrakas:2013:IDP,
author = "Nikos Vrakas and Costas Lambrinoudakis",
title = "An intrusion detection and prevention system for {IMS}
and {VoIP} services",
journal = j-INT-J-INFO-SEC,
volume = "12",
number = "3",
pages = "201--217",
month = jun,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-012-0187-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:39 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-012-0187-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Bernhard:2013:AAU,
author = "D. Bernhard and G. Fuchsbauer and E. Ghadafi and N. P.
Smart and B. Warinschi",
title = "Anonymous attestation with user-controlled
linkability",
journal = j-INT-J-INFO-SEC,
volume = "12",
number = "3",
pages = "219--249",
month = jun,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-013-0191-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:39 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-013-0191-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Phan:2013:ACB,
author = "Duong-Hieu Phan and David Pointcheval and Siamak F.
Shahandashti and Mario Strefler",
title = "Adaptive {CCA} broadcast encryption with constant-size
secret keys and ciphertexts",
journal = j-INT-J-INFO-SEC,
volume = "12",
number = "4",
pages = "251--265",
month = aug,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-013-0190-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:39 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-013-0190-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Brzuska:2013:LMR,
author = "C. Brzuska and M. Fischlin and N. P. Smart and B.
Warinschi and S. C. Williams",
title = "Less is more: relaxed yet composable security notions
for key exchange",
journal = j-INT-J-INFO-SEC,
volume = "12",
number = "4",
pages = "267--297",
month = aug,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-013-0192-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:39 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-013-0192-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Draper-Gil:2013:OFE,
author = "G. Draper-Gil and J. Zhou and J. L. Ferrer-Gomila and
M. F. Hinarejos",
title = "An optimistic fair exchange protocol with active
intermediaries",
journal = j-INT-J-INFO-SEC,
volume = "12",
number = "4",
pages = "299--318",
month = aug,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-013-0194-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:39 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-013-0194-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Beauquier:2013:SPE,
author = "Dani{\`e}le Beauquier and Jo{\"e}lle Cohen and Ruggero
Lanotte",
title = "Security policies enforcement using finite and
pushdown edit automata",
journal = j-INT-J-INFO-SEC,
volume = "12",
number = "4",
pages = "319--336",
month = aug,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-013-0195-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:39 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-013-0195-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Peng:2013:SAH,
author = "Kun Peng",
title = "A shuffle to achieve high efficiency through
pre-computation and batch verification",
journal = j-INT-J-INFO-SEC,
volume = "12",
number = "4",
pages = "337--345",
month = aug,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-013-0193-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:39 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-013-0193-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Boteanu:2013:CSQ,
author = "Daniel Boteanu and Jos{\'e} M. Fernandez",
title = "A comprehensive study of queue management as a {DoS}
counter-measure",
journal = j-INT-J-INFO-SEC,
volume = "12",
number = "5",
pages = "347--382",
month = oct,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-013-0197-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:40 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-013-0197-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Wang:2013:USM,
author = "Pu Wang and Marta C. Gonz{\'a}lez and Ronaldo Menezes
and Albert-L{\'a}szl{\'o} Barab{\'a}si",
title = "Understanding the spread of malicious mobile-phone
programs and their damage potential",
journal = j-INT-J-INFO-SEC,
volume = "12",
number = "5",
pages = "383--392",
month = oct,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-013-0203-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:40 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-013-0203-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Schreuders:2013:FBA,
author = "Z. Cliffe Schreuders and Christian Payne and Tanya
McGill",
title = "The functionality-based application confinement
model",
journal = j-INT-J-INFO-SEC,
volume = "12",
number = "5",
pages = "393--422",
month = oct,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-013-0199-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:40 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-013-0199-4",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Zakerzadeh:2013:DSA,
author = "Hessam Zakerzadeh and Sylvia L. Osborn",
title = "Delay-sensitive approaches for anonymizing numerical
streaming data",
journal = j-INT-J-INFO-SEC,
volume = "12",
number = "5",
pages = "423--437",
month = oct,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-013-0196-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:40 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-013-0196-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Bresson:2013:LLS,
author = "Emmanuel Bresson and Dario Catalano and Mario {Di
Raimondo} and Dario Fiore and Rosario Gennaro",
title = "Off-line\slash on-line signatures revisited: a general
unifying paradigm, efficient threshold variants and
experimental results",
journal = j-INT-J-INFO-SEC,
volume = "12",
number = "6",
pages = "439--465",
month = nov,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-013-0200-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:40 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-013-0200-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Kundu:2013:PPA,
author = "Ashish Kundu and Elisa Bertino",
title = "Privacy-preserving authentication of trees and
graphs",
journal = j-INT-J-INFO-SEC,
volume = "12",
number = "6",
pages = "467--494",
month = nov,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-013-0198-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:40 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-013-0198-5",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Chen:2013:AMA,
author = "Yu-Shian Chen and Chin-Laung Lei",
title = "Aggregate message authentication codes ({AMACs}) with
on-the-fly verification",
journal = j-INT-J-INFO-SEC,
volume = "12",
number = "6",
pages = "495--504",
month = nov,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-013-0202-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:40 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-013-0202-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Pereniguez-Garcia:2013:KPA,
author = "F. Pere{\~n}{\'\i}guez-Garc{\'\i}a and R.
Mar{\'\i}n-L{\'o}pez and G. Kambourakis and A.
Ruiz-Mart{\'\i}nez and S. Gritzalis and A. F.
Skarmeta-G{\'o}mez",
title = "{KAMU}: providing advanced user privacy in {Kerberos}
multi-domain scenarios",
journal = j-INT-J-INFO-SEC,
volume = "12",
number = "6",
pages = "505--525",
month = nov,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-013-0201-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:40 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-013-0201-1",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Liao:2014:POC,
author = "Qi Liao and Zhen Li",
title = "Portfolio optimization of computer and mobile
botnets",
journal = j-INT-J-INFO-SEC,
volume = "13",
number = "1",
pages = "1--14",
month = feb,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-013-0206-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:41 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-013-0206-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Mizuki:2014:FCB,
author = "Takaaki Mizuki and Hiroki Shizuya",
title = "A formalization of card-based cryptographic protocols
via abstract machine",
journal = j-INT-J-INFO-SEC,
volume = "13",
number = "1",
pages = "15--23",
month = feb,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-013-0219-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:41 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-013-0219-4",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Manulis:2014:PAI,
author = "Mark Manulis and Bertram Poettering and Douglas
Stebila",
title = "Plaintext awareness in identity-based key
encapsulation",
journal = j-INT-J-INFO-SEC,
volume = "13",
number = "1",
pages = "25--49",
month = feb,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-013-0218-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:41 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-013-0218-5",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Emura:2014:GSI,
author = "Keita Emura and Goichiro Hanaoka and Yusuke Sakai and
Jacob C. N. Schuldt",
title = "Group signature implies public-key encryption with
non-interactive opening",
journal = j-INT-J-INFO-SEC,
volume = "13",
number = "1",
pages = "51--62",
month = feb,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-013-0204-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:41 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-013-0204-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Granadillo:2014:RBC,
author = "Gustavo Gonzalez Granadillo and Malek Belhaouane and
Herv{\'e} Debar and Gr{\'e}goire Jacob",
title = "{RORI}-based countermeasure selection using the
{OrBAC} formalism",
journal = j-INT-J-INFO-SEC,
volume = "13",
number = "1",
pages = "63--79",
month = feb,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-013-0207-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:41 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-013-0207-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Saikia:2014:PHF,
author = "Navajit Saikia and Prabin K. Bora",
title = "Perceptual hash function for scalable video",
journal = j-INT-J-INFO-SEC,
volume = "13",
number = "1",
pages = "81--93",
month = feb,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-013-0211-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:41 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/hash.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-013-0211-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Anonymous:2014:SCC,
author = "Anonymous",
title = "Security in cloud computing",
journal = j-INT-J-INFO-SEC,
volume = "13",
number = "2",
pages = "95--96",
month = apr,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0232-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:41 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0232-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Gouglidis:2014:SPV,
author = "Antonios Gouglidis and Ioannis Mavridis and Vincent C.
Hu",
title = "Security policy verification for multi-domains in
cloud systems",
journal = j-INT-J-INFO-SEC,
volume = "13",
number = "2",
pages = "97--111",
month = apr,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-013-0205-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:41 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-013-0205-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Fernandes:2014:SIC,
author = "Diogo A. B. Fernandes and Liliana F. B. Soares and
Jo{\~a}o V. Gomes and M{\'a}rio M. Freire and Pedro R.
M. In{\'a}cio",
title = "Security issues in cloud environments: a survey",
journal = j-INT-J-INFO-SEC,
volume = "13",
number = "2",
pages = "113--170",
month = apr,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-013-0208-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:41 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-013-0208-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Bates:2014:DCR,
author = "Adam Bates and Benjamin Mood and Joe Pletcher and
Hannah Pruse and Masoud Valafar and Kevin Butler",
title = "On detecting co-resident cloud instances using network
flow watermarking techniques",
journal = j-INT-J-INFO-SEC,
volume = "13",
number = "2",
pages = "171--189",
month = apr,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-013-0210-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:41 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-013-0210-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Albeshri:2014:EGI,
author = "Aiiad Albeshri and Colin Boyd and Juan Gonz{\'a}lez
Nieto",
title = "Enhanced {GeoProof}: improved geographic assurance for
data in the cloud",
journal = j-INT-J-INFO-SEC,
volume = "13",
number = "2",
pages = "191--198",
month = apr,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-013-0217-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:41 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-013-0217-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Nunez:2014:BPP,
author = "David Nu{\~n}ez and Isaac Agudo",
title = "{BlindIdM}: a privacy-preserving approach for identity
management as a service",
journal = j-INT-J-INFO-SEC,
volume = "13",
number = "2",
pages = "199--215",
month = apr,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0230-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:41 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0230-4",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Mavrogiannopoulos:2014:TSK,
author = "Nikos Mavrogiannopoulos and Andreas Pashalidis and
Bart Preneel",
title = "Toward a secure {Kerberos} key exchange with smart
cards",
journal = j-INT-J-INFO-SEC,
volume = "13",
number = "3",
pages = "217--228",
month = jun,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-013-0213-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:41 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-013-0213-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Li:2014:AAM,
author = "Fudong Li and Nathan Clarke and Maria Papadaki and
Paul Dowland",
title = "Active authentication for mobile devices utilising
behaviour profiling",
journal = j-INT-J-INFO-SEC,
volume = "13",
number = "3",
pages = "229--244",
month = jun,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-013-0209-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:41 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-013-0209-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Wu:2014:SSP,
author = "Tzong-Sun Wu and Ming-Lun Lee and Han-Yu Lin and
Chao-Yuan Wang",
title = "Shoulder-surfing-proof graphical password
authentication scheme",
journal = j-INT-J-INFO-SEC,
volume = "13",
number = "3",
pages = "245--254",
month = jun,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-013-0216-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:41 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-013-0216-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Mu:2014:RBD,
author = "Chengpo Mu and Meng Yu and Yingjiu Li and Wanyu Zang",
title = "Risk balance defense approach against intrusions for
network server",
journal = j-INT-J-INFO-SEC,
volume = "13",
number = "3",
pages = "255--269",
month = jun,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-013-0214-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:41 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-013-0214-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Lian:2014:PSC,
author = "Bin Lian and Gongliang Chen and Jianhua Li",
title = "Provably secure E-cash system with practical and
efficient complete tracing",
journal = j-INT-J-INFO-SEC,
volume = "13",
number = "3",
pages = "271--289",
month = jun,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0240-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:41 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0240-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{McEvoy:2014:ANT,
author = "Robert P. McEvoy and Michael Tunstall and Claire
Whelan and Colin C. Murphy and William P. Marnane",
title = "{All-or-Nothing Transforms} as a countermeasure to
differential side-channel analysis",
journal = j-INT-J-INFO-SEC,
volume = "13",
number = "3",
pages = "291--304",
month = jun,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-013-0212-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:41 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-013-0212-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Kim:2014:EVE,
author = "Kee Sung Kim and Ik Rae Jeong",
title = "Efficient verifiably encrypted signatures from
lattices",
journal = j-INT-J-INFO-SEC,
volume = "13",
number = "4",
pages = "305--314",
month = aug,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0226-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:42 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0226-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Sepahi:2014:LBC,
author = "Reza Sepahi and Ron Steinfeld and Josef Pieprzyk",
title = "Lattice-based certificateless public-key encryption in
the standard model",
journal = j-INT-J-INFO-SEC,
volume = "13",
number = "4",
pages = "315--333",
month = aug,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-013-0215-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:42 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-013-0215-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Bertoni:2014:SCS,
author = "Guido Bertoni and Joan Daemen and Micha{\"e}l Peeters
and Gilles {Van Assche}",
title = "Sufficient conditions for sound tree and sequential
hashing modes",
journal = j-INT-J-INFO-SEC,
volume = "13",
number = "4",
pages = "335--353",
month = aug,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-013-0220-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:42 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/hash.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-013-0220-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Alabrah:2014:ESC,
author = "Amerah Alabrah and Jeffrey Cashion and Mostafa
Bassiouni",
title = "Enhancing security of cookie-based sessions in mobile
networks using sparse caching",
journal = j-INT-J-INFO-SEC,
volume = "13",
number = "4",
pages = "355--366",
month = aug,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-013-0223-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:42 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-013-0223-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Shameli-Sendi:2014:ACA,
author = "Alireza Shameli-Sendi and Michel Dagenais",
title = "{ARITO}: Cyber-attack response system using accurate
risk impact tolerance",
journal = j-INT-J-INFO-SEC,
volume = "13",
number = "4",
pages = "367--390",
month = aug,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-013-0222-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:42 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-013-0222-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Mousazadeh:2014:RGA,
author = "Mousa Mousazadeh and Behrouz Tork Ladani",
title = "Randomized gossip algorithms under attack",
journal = j-INT-J-INFO-SEC,
volume = "13",
number = "4",
pages = "391--402",
month = aug,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-013-0221-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:42 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-013-0221-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Garcia:2014:WLS,
author = "Flavio D. Garcia and Gerhard de Koning Gans and Roel
Verdult",
title = "Wirelessly lockpicking a smart card reader",
journal = j-INT-J-INFO-SEC,
volume = "13",
number = "5",
pages = "403--420",
month = oct,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0234-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:42 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0234-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Catuogno:2014:ATF,
author = "Luigi Catuogno and Clemente Galdi",
title = "Analysis of a two-factor graphical password scheme",
journal = j-INT-J-INFO-SEC,
volume = "13",
number = "5",
pages = "421--437",
month = oct,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0228-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:42 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0228-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Zhang:2014:DFA,
author = "Meng Zhang and Anand Raghunathan and Niraj K. Jha",
title = "A defense framework against malware and vulnerability
exploits",
journal = j-INT-J-INFO-SEC,
volume = "13",
number = "5",
pages = "439--452",
month = oct,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0233-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:42 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0233-1",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Yasmin:2014:PSP,
author = "Rehana Yasmin and Eike Ritter and Guilin Wang",
title = "Provable security of a pairing-free one-pass
authenticated key establishment protocol for wireless
sensor networks",
journal = j-INT-J-INFO-SEC,
volume = "13",
number = "5",
pages = "453--465",
month = oct,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-013-0224-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:42 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-013-0224-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Gao:2014:TTR,
author = "Weizheng Gao and Kashi Neupane and Rainer Steinwandt",
title = "Tuning a two-round group key agreement",
journal = j-INT-J-INFO-SEC,
volume = "13",
number = "5",
pages = "467--476",
month = oct,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-013-0225-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:42 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-013-0225-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Shin:2014:AAA,
author = "Sooyeon Shin and Taekyoung Kwon",
title = "{AAnA}: Anonymous authentication and authorization
based on short traceable signatures",
journal = j-INT-J-INFO-SEC,
volume = "13",
number = "5",
pages = "477--495",
month = oct,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0227-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:42 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0227-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Herranz:2014:SEA,
author = "Javier Herranz and Jordi Nin",
title = "Secure and efficient anonymization of distributed
confidential databases",
journal = j-INT-J-INFO-SEC,
volume = "13",
number = "6",
pages = "497--512",
month = nov,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0237-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:42 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0237-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Lee:2014:AGU,
author = "Ming-Feng Lee and Nigel P. Smart and Bogdan Warinschi
and Gaven J. Watson",
title = "Anonymity guarantees of the {UMTS\slash LTE}
authentication and connection protocol",
journal = j-INT-J-INFO-SEC,
volume = "13",
number = "6",
pages = "513--527",
month = nov,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0231-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:42 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0231-3",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Veeningen:2014:DMC,
author = "Meilof Veeningen and Benne de Weger and Nicola
Zannone",
title = "Data minimisation in communication protocols: a formal
analysis framework and application to identity
management",
journal = j-INT-J-INFO-SEC,
volume = "13",
number = "6",
pages = "529--569",
month = nov,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0235-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:42 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0235-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Jovanovikj:2014:CMS,
author = "Vladimir Jovanovikj and Dusan Gabrijelcic and Tomaz
Klobucar",
title = "A conceptual model of security context",
journal = j-INT-J-INFO-SEC,
volume = "13",
number = "6",
pages = "571--581",
month = nov,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0229-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:42 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0229-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Sen:2014:UIW,
author = "Sevil Sen",
title = "Using instance-weighted naive {Bayes} for adapting
concept drift in masquerade detection",
journal = j-INT-J-INFO-SEC,
volume = "13",
number = "6",
pages = "583--590",
month = nov,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0238-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:42 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0238-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Han:2015:MAU,
author = "Kyoung Soo Han and Jae Hyun Lim and Boojoong Kang and
Eul Gyu Im",
title = "Malware analysis using visualized images and entropy
graphs",
journal = j-INT-J-INFO-SEC,
volume = "14",
number = "1",
pages = "1--14",
month = feb,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0242-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:43 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0242-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Nappa:2015:MDI,
author = "Antonio Nappa and M. Zubair Rafique and Juan
Caballero",
title = "The {MALICIA} dataset: identification and analysis of
drive-by download operations",
journal = j-INT-J-INFO-SEC,
volume = "14",
number = "1",
pages = "15--33",
month = feb,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0248-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:43 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0248-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Silva:2015:RMP,
author = "Helber Silva and Aldri Santos and Michele Nogueira",
title = "Routing management for performance and security
tradeoff in wireless mesh networks",
journal = j-INT-J-INFO-SEC,
volume = "14",
number = "1",
pages = "35--46",
month = feb,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0246-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:43 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0246-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Dolzhenko:2015:MRE,
author = "Egor Dolzhenko and Jay Ligatti and Srikar Reddy",
title = "Modeling runtime enforcement with mandatory results
automata",
journal = j-INT-J-INFO-SEC,
volume = "14",
number = "1",
pages = "47--60",
month = feb,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0239-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:43 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0239-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Valenzuela:2015:MAO,
author = "Michael Valenzuela and Ferenc Szidarovszky and Jerzy
Rozenblit",
title = "A multiresolution approach for optimal defense against
random attacks",
journal = j-INT-J-INFO-SEC,
volume = "14",
number = "1",
pages = "61--72",
month = feb,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0245-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:43 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0245-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Tonicelli:2015:ITS,
author = "Rafael Tonicelli and Anderson C. A. Nascimento and
Rafael Dowsley and J{\"o}rn M{\"u}ller-Quade and Hideki
Imai and Goichiro Hanaoka and Akira Otsuka",
title = "Information-theoretically secure oblivious polynomial
evaluation in the commodity-based model",
journal = j-INT-J-INFO-SEC,
volume = "14",
number = "1",
pages = "73--84",
month = feb,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0247-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:43 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0247-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Arbit:2015:IPK,
author = "Alex Arbit and Yoel Livne and Yossef Oren and Avishai
Wool",
title = "Implementing public-key cryptography on passive {RFID}
tags is practical",
journal = j-INT-J-INFO-SEC,
volume = "14",
number = "1",
pages = "85--99",
month = feb,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0236-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:43 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0236-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Bella:2015:SIS,
author = "Giampaolo Bella and Helge Janicke",
title = "Special issue on the {Security Track at the ACM
Symposium on Applied Computing 2013}",
journal = j-INT-J-INFO-SEC,
volume = "14",
number = "2",
pages = "101--102",
month = apr,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0280-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:43 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0280-2;
http://link.springer.com/content/pdf/10.1007/s10207-015-0280-2.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Martina:2015:ATM,
author = "Jean Everson Martina and Eduardo dos Santos and
Marcelo Carlomagno Carlos and Geraint Price and Ricardo
Felipe Cust{\'o}dio",
title = "An adaptive threat model for security ceremonies",
journal = j-INT-J-INFO-SEC,
volume = "14",
number = "2",
pages = "103--121",
month = apr,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0253-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:43 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0253-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Armando:2015:FMA,
author = "Alessandro Armando and Gabriele Costa and Alessio
Merlo and Luca Verderame",
title = "Formal modeling and automatic enforcement of {Bring
Your Own Device} policies",
journal = j-INT-J-INFO-SEC,
volume = "14",
number = "2",
pages = "123--140",
month = apr,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0252-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:43 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0252-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Spreitzenbarth:2015:MSC,
author = "Michael Spreitzenbarth and Thomas Schreck and Florian
Echtler and Daniel Arp and Johannes Hoffmann",
title = "{Mobile-Sandbox}: combining static and dynamic
analysis with machine-learning techniques",
journal = j-INT-J-INFO-SEC,
volume = "14",
number = "2",
pages = "141--153",
month = apr,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0250-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:43 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0250-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Riecker:2015:LEC,
author = "Michael Riecker and Sebastian Biedermann and Rachid
{El Bansarkhani} and Matthias Hollick",
title = "Lightweight energy consumption-based intrusion
detection system for wireless sensor networks",
journal = j-INT-J-INFO-SEC,
volume = "14",
number = "2",
pages = "155--167",
month = apr,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0241-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:43 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0241-1",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Egners:2015:MOW,
author = "Andr{\'e} Egners and Patrick Herrmann and Ulrike
Meyer",
title = "Multi-operator wireless mesh networks secured by an
all-encompassing security architecture",
journal = j-INT-J-INFO-SEC,
volume = "14",
number = "2",
pages = "169--186",
month = apr,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0244-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:43 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0244-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Martina:2015:VMB,
author = "Jean Everson Martina and Lawrence Charles Paulson",
title = "Verifying multicast-based security protocols using the
inductive method",
journal = j-INT-J-INFO-SEC,
volume = "14",
number = "2",
pages = "187--204",
month = apr,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0251-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:43 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0251-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Chakravarty:2015:DAE,
author = "Sambuddho Chakravarty and Georgios Portokalidis and
Michalis Polychronakis and Angelos D. Keromytis",
title = "Detection and analysis of eavesdropping in anonymous
communication networks",
journal = j-INT-J-INFO-SEC,
volume = "14",
number = "3",
pages = "205--220",
month = jun,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0256-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:43 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0256-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Seifi:2015:ATA,
author = "Younes Seifi and Suriadi Suriadi and Ernest Foo and
Colin Boyd",
title = "Analysis of two authorization protocols using {Colored
Petri Nets}",
journal = j-INT-J-INFO-SEC,
volume = "14",
number = "3",
pages = "221--247",
month = jun,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0243-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:43 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0243-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{James:2015:AIP,
author = "Joshua I. James and Pavel Gladyshev",
title = "Automated inference of past action instances in
digital investigations",
journal = j-INT-J-INFO-SEC,
volume = "14",
number = "3",
pages = "249--261",
month = jun,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0249-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:43 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0249-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Giffhorn:2015:NAL,
author = "Dennis Giffhorn and Gregor Snelting",
title = "A new algorithm for low-deterministic security",
journal = j-INT-J-INFO-SEC,
volume = "14",
number = "3",
pages = "263--287",
month = jun,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0257-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:43 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0257-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Vasiliadis:2015:GAM,
author = "Giorgos Vasiliadis and Michalis Polychronakis and
Sotiris Ioannidis",
title = "{GPU}-assisted malware",
journal = j-INT-J-INFO-SEC,
volume = "14",
number = "3",
pages = "289--297",
month = jun,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0262-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:43 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0262-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Pitropakis:2015:BRP,
author = "Nikolaos Pitropakis and Aggelos Pikrakis and Costas
Lambrinoudakis",
title = "Behaviour reflects personality: detecting co-residence
attacks on {Xen}-based cloud environments",
journal = j-INT-J-INFO-SEC,
volume = "14",
number = "4",
pages = "299--305",
month = aug,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0255-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:44 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0255-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Yu:2015:EPR,
author = "Yong Yu and Man Ho Au and Yi Mu and Shaohua Tang and
Jian Ren and Willy Susilo and Liju Dong",
title = "Enhanced privacy of a remote data integrity-checking
protocol for secure cloud storage",
journal = j-INT-J-INFO-SEC,
volume = "14",
number = "4",
pages = "307--318",
month = aug,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0263-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:44 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0263-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Casassa-Mont:2015:TSI,
author = "Marco Casassa-Mont and Ilaria Matteucci and Marinella
Petrocchi and Marco Luca Sbodio",
title = "Towards safer information sharing in the cloud",
journal = j-INT-J-INFO-SEC,
volume = "14",
number = "4",
pages = "319--334",
month = aug,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0258-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:44 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0258-5",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Isern-Deya:2015:PUG,
author = "Andreu Pere Isern-Dey{\`a} and Lloren{\c{c}}
Huguet-Rotger and M. Magdalena Payeras-Capell{\`a} and
Maci{\`a} Mut-Puigserver",
title = "On the practicability of using group signatures on
mobile devices: implementation and performance analysis
on the {Android} platform",
journal = j-INT-J-INFO-SEC,
volume = "14",
number = "4",
pages = "335--345",
month = aug,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0259-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:44 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0259-4",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Mustafa:2015:UIA,
author = "Tanveer Mustafa and Karsten Sohr",
title = "Understanding the implemented access control policy of
{Android} system services with slicing and extended
static checking",
journal = j-INT-J-INFO-SEC,
volume = "14",
number = "4",
pages = "347--366",
month = aug,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0260-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:44 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0260-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{ElHassani:2015:ION,
author = "Abdeljebar Ameziane {El Hassani} and Anas Abou {El
Kalam} and Adel Bouhoula and Ryma Abassi and Abdellah
Ait Ouahman",
title = "{Integrity-OrBAC}: a new model to preserve {Critical
Infrastructures} integrity",
journal = j-INT-J-INFO-SEC,
volume = "14",
number = "4",
pages = "367--385",
month = aug,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0254-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:44 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0254-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Al-Saleh:2015:IDC,
author = "Mohammed I. Al-Saleh and Fatima M. AbuHjeela and Ziad
A. Al-Sharif",
title = "Investigating the detection capabilities of
antiviruses under concurrent attacks",
journal = j-INT-J-INFO-SEC,
volume = "14",
number = "4",
pages = "387--396",
month = aug,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0261-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:44 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0261-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Wei:2015:TPE,
author = "Lei Wei and Michael K. Reiter",
title = "Toward practical encrypted email that supports
private, regular-expression searches",
journal = j-INT-J-INFO-SEC,
volume = "14",
number = "5",
pages = "397--416",
month = oct,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0268-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:44 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib;
https://www.math.utah.edu/pub/tex/bib/string-matching.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0268-3;
http://link.springer.com/content/pdf/10.1007/s10207-014-0268-3.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
keywords = "Cloud security; Private search on encrypted data;
Regular-expression search",
}
@Article{Zhou:2015:GCR,
author = "Lan Zhou and Vijay Varadharajan and Michael Hitchens",
title = "Generic constructions for role-based encryption",
journal = j-INT-J-INFO-SEC,
volume = "14",
number = "5",
pages = "417--430",
month = oct,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0267-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:44 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0267-4",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Lin:2015:RNR,
author = "Han-Yu Lin",
title = "{RPCAE}: a novel revocable proxy convertible
authenticated encryption scheme",
journal = j-INT-J-INFO-SEC,
volume = "14",
number = "5",
pages = "431--441",
month = oct,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0269-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:44 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0269-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Halevi:2015:KAS,
author = "Tzipora Halevi and Nitesh Saxena",
title = "Keyboard acoustic side channel attacks: exploring
realistic and security-sensitive scenarios",
journal = j-INT-J-INFO-SEC,
volume = "14",
number = "5",
pages = "443--456",
month = oct,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0264-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:44 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0264-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Li:2015:TMM,
author = "Tao Li and Aiqun Hu",
title = "Trusted mobile model based on {DTE} technology",
journal = j-INT-J-INFO-SEC,
volume = "14",
number = "5",
pages = "457--469",
month = oct,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0266-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:44 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0266-5",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Azkia:2015:DPA,
author = "Hanieh Azkia and Nora Cuppens-Boulahia and
Fr{\'e}d{\'e}ric Cuppens and Gouenou Coatrieux and Said
Oulmakhzoune",
title = "Deployment of a posteriori access control using {IHE
ATNA}",
journal = j-INT-J-INFO-SEC,
volume = "14",
number = "5",
pages = "471--483",
month = oct,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0265-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:44 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0265-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Bertino:2015:SPE,
author = "Elisa Bertino and Robert H. Deng and Xinyi Huang and
Jianying Zhou",
title = "Security and privacy of electronic health information
systems",
journal = j-INT-J-INFO-SEC,
volume = "14",
number = "6",
pages = "485--486",
month = nov,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0303-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:44 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0303-z;
http://link.springer.com/content/pdf/10.1007/s10207-015-0303-z.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Qian:2015:PPP,
author = "Huiling Qian and Jiguo Li and Yichen Zhang and
Jinguang Han",
title = "Privacy-preserving personal health record using
multi-authority attribute-based encryption with
revocation",
journal = j-INT-J-INFO-SEC,
volume = "14",
number = "6",
pages = "487--497",
month = nov,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0270-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:44 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0270-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Qin:2015:FAB,
author = "Bo Qin and Hua Deng and Qianhong Wu and Josep
Domingo-Ferrer and David Naccache and Yunya Zhou",
title = "Flexible attribute-based encryption applicable to
secure e-healthcare records",
journal = j-INT-J-INFO-SEC,
volume = "14",
number = "6",
pages = "499--511",
month = nov,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0272-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:44 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0272-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Hadavi:2015:SSS,
author = "Mohammad Ali Hadavi and Rasool Jalili and Ernesto
Damiani and Stelvio Cimato",
title = "Security and searchability in secret sharing-based
data outsourcing",
journal = j-INT-J-INFO-SEC,
volume = "14",
number = "6",
pages = "513--529",
month = nov,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0277-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:44 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0277-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Kamm:2015:SFP,
author = "Liina Kamm and Jan Willemson",
title = "Secure floating point arithmetic and private satellite
collision analysis",
journal = j-INT-J-INFO-SEC,
volume = "14",
number = "6",
pages = "531--548",
month = nov,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0271-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:44 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/fparith.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0271-8;
http://link.springer.com/content/pdf/10.1007/s10207-014-0271-8.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Hoang:2015:GAM,
author = "Thang Hoang and Deokjai Choi and Thuc Nguyen",
title = "Gait authentication on mobile phone using biometric
cryptosystem and fuzzy commitment scheme",
journal = j-INT-J-INFO-SEC,
volume = "14",
number = "6",
pages = "549--560",
month = nov,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0273-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:44 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0273-1",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Kozakevicius:2015:UQS,
author = "Alice Kozakevicius and Cristian Cappo and Bruno A.
Mozzaquatro and Raul Ceretta Nunes and Christian E.
Schaerer",
title = "{URL} query string anomaly sensor designed with the
bidimensional {Haar} wavelet transform",
journal = j-INT-J-INFO-SEC,
volume = "14",
number = "6",
pages = "561--581",
month = nov,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0276-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:44 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0276-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Liu:2016:STP,
author = "Liang Liu and Xiaofeng Chen and Wenjing Lou",
title = "Secure three-party computational protocols for
triangle area",
journal = j-INT-J-INFO-SEC,
volume = "15",
number = "1",
pages = "1--13",
month = feb,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0284-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:45 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0284-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Chen:2016:SOK,
author = "Yu Chen and Qiong Huang and Zongyang Zhang",
title = "{Sakai--Ohgishi--Kasahara} identity-based
non-interactive key exchange revisited and more",
journal = j-INT-J-INFO-SEC,
volume = "15",
number = "1",
pages = "15--33",
month = feb,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0274-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:45 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0274-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Liu:2016:PCC,
author = "Weiran Liu and Jianwei Liu and Qianhong Wu and Bo Qin
and Yan Li",
title = "Practical chosen-ciphertext secure {Hierarchical
Identity-Based Broadcast Encryption}",
journal = j-INT-J-INFO-SEC,
volume = "15",
number = "1",
pages = "35--50",
month = feb,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0287-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:45 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0287-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Susil:2016:SSA,
author = "Petr Susil and Pouyan Sepehrdad and Serge Vaudenay and
Nicolas Courtois",
title = "On selection of samples in algebraic attacks and a new
technique to find hidden low degree equations",
journal = j-INT-J-INFO-SEC,
volume = "15",
number = "1",
pages = "51--65",
month = feb,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0295-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:45 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0295-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Wang:2016:SSE,
author = "Yuyu Wang and Keisuke Tanaka",
title = "Strongly simulation-extractable leakage-resilient
{NIZK}",
journal = j-INT-J-INFO-SEC,
volume = "15",
number = "1",
pages = "67--79",
month = feb,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0291-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:45 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0291-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Rao:2016:EAB,
author = "Y. Sreenivasa Rao and Ratna Dutta",
title = "Efficient attribute-based signature and signcryption
realizing expressive access structures",
journal = j-INT-J-INFO-SEC,
volume = "15",
number = "1",
pages = "81--109",
month = feb,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0289-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:45 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0289-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{DeKeulenaer:2016:LTS,
author = "Ronald {De Keulenaer} and Jonas Maebe and Koen {De
Bosschere} and Bjorn {De Sutter}",
title = "Link-time smart card code hardening",
journal = j-INT-J-INFO-SEC,
volume = "15",
number = "2",
pages = "111--130",
month = apr,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0282-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:45 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0282-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Chikha:2016:BBA,
author = "Randa Jabeur {Ben Chikha} and Tarek Abbes and Wassim
{Ben Chikha} and Adel Bouhoula",
title = "Behavior-based approach to detect spam over {IP}
telephony attacks",
journal = j-INT-J-INFO-SEC,
volume = "15",
number = "2",
pages = "131--143",
month = apr,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0281-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:45 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0281-1",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Karimi:2016:UAA,
author = "Vahid R. Karimi and Paulo S. C. Alencar and Donald D.
Cowan",
title = "A uniform approach for access control and business
models with explicit rule realization",
journal = j-INT-J-INFO-SEC,
volume = "15",
number = "2",
pages = "145--171",
month = apr,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0275-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:45 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0275-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Raad:2016:PSR,
author = "Elie Raad and Bechara {Al Bouna} and Richard Chbeir",
title = "Preventing sensitive relationships disclosure for
better social media preservation",
journal = j-INT-J-INFO-SEC,
volume = "15",
number = "2",
pages = "173--194",
month = apr,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0278-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:45 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0278-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Celdran:2016:RPP,
author = "Alberto Huertas Celdr{\'a}n and Gin{\'e}s D{\'o}lera
Tormo and F{\'e}lix G{\'o}mez M{\'a}rmol and Manuel Gil
P{\'e}rez and Gregorio Mart{\'\i}nez P{\'e}rez",
title = "Resolving privacy-preserving relationships over
outsourced encrypted data storages",
journal = j-INT-J-INFO-SEC,
volume = "15",
number = "2",
pages = "195--209",
month = apr,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0283-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:45 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0283-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Mateu:2016:HAV,
author = "V{\'\i}ctor Mateu and Josep M. Miret and Francesc
Seb{\'e}",
title = "A hybrid approach to vector-based homomorphic tallying
remote voting",
journal = j-INT-J-INFO-SEC,
volume = "15",
number = "2",
pages = "211--221",
month = apr,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0279-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:45 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0279-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Yang:2016:MGE,
author = "Guomin Yang and Willy Susilo and Yi Mu",
title = "Message from the {Guest Editors}",
journal = j-INT-J-INFO-SEC,
volume = "15",
number = "2",
pages = "223--224",
month = apr,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0315-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:45 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0315-3;
http://link.springer.com/content/pdf/10.1007/s10207-016-0315-3.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Rashwan:2016:UTP,
author = "Hatem A. Rashwan and Agusti Solanas and Dom{\`e}nec
Puig and Antoni Mart{\'\i}nez-Ballest{\'e}",
title = "Understanding trust in privacy-aware video
surveillance systems",
journal = j-INT-J-INFO-SEC,
volume = "15",
number = "3",
pages = "225--234",
month = jun,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0286-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:45 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0286-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Kurek:2016:TBC,
author = "Tytus Kurek and Marcin Niemiec and Artur Lason",
title = "Taking back control of privacy: a novel framework for
preserving cloud-based firewall policy
confidentiality",
journal = j-INT-J-INFO-SEC,
volume = "15",
number = "3",
pages = "235--250",
month = jun,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0292-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:45 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0292-y;
http://link.springer.com/content/pdf/10.1007/s10207-015-0292-y.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Orencik:2016:MKS,
author = "Cengiz Orencik and Ayse Selcuk and Erkay Savas and
Murat Kantarcio{\u{g}}lu",
title = "Multi-keyword search over encrypted data with scoring
and search pattern obfuscation",
journal = j-INT-J-INFO-SEC,
volume = "15",
number = "3",
pages = "251--269",
month = jun,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0294-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:45 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib;
https://www.math.utah.edu/pub/tex/bib/string-matching.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0294-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
keywords = "Efficiency Scoring; Encrypted cloud data; Privacy
preservation; Secure search",
}
@Article{Gritti:2016:BED,
author = "Cl{\'e}mentine Gritti and Willy Susilo and Thomas
Plantard and Kaitai Liang and Duncan S. Wong",
title = "Broadcast encryption with dealership",
journal = j-INT-J-INFO-SEC,
volume = "15",
number = "3",
pages = "271--283",
month = jun,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0285-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:45 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0285-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Mennink:2016:EPH,
author = "Bart Mennink and Bart Preneel",
title = "Efficient parallelizable hashing using small
non-compressing primitives",
journal = j-INT-J-INFO-SEC,
volume = "15",
number = "3",
pages = "285--300",
month = jun,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0288-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:45 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/hash.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0288-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Abbes:2016:DFC,
author = "Tarek Abbes and Adel Bouhoula and Micha{\"e}l
Rusinowitch",
title = "Detection of firewall configuration errors with
updatable tree",
journal = j-INT-J-INFO-SEC,
volume = "15",
number = "3",
pages = "301--317",
month = jun,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0290-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:45 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0290-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Salini:2016:EPA,
author = "P. Salini and S. Kanmani",
title = "Effectiveness and performance analysis of
model-oriented security requirements engineering to
elicit security requirements: a systematic solution for
developing secure software systems",
journal = j-INT-J-INFO-SEC,
volume = "15",
number = "3",
pages = "319--334",
month = jun,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0305-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:45 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0305-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Khayati:2016:PPP,
author = "Leyli Javid Khayati and Cengiz Orencik and Erkay Savas
and Berkant Ustao{\u{g}}lu",
title = "A practical privacy-preserving targeted advertising
scheme for {IPTV} users",
journal = j-INT-J-INFO-SEC,
volume = "15",
number = "4",
pages = "335--360",
month = aug,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0296-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:46 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0296-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Miao:2016:MDU,
author = "Qiguang Miao and Jiachen Liu and Ying Cao and Jianfeng
Song",
title = "Malware detection using bilayer behavior abstraction
and improved one-class support vector machines",
journal = j-INT-J-INFO-SEC,
volume = "15",
number = "4",
pages = "361--379",
month = aug,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0297-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:46 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0297-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Skoric:2016:FBR,
author = "Boris Skori{\'c} and Sebastiaan J. A. de Hoogh and
Nicola Zannone",
title = "Flow-based reputation with uncertainty: evidence-based
subjective logic",
journal = j-INT-J-INFO-SEC,
volume = "15",
number = "4",
pages = "381--402",
month = aug,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0298-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:46 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0298-5;
http://link.springer.com/content/pdf/10.1007/s10207-015-0298-5.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Vajda:2016:ATA,
author = "Istv{\'a}n Vajda",
title = "On the analysis of time-aware protocols in universal
composability framework",
journal = j-INT-J-INFO-SEC,
volume = "15",
number = "4",
pages = "403--412",
month = aug,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0300-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:46 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0300-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Diaz-Santiago:2016:CST,
author = "Sandra D{\'\i}az-Santiago and Lil Mar{\'\i}a
Rodr{\'\i}guez-Henr{\'\i}quez and Debrup Chakraborty",
title = "A cryptographic study of tokenization systems",
journal = j-INT-J-INFO-SEC,
volume = "15",
number = "4",
pages = "413--432",
month = aug,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0313-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:46 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0313-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Malhi:2016:PPA,
author = "Avleen Malhi and Shalini Batra",
title = "Privacy-preserving authentication framework using
{Bloom} filter for secure vehicular communications",
journal = j-INT-J-INFO-SEC,
volume = "15",
number = "4",
pages = "433--453",
month = aug,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0299-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:46 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0299-4",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Anagnostopoulos:2016:NFM,
author = "Marios Anagnostopoulos and Georgios Kambourakis and
Stefanos Gritzalis",
title = "New facets of mobile botnet: architecture and
evaluation",
journal = j-INT-J-INFO-SEC,
volume = "15",
number = "5",
pages = "455--473",
month = oct,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0310-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:46 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0310-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Almaatouq:2016:IIL,
author = "Abdullah Almaatouq and Erez Shmueli and Mariam Nouh
and Ahmad Alabdulkareem and Vivek K. Singh and Mansour
Alsaleh and Abdulrahman Alarifi and Anas Alfaris and
Alex `Sandy' Pentland",
title = "If it looks like a spammer and behaves like a spammer,
it must be a spammer: analysis and detection of
microblogging spam accounts",
journal = j-INT-J-INFO-SEC,
volume = "15",
number = "5",
pages = "475--491",
month = oct,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0321-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:46 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0321-5",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Blanton:2016:POS,
author = "Marina Blanton and Everaldo Aguiar",
title = "Private and oblivious set and multiset operations",
journal = j-INT-J-INFO-SEC,
volume = "15",
number = "5",
pages = "493--518",
month = oct,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0301-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:46 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0301-1",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Kiraz:2016:EVA,
author = "Mehmet Sabir Kiraz and Osmanbey Uzunkol",
title = "Efficient and verifiable algorithms for secure
outsourcing of cryptographic computations",
journal = j-INT-J-INFO-SEC,
volume = "15",
number = "5",
pages = "519--537",
month = oct,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0308-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:46 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0308-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Hu:2016:EWS,
author = "Changhui Hu and Lidong Han",
title = "Efficient wildcard search over encrypted data",
journal = j-INT-J-INFO-SEC,
volume = "15",
number = "5",
pages = "539--547",
month = oct,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0302-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:46 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib;
https://www.math.utah.edu/pub/tex/bib/string-matching.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0302-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
keywords = "Cloud computing; Searchable symmetric encryption;
Wildcard search",
}
@Article{Kasamatsu:2016:TSE,
author = "Kohei Kasamatsu and Takahiro Matsuda and Keita Emura
and Nuttapong Attrapadung and Goichiro Hanaoka and
Hideki Imai",
title = "Time-specific encryption from forward-secure
encryption: generic and direct constructions",
journal = j-INT-J-INFO-SEC,
volume = "15",
number = "5",
pages = "549--571",
month = oct,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0304-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:46 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0304-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Chen:2016:MGE,
author = "Liqun Chen and Chris Mitchell",
title = "Message from the guest editors",
journal = j-INT-J-INFO-SEC,
volume = "15",
number = "6",
pages = "573--574",
month = nov,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0353-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:46 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0353-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Rowe:2016:MPS,
author = "Paul D. Rowe and Joshua D. Guttman and Moses D.
Liskov",
title = "Measuring protocol strength with security goals",
journal = j-INT-J-INFO-SEC,
volume = "15",
number = "6",
pages = "575--596",
month = nov,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0319-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:46 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0319-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Manulis:2016:SMP,
author = "Mark Manulis and Douglas Stebila and Franziskus Kiefer
and Nick Denham",
title = "Secure modular password authentication for the web
using channel bindings",
journal = j-INT-J-INFO-SEC,
volume = "15",
number = "6",
pages = "597--620",
month = nov,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0348-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:46 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0348-7;
http://link.springer.com/content/pdf/10.1007/s10207-016-0348-7.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Brown:2016:API,
author = "Christopher W. Brown and Michael Jenkins",
title = "Analyzing proposals for improving authentication on
the {TLS-\slash SSL}-protected {Web}",
journal = j-INT-J-INFO-SEC,
volume = "15",
number = "6",
pages = "621--635",
month = nov,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0316-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:46 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0316-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Degabriele:2016:UPC,
author = "Jean Paul Degabriele and Victoria Fehr and Marc
Fischlin and Tommaso Gagliardoni and Felix G{\"u}nther
and Giorgia Azzurra Marson and Arno Mittelbach and
Kenneth G. Paterson",
title = "Unpicking {PLAID}: a cryptographic analysis of an
{ISO}-standards-track authentication protocol",
journal = j-INT-J-INFO-SEC,
volume = "15",
number = "6",
pages = "637--657",
month = nov,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0309-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:46 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0309-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Cremers:2016:III,
author = "Cas Cremers and Marko Horvat",
title = "Improving the {ISO\slash IEC 11770} standard for key
management techniques",
journal = j-INT-J-INFO-SEC,
volume = "15",
number = "6",
pages = "659--673",
month = nov,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0306-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:46 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0306-9;
http://link.springer.com/content/pdf/10.1007/s10207-015-0306-9.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Poettering:2017:DAP,
author = "Bertram Poettering and Douglas Stebila",
title = "Double-authentication-preventing signatures",
journal = j-INT-J-INFO-SEC,
volume = "16",
number = "1",
pages = "1--22",
month = feb,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0307-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:47 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0307-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Li:2017:WOO,
author = "Lichun Li and Anwitaman Datta",
title = "Write-only oblivious {RAM}-based privacy-preserved
access of outsourced data",
journal = j-INT-J-INFO-SEC,
volume = "16",
number = "1",
pages = "23--42",
month = feb,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0329-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:47 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0329-x;
http://link.springer.com/content/pdf/10.1007/s10207-016-0329-x.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Karimi:2017:FMA,
author = "Vahid R. Karimi and Paulo S. C. Alencar and Donald D.
Cowan",
title = "A formal modeling and analysis approach for access
control rules, policies, and their combinations",
journal = j-INT-J-INFO-SEC,
volume = "16",
number = "1",
pages = "43--74",
month = feb,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0314-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:47 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0314-4",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Albertini:2017:EAC,
author = "Davide Alberto Albertini and Barbara Carminati and
Elena Ferrari",
title = "An extended access control mechanism exploiting data
dependencies",
journal = j-INT-J-INFO-SEC,
volume = "16",
number = "1",
pages = "75--89",
month = feb,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0322-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:47 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0322-4",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Shaikh:2017:DCM,
author = "Riaz Ahmed Shaikh and Kamel Adi and Luigi Logrippo",
title = "A Data Classification Method for Inconsistency and
Incompleteness Detection in Access Control Policy
Sets",
journal = j-INT-J-INFO-SEC,
volume = "16",
number = "1",
pages = "91--113",
month = feb,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0317-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:47 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0317-1",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Stevanovic:2017:MIC,
author = "Matija Stevanovic and Jens Myrup Pedersen and
Alessandro D'Alconzo and Stefan Ruehrup",
title = "A method for identifying compromised clients based on
{DNS} traffic analysis",
journal = j-INT-J-INFO-SEC,
volume = "16",
number = "2",
pages = "115--132",
month = apr,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0331-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:47 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0331-3",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Mehrnezhad:2017:PCI,
author = "Maryam Mehrnezhad and Abbas Ghaemi Bafghi and Ahad
Harati and Ehsan Toreini",
title = "{PiSHi}: click the images and {I} tell if you are a
human",
journal = j-INT-J-INFO-SEC,
volume = "16",
number = "2",
pages = "133--149",
month = apr,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0311-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:47 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0311-z;
http://link.springer.com/content/pdf/10.1007/s10207-015-0311-z.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Boyd:2017:AAK,
author = "Colin Boyd and Cas Cremers and Mich{\`e}le Feltz and
Kenneth G. Paterson and Bertram Poettering and Douglas
Stebila",
title = "{ASICS}: authenticated key exchange security
incorporating certification systems",
journal = j-INT-J-INFO-SEC,
volume = "16",
number = "2",
pages = "151--171",
month = apr,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0312-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:47 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0312-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Tiloca:2017:IRD,
author = "Marco Tiloca and Christian Gehrmann and Ludwig Seitz",
title = "On improving resistance to {Denial of Service} and key
provisioning scalability of the {DTLS} handshake",
journal = j-INT-J-INFO-SEC,
volume = "16",
number = "2",
pages = "173--193",
month = apr,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0326-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:47 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0326-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Singh:2017:RUA,
author = "Ankit Singh and Hervais C. Simo Fhom",
title = "Restricted usage of anonymous credentials in vehicular
ad hoc networks for misbehavior detection",
journal = j-INT-J-INFO-SEC,
volume = "16",
number = "2",
pages = "195--211",
month = apr,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0328-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:47 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0328-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Mann:2017:TFA,
author = "Christopher Mann and Daniel Loebenberger",
title = "Two-factor authentication for the {Bitcoin} protocol",
journal = j-INT-J-INFO-SEC,
volume = "16",
number = "2",
pages = "213--226",
month = apr,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0325-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Thu Nov 30 16:02:10 MST 2017",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0325-1",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Bat-Erdene:2017:EAC,
author = "Munkhbayar Bat-Erdene and Hyundo Park and Hongzhe Li
and Heejo Lee and Mahn-Soo Choi",
title = "Entropy analysis to classify unknown packing
algorithms for malware detection",
journal = j-INT-J-INFO-SEC,
volume = "16",
number = "3",
pages = "227--248",
month = jun,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0330-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:47 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0330-4",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Bernardini:2017:MRP,
author = "Riccardo Bernardini and Roberto Rinaldo",
title = "Making random permutations from physically unclonable
constants",
journal = j-INT-J-INFO-SEC,
volume = "16",
number = "3",
pages = "249--261",
month = jun,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0324-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:47 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib;
https://www.math.utah.edu/pub/tex/bib/prng.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0324-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
keywords = "Physically unclonable functions; Privacy and security;
Random permutations",
}
@Article{Kim:2017:MES,
author = "Minchul Kim and Younghoon Jung and Junghwan Song",
title = "A modified exhaustive search on a password system
using {SHA-1}",
journal = j-INT-J-INFO-SEC,
volume = "16",
number = "3",
pages = "263--269",
month = jun,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0332-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:47 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/hash.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib;
https://www.math.utah.edu/pub/tex/bib/string-matching.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0332-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
keywords = "Exhaustive search; Microsoft Office; Password
cracking; Security evaluation; SHA-1",
}
@Article{Ragab-Hassen:2017:KMS,
author = "Hani Ragab-Hassen and Esma Lounes",
title = "A key management scheme evaluation using {Markov}
processes",
journal = j-INT-J-INFO-SEC,
volume = "16",
number = "3",
pages = "271--280",
month = jun,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0323-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:47 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0323-3;
http://link.springer.com/content/pdf/10.1007/s10207-016-0323-3.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Gunther:2017:LMT,
author = "Felix G{\"u}nther and Bertram Poettering",
title = "Linkable message tagging: solving the key distribution
problem of signature schemes",
journal = j-INT-J-INFO-SEC,
volume = "16",
number = "3",
pages = "281--297",
month = jun,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0327-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:47 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0327-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Lai:2017:EIB,
author = "Jianchang Lai and Yi Mu and Fuchun Guo",
title = "Efficient identity-based online\slash offline
encryption and signcryption with short ciphertext",
journal = j-INT-J-INFO-SEC,
volume = "16",
number = "3",
pages = "299--311",
month = jun,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0320-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:47 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0320-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Kotzanikolaou:2017:BAR,
author = "Panayiotis Kotzanikolaou and George Chatzisofroniou
and Mike Burmester",
title = "Broadcast anonymous routing ({BAR}): scalable
real-time anonymous communication",
journal = j-INT-J-INFO-SEC,
volume = "16",
number = "3",
pages = "313--326",
month = jun,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0318-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:47 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0318-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Catalano:2017:CAO,
author = "Dario Catalano and Dario Fiore and Rosario Gennaro",
title = "A certificateless approach to onion routing",
journal = j-INT-J-INFO-SEC,
volume = "16",
number = "3",
pages = "327--343",
month = jun,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0337-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:47 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0337-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Lazouski:2017:SDU,
author = "Aliaksandr Lazouski and Fabio Martinelli and Paolo
Mori and Andrea Saracino",
title = "Stateful Data Usage Control for {Android} Mobile
Devices",
journal = j-INT-J-INFO-SEC,
volume = "16",
number = "4",
pages = "345--369",
month = aug,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0336-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:48 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0336-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Ruiz-Heras:2017:AAB,
author = "A. Ruiz-Heras and P. Garc{\'\i}a-Teodoro and L.
S{\'a}nchez-Casado",
title = "{ADroid}: anomaly-based detection of malicious events
in {Android} platforms",
journal = j-INT-J-INFO-SEC,
volume = "16",
number = "4",
pages = "371--384",
month = aug,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0333-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:48 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0333-1",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Garg:2017:NBD,
author = "Shree Garg and Sateesh K. Peddoju and Anil K. Sarje",
title = "Network-based detection of {Android} malicious apps",
journal = j-INT-J-INFO-SEC,
volume = "16",
number = "4",
pages = "385--400",
month = aug,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0343-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:48 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0343-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Kolias:2017:TDS,
author = "Constantinos Kolias and Vasilis Kolias and Georgios
Kambourakis",
title = "{TermID}: a distributed swarm intelligence-based
approach for wireless intrusion detection",
journal = j-INT-J-INFO-SEC,
volume = "16",
number = "4",
pages = "401--416",
month = aug,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0335-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:48 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0335-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Sampangi:2017:HSR,
author = "Raghav V. Sampangi and Srinivas Sampalli",
title = "{HiveSec}: security in resource-constrained wireless
networks inspired by beehives and bee swarms",
journal = j-INT-J-INFO-SEC,
volume = "16",
number = "4",
pages = "417--433",
month = aug,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0341-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:48 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0341-1",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Antunes:2017:DVT,
author = "Nuno Antunes and Marco Vieira",
title = "Designing vulnerability testing tools for web
services: approach, components, and tools",
journal = j-INT-J-INFO-SEC,
volume = "16",
number = "4",
pages = "435--457",
month = aug,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0334-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:48 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0334-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Sisaat:2017:STM,
author = "Khamphao Sisaat and Surin Kittitornkun and Hiroaki
Kikuchi and Chaxiong Yukonhiatou and Masato Terada and
Hiroshi Ishii",
title = "A spatio-temporal malware and country clustering
algorithm: {2012 IIJ MITF} case study",
journal = j-INT-J-INFO-SEC,
volume = "16",
number = "5",
pages = "459--473",
month = oct,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0342-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:48 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0342-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Duessel:2017:DZD,
author = "Patrick Duessel and Christian Gehl and Ulrich Flegel
and Sven Dietrich and Michael Meier",
title = "Detecting zero-day attacks using context-aware anomaly
detection at the application-layer",
journal = j-INT-J-INFO-SEC,
volume = "16",
number = "5",
pages = "475--490",
month = oct,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0344-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:48 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0344-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Arapinis:2017:APM,
author = "Myrto Arapinis and Loretta Ilaria Mancini and Eike
Ritter and Mark Dermot Ryan",
title = "Analysis of privacy in mobile telephony systems",
journal = j-INT-J-INFO-SEC,
volume = "16",
number = "5",
pages = "491--523",
month = oct,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0338-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:48 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0338-9;
http://link.springer.com/content/pdf/10.1007/s10207-016-0338-9.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Huang:2017:MAP,
author = "Cheng-Ta Huang and Yu-Hong Zhang and Li-Chiun Lin and
Wei-Jen Wang and Shiuh-Jeng Wang",
title = "Mutual authentications to parties with {QR}-code
applications in mobile systems",
journal = j-INT-J-INFO-SEC,
volume = "16",
number = "5",
pages = "525--540",
month = oct,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0349-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:48 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0349-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Alawatugoda:2017:GCM,
author = "Janaka Alawatugoda",
title = "Generic construction of an {eCK}-secure key exchange
protocol in the standard model",
journal = j-INT-J-INFO-SEC,
volume = "16",
number = "5",
pages = "541--557",
month = oct,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0346-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:48 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0346-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Zhang:2017:CIB,
author = "Lei Zhang and Qianhong Wu and Bo Qin and Hua Deng and
Jiangtao Li and Jianwei Liu and Wenchang Shi",
title = "Certificateless and identity-based authenticated
asymmetric group key agreement",
journal = j-INT-J-INFO-SEC,
volume = "16",
number = "5",
pages = "559--576",
month = oct,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0339-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:48 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0339-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Aliasgari:2017:SCH,
author = "Mehrdad Aliasgari and Marina Blanton and Fattaneh
Bayatbabolghani",
title = "Secure computation of hidden {Markov} models and
secure floating-point arithmetic in the malicious
model",
journal = j-INT-J-INFO-SEC,
volume = "16",
number = "6",
pages = "577--601",
month = nov,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0350-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:49 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/fparith.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0350-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
keywords = "Floating point; Gaussian mixture models; Hidden Markov
models; Secure computation",
}
@Article{Li:2017:RRS,
author = "Lichun Li and Michael Militzer and Anwitaman Datta",
title = "{rPIR}: ramp secret sharing-based
communication-efficient private information retrieval",
journal = j-INT-J-INFO-SEC,
volume = "16",
number = "6",
pages = "603--625",
month = nov,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0347-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:49 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0347-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Esfahani:2017:EHM,
author = "Alireza Esfahani and Georgios Mantas and Jonathan
Rodriguez and Jos{\'e} Carlos Neves",
title = "An efficient homomorphic {MAC}-based scheme against
data and tag pollution attacks in network
coding-enabled wireless networks",
journal = j-INT-J-INFO-SEC,
volume = "16",
number = "6",
pages = "627--639",
month = nov,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0351-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:49 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0351-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Kananizadeh:2017:DDP,
author = "Shahrzad Kananizadeh and Kirill Kononenko",
title = "Development of dynamic protection against timing
channels",
journal = j-INT-J-INFO-SEC,
volume = "16",
number = "6",
pages = "641--651",
month = nov,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0356-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:49 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0356-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Malatras:2017:EUI,
author = "Apostolos Malatras and Dimitris Geneiatakis and
Ioannis Vakalis",
title = "On the efficiency of user identification: a
system-based approach",
journal = j-INT-J-INFO-SEC,
volume = "16",
number = "6",
pages = "653--671",
month = nov,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0340-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:49 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0340-2;
http://link.springer.com/content/pdf/10.1007/s10207-016-0340-2.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Joh:2017:PSV,
author = "HyunChul Joh and Yashwant K. Malaiya",
title = "Periodicity in software vulnerability discovery,
patching and exploitation",
journal = j-INT-J-INFO-SEC,
volume = "16",
number = "6",
pages = "673--690",
month = nov,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0345-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:49 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0345-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Rial:2018:PPS,
author = "Alfredo Rial and George Danezis and Markulf
Kohlweiss",
title = "Privacy-preserving smart metering revisited",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "1",
pages = "1--31",
month = feb,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0355-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:49 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0355-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Deng:2018:SPT,
author = "Hua Deng and Yunya Zhou and Qianhong Wu and Bo Qin and
Jianwei Liu",
title = "Secure {pay-TV} for chained hotels",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "1",
pages = "33--42",
month = feb,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0354-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:49 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0354-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Yoneyama:2018:FMR,
author = "Kazuki Yoneyama",
title = "Formal modeling of random oracle programmability and
verification of signature unforgeability using
task-{PIOAs}",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "1",
pages = "43--66",
month = feb,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0352-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:49 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0352-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Bernardini:2018:GES,
author = "Riccardo Bernardini and Roberto Rinaldo",
title = "Generalized {Elias} schemes for efficient harvesting
of truly random bits",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "1",
pages = "67--81",
month = feb,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0358-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:49 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib;
https://www.math.utah.edu/pub/tex/bib/prng.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0358-5",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
keywords = "Gaussian random variables; Geometric random variables;
Random number conditioning; Random number generation;
Vector quantization",
}
@Article{Ayed:2018:ADS,
author = "Samiha Ayed and Muhammad Sabir Idrees and Nora Cuppens
and Frederic Cuppens",
title = "Achieving dynamicity in security policies enforcement
using aspects",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "1",
pages = "83--103",
month = feb,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0357-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:49 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0357-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Deepa:2018:BBD,
author = "G. Deepa and P. Santhi Thilagam and Furqan Ahmed Khan
and Amit Praseed and Alwyn R. Pais and Nushafreen
Palsetia",
title = "Black-box detection of {XQuery} injection and
parameter tampering vulnerabilities in web
applications",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "1",
pages = "105--120",
month = feb,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0359-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:49 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0359-4",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Shah:2018:MMM,
author = "Ankit Shah and Rajesh Ganesan and Sushil Jajodia and
Hasan Cam",
title = "A methodology to measure and monitor level of
operational effectiveness of a {CSOC}",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "2",
pages = "121--134",
month = apr,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-017-0365-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Mar 3 09:41:24 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-017-0365-1",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Akiyama:2018:HDC,
author = "Mitsuaki Akiyama and Takeshi Yagi and Takeo Hariu and
Youki Kadobayashi",
title = "{HoneyCirculator}: distributing credential honeytoken
for introspection of web-based attack cycle",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "2",
pages = "135--151",
month = apr,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-017-0361-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Mar 3 09:41:24 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-017-0361-5;
http://link.springer.com/content/pdf/10.1007/s10207-017-0361-5.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Kirubavathi:2018:SAD,
author = "G. Kirubavathi and R. Anitha",
title = "Structural analysis and detection of {Android} botnets
using machine learning techniques",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "2",
pages = "153--167",
month = apr,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-017-0363-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Mar 3 09:41:24 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-017-0363-3",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Gruber:2018:UTB,
author = "A. Gruber and I. Ben-Gal",
title = "Using targeted {Bayesian} network learning for suspect
identification in communication networks",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "2",
pages = "169--181",
month = apr,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-017-0362-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Mar 3 09:41:24 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-017-0362-4",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Kuo:2018:DRA,
author = "Tsung-Min Kuo and Sung-Ming Yen and Meng-Che Han",
title = "Dynamic reversed accumulator",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "2",
pages = "183--191",
month = apr,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-017-0360-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Mar 3 09:41:24 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-017-0360-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
keywords = "Dynamic accumulator; Revocation; Zero-knowledge
proof",
}
@Article{Seo:2018:AOF,
author = "Jae Hong Seo and Keita Emura and Keita Xagawa and
Kazuki Yoneyama",
title = "Accumulable optimistic fair exchange from verifiably
encrypted homomorphic signatures",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "2",
pages = "193--220",
month = apr,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-017-0367-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Mar 3 09:41:24 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-017-0367-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Laszka:2018:GTA,
author = "Aron Laszka and Yevgeniy Vorobeychik and Xenofon
Koutsoukos",
title = "A game-theoretic approach for integrity assurance in
resource-bounded systems",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "2",
pages = "221--242",
month = apr,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-017-0364-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Mar 3 09:41:24 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-017-0364-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Domingo-Ferrer:2018:DGS,
author = "Josep Domingo-Ferrer and Alberto Blanco-Justicia and
Carla R{\`a}fols",
title = "Dynamic group size accreditation and group discounts
preserving anonymity",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "3",
pages = "243--260",
month = jun,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-017-0368-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Apr 16 12:27:34 MDT 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-017-0368-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Luo:2018:ASI,
author = "Ying Luo and Sen-ching S. Cheung and Riccardo
Lazzeretti and Tommaso Pignata and Mauro Barni",
title = "Anonymous subject identification and privacy
information management in video surveillance",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "3",
pages = "261--278",
month = jun,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-017-0380-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Apr 16 12:27:34 MDT 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-017-0380-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Martinez-Balleste:2018:DIS,
author = "Antoni Mart{\'\i}nez-Ballest{\'e} and Hatem Rashwan
and Domenec Puig and Agusti Solanas",
title = "Design and implementation of a secure and trustworthy
platform for privacy-aware video surveillance",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "3",
pages = "279--290",
month = jun,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-017-0370-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Apr 16 12:27:34 MDT 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-017-0370-4",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Mehrnezhad:2018:SPM,
author = "Maryam Mehrnezhad and Ehsan Toreini and Siamak F.
Shahandashti and Feng Hao",
title = "Stealing {PINs} via mobile sensors: actual risk versus
user perception",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "3",
pages = "291--313",
month = jun,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-017-0369-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Apr 16 12:27:34 MDT 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-017-0369-x;
http://link.springer.com/content/pdf/10.1007/s10207-017-0369-x.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Roy:2018:DSC,
author = "Sangita Roy and Ashok Singh Sairam",
title = "Distributed star coloring of network for {IP}
traceback",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "3",
pages = "315--326",
month = jun,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-017-0366-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Apr 16 12:27:34 MDT 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-017-0366-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Faust:2018:OPM,
author = "Sebastian Faust and Carmit Hazay and Daniele Venturi",
title = "Outsourced pattern matching",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "3",
pages = "327--346",
month = jun,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-017-0374-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Apr 16 12:27:34 MDT 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib;
https://www.math.utah.edu/pub/tex/bib/string-matching.bib",
URL = "http://link.springer.com/article/10.1007/s10207-017-0374-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Wang:2018:VEC,
author = "Yujue Wang and HweeHwa Pang and Robert H. Deng",
title = "Verifiably encrypted cascade-instantiable blank
signatures to secure progressive decision management",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "3",
pages = "347--363",
month = jun,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-017-0372-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Apr 16 12:27:34 MDT 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-017-0372-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Gonzalez-Serrano:2018:SML,
author = "Francisco-Javier Gonz{\'a}lez-Serrano and Adri{\'a}n
Amor-Mart{\'\i}n and Jorge Casamay{\'o}n-Ant{\'o}n",
title = "Supervised machine learning using encrypted training
data",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "4",
pages = "365--377",
month = aug,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-017-0381-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Jul 25 08:53:56 MDT 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-017-0381-1",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Ham:2018:IYP,
author = "HyoungMin Ham and JongHyup Lee and JooSeok Song",
title = "Improved yoking proof protocols for preserving
anonymity",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "4",
pages = "379--393",
month = aug,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-017-0383-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Jul 25 08:53:56 MDT 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-017-0383-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Lanet:2018:WTM,
author = "Jean-Louis Lanet and H{\'e}l{\`e}ne {Le Bouder} and
Mohammed Benattou and Axel Legay",
title = "When time meets test",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "4",
pages = "395--409",
month = aug,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-017-0371-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Jul 25 08:53:56 MDT 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-017-0371-3",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Ali:2018:ZMN,
author = "Syed Taha Ali and Patrick McCorry and Peter Hyun-Jeen
Lee and Feng Hao",
title = "{ZombieCoin 2.0}: managing next-generation botnets
using {Bitcoin}",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "4",
pages = "411--422",
month = aug,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-017-0379-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Jul 25 08:53:56 MDT 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-017-0379-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Yang:2018:NSS,
author = "Zheng Yang and Chao Liu and Wanping Liu and Daigu
Zhang and Song Luo",
title = "A new strong security model for stateful authenticated
group key exchange",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "4",
pages = "423--440",
month = aug,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-017-0373-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Jul 25 08:53:56 MDT 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-017-0373-1",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Morales-Sandoval:2018:PBC,
author = "Miguel Morales-Sandoval and Jose Luis Gonzalez-Compean
and Arturo Diaz-Perez and Victor J. Sosa-Sosa",
title = "A pairing-based cryptographic approach for data
security in the cloud",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "4",
pages = "441--461",
month = aug,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-017-0375-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Jul 25 08:53:56 MDT 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-017-0375-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Jiang:2018:FCP,
author = "Yinhao Jiang and Willy Susilo and Yi Mu and Fuchun
Guo",
title = "Flexible ciphertext-policy attribute-based encryption
supporting {AND}-gate and threshold with short
ciphertexts",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "4",
pages = "463--475",
month = aug,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-017-0376-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Jul 25 08:53:56 MDT 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-017-0376-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Jia:2018:ERH,
author = "Hongyong Jia and Yue Chen and Julong Lan and Kaixiang
Huang and Jun Wang",
title = "Efficient revocable hierarchical identity-based
encryption using cryptographic accumulators",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "4",
pages = "477--490",
month = aug,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-017-0387-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Jul 25 08:53:56 MDT 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-017-0387-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Chen:2018:MGE,
author = "Liqun Chen and Jinguang Han and Chris Mitchell",
title = "Message from the {Guest Editors}",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "5",
pages = "491--492",
month = oct,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-018-0416-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 25 06:07:03 MDT 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-018-0416-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Imamura:2018:IAA,
author = "Kazuya Imamura and Kazuhiko Minematsu and Tetsu
Iwata",
title = "Integrity analysis of authenticated encryption based
on stream ciphers",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "5",
pages = "493--511",
month = oct,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-017-0378-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 25 06:07:03 MDT 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-017-0378-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Yoneyama:2018:MCK,
author = "Kazuki Yoneyama and Reo Yoshida and Yuto Kawahara and
Tetsutaro Kobayashi and Hitoshi Fuji and Tomohide
Yamamoto",
title = "Multi-cast key distribution: scalable, dynamic and
provably secure construction",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "5",
pages = "513--532",
month = oct,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-017-0389-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 25 06:07:03 MDT 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-017-0389-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Jiang:2018:CPA,
author = "Yinhao Jiang and Willy Susilo and Yi Mu and Fuchun
Guo",
title = "Ciphertext-policy attribute-based encryption
supporting access policy update and its extension with
preserved attributes",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "5",
pages = "533--548",
month = oct,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-017-0388-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 25 06:07:03 MDT 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-017-0388-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Li:2018:IVC,
author = "Yuxi Li and Fucai Zhou and Yuhai Qin and Muqing Lin
and Zifeng Xu",
title = "Integrity-verifiable conjunctive keyword searchable
encryption in cloud storage",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "5",
pages = "549--568",
month = oct,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-017-0394-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 25 06:07:03 MDT 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-017-0394-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Ribeiro:2018:SRH,
author = "Carlos Ribeiro and Herbert Leitold and Simon Esposito
and David Mitzam",
title = "{STORK}: a real, heterogeneous, large-scale {eID}
management system",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "5",
pages = "569--585",
month = oct,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-017-0385-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 25 06:07:03 MDT 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-017-0385-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Frattolillo:2018:WPE,
author = "Franco Frattolillo",
title = "Watermarking protocols: an excursus to motivate a new
approach",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "5",
pages = "587--601",
month = oct,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-017-0386-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 25 06:07:03 MDT 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-017-0386-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Lopriore:2018:ARM,
author = "Lanfranco Lopriore",
title = "Access right management by extended password
capabilities",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "5",
pages = "603--612",
month = oct,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-017-0390-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 25 06:07:03 MDT 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-017-0390-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{ElSalamouny:2018:ONF,
author = "Ehab ElSalamouny and S{\'e}bastien Gambs",
title = "Optimal noise functions for location privacy on
continuous regions",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "6",
pages = "613--630",
month = nov,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-017-0384-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 25 06:07:04 MDT 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-017-0384-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Murakami:2018:OAA,
author = "Keisuke Murakami and Takeaki Uno",
title = "Optimization algorithm for $k$-anonymization of
datasets with low information loss",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "6",
pages = "631--644",
month = nov,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-017-0392-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 25 06:07:04 MDT 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-017-0392-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Scaife:2018:OSR,
author = "Nolen Scaife and Henry Carter and Lyrissa Lidsky and
Rachael L. Jones and Patrick Traynor",
title = "{OnionDNS}: a seizure-resistant top-level domain",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "6",
pages = "645--660",
month = nov,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-017-0391-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 25 06:07:04 MDT 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-017-0391-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Chiba:2018:DTA,
author = "Daiki Chiba and Takeshi Yagi and Mitsuaki Akiyama and
Toshiki Shibahara and Tatsuya Mori and Shigeki Goto",
title = "{DomainProfiler}: toward accurate and early discovery
of domain names abused in future",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "6",
pages = "661--680",
month = nov,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-017-0396-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 25 06:07:04 MDT 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-017-0396-7;
http://link.springer.com/content/pdf/10.1007/s10207-017-0396-7.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Wangen:2018:FEI,
author = "Gaute Wangen and Christoffer Hallstensen and Einar
Snekkenes",
title = "A framework for estimating information security risk
assessment method completeness",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "6",
pages = "681--699",
month = nov,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-017-0382-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 25 06:07:04 MDT 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-017-0382-0;
http://link.springer.com/content/pdf/10.1007/s10207-017-0382-0.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Bindel:2018:CAA,
author = "Nina Bindel and Johannes Buchmann and Susanne
Rie{\ss}",
title = "Comparing apples with apples: performance analysis of
lattice-based authenticated key exchange protocols",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "6",
pages = "701--718",
month = nov,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-017-0397-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 25 06:07:04 MDT 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-017-0397-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Cimitile:2018:TNM,
author = "Aniello Cimitile and Francesco Mercaldo and Vittoria
Nardone and Antonella Santone and Corrado Aaron
Visaggio",
title = "{Talos}: no more ransomware victims with formal
methods",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "6",
pages = "719--738",
month = nov,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-017-0398-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 25 06:07:04 MDT 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-017-0398-5",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Das:2019:DSI,
author = "Debasish Das and Utpal Sharma and D. K.
Bhattacharyya",
title = "Defeating {SQL} injection attack in authentication
security: an experimental study",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "1",
pages = "1--22",
month = feb,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-017-0393-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 22 17:04:47 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-017-0393-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Dasgupta:2019:DIN,
author = "Dipankar Dasgupta and Abhijit Kumar Nag and Denise
Ferebee and Sanjib Kumar Saha and Kul Prasad Subedi and
Arunava Roy and Alvaro Madero and Abel Sanchez and John
R. Williams",
title = "Design and implementation of {Negative Authentication
System}",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "1",
pages = "23--48",
month = feb,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-017-0395-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 22 17:04:47 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-017-0395-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Stasinopoulos:2019:CAE,
author = "Anastasios Stasinopoulos and Christoforos Ntantogian
and Christos Xenakis",
title = "{Commix}: automating evaluation and exploitation of
command injection vulnerabilities in {Web}
applications",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "1",
pages = "49--72",
month = feb,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-018-0399-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 22 17:04:47 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-018-0399-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Faria:2019:DAA,
author = "Gerson de Souza Faria and Hae Yong Kim",
title = "Differential audio analysis: a new side-channel attack
on {PIN} pads",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "1",
pages = "73--84",
month = feb,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-018-0403-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 22 17:04:47 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-018-0403-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Mesbah:2019:REJ,
author = "Abdelhak Mesbah and Jean-Louis Lanet and Mohamed
Mezghiche",
title = "Reverse engineering {Java Card} and vulnerability
exploitation: a shortcut to {ROM}",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "1",
pages = "85--100",
month = feb,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-018-0401-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 22 17:04:47 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib;
https://www.math.utah.edu/pub/tex/bib/java2010.bib",
URL = "http://link.springer.com/article/10.1007/s10207-018-0401-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Hinarejos:2019:DPE,
author = "M. Francisca Hinarejos and Andreu-Pere Isern-Dey{\`a}
and Josep-Llu{\'\i}s Ferrer-Gomila and Lloren{\c{c}}
Huguet-Rotger",
title = "Deployment and performance evaluation of mobile
multicoupon solutions",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "1",
pages = "101--124",
month = feb,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-018-0404-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 22 17:04:47 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-018-0404-6;
http://link.springer.com/content/pdf/10.1007/s10207-018-0404-6.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Gulyas:2019:HIA,
author = "G{\'a}bor Gy{\"o}rgy Guly{\'a}s and S{\'a}ndor Imre",
title = "Hiding information against structural
re-identification",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "2",
pages = "125--139",
month = apr,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-018-0400-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Mar 18 14:19:02 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-018-0400-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Zheng:2019:IDR,
author = "Jian-Wu Zheng and Jing Zhao and Xin-Ping Guan",
title = "Identifier discrimination: realizing selective-{ID}
{HIBE} with authorized delegation and dedicated
encryption privacy",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "2",
pages = "141--162",
month = apr,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-018-0402-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Mar 18 14:19:02 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-018-0402-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Chang:2019:CTM,
author = "Donghoon Chang and Arpan Jati and Sweta Mishra and
Somitra Kumar Sanadhya",
title = "Cryptanalytic time-memory trade-off for password
hashing schemes",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "2",
pages = "163--180",
month = apr,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-018-0405-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Mar 18 14:19:02 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/hash.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-018-0405-5",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Kluczniak:2019:MDA,
author = "Kamil Kluczniak and Jianfeng Wang and Xiaofeng Chen
and Miroslaw Kutylowski",
title = "Multi-device anonymous authentication",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "2",
pages = "181--197",
month = apr,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-018-0406-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Mar 18 14:19:02 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-018-0406-4;
http://link.springer.com/content/pdf/10.1007/s10207-018-0406-4.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Shah:2019:MEF,
author = "Ankit Shah and Rajesh Ganesan and Sushil Jajodia",
title = "A methodology for ensuring fair allocation of {CSOC}
effort for alert investigation",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "2",
pages = "199--218",
month = apr,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-018-0407-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Mar 18 14:19:02 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-018-0407-3",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Ros-Martin:2019:SND,
author = "Miguel Ros-Mart{\'\i}n and Juli{\'a}n Salas and Jordi
Casas-Roma",
title = "Scalable non-deterministic clustering-based
$k$-anonymization for rich networks",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "2",
pages = "219--238",
month = apr,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-018-0409-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Mar 18 14:19:02 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-018-0409-1",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Joudaki:2019:ETS,
author = "Zeinab Joudaki and Julie Thorpe and Miguel {Vargas
Martin}",
title = "{Enhanced Tacit Secrets}: System-assigned passwords
you can't write down, but don't need to",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "2",
pages = "239--255",
month = apr,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-018-0408-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Mar 18 14:19:02 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-018-0408-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Bernardi:2019:DMD,
author = "Mario Luca Bernardi and Marta Cimitile Damiano
Distante and Fabio Martinelli and Francesco Mercaldo",
title = "Dynamic malware detection and phylogeny analysis using
process mining",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "3",
pages = "257--284",
month = jun,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-018-0415-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Thu May 23 17:57:24 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-018-0415-3",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Grining:2019:PPP,
author = "Krzysztof Grining and Marek Klonowski and Piotr Syga",
title = "On practical privacy-preserving fault-tolerant data
aggregation",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "3",
pages = "285--304",
month = jun,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-018-0413-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Thu May 23 17:57:24 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-018-0413-5",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Vora:2019:KBP,
author = "Aishwarya Vipul Vora and Saumya Hegde",
title = "Keyword-based private searching on cloud data along
with keyword association and dissociation using cuckoo
filter",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "3",
pages = "305--319",
month = jun,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-018-0418-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Thu May 23 17:57:24 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-018-0418-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Wu:2019:TPP,
author = "Ge Wu and Yi Mu and Willy Susilo and Fuchun Guo and
Futai Zhang",
title = "Threshold privacy-preserving cloud auditing with
multiple uploaders",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "3",
pages = "321--331",
month = jun,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-018-0420-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Thu May 23 17:57:24 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-018-0420-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Hiemenz:2019:DSS,
author = "Benedikt Hiemenz and Michel Kr{\"a}mer",
title = "Dynamic searchable symmetric encryption for storing
geospatial data in the cloud",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "3",
pages = "333--354",
month = jun,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-018-0414-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Thu May 23 17:57:24 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-018-0414-4",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Gao:2019:LBD,
author = "Wen Gao and Liqun Chen and Yupu Hu and Christopher J.
P. Newton and Baocang Wang and Jiangshan Chen",
title = "Lattice-based deniable ring signatures",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "3",
pages = "355--370",
month = jun,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-018-0417-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Thu May 23 17:57:24 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-018-0417-1;
http://link.springer.com/content/pdf/10.1007/s10207-018-0417-1.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Samadani:2019:SPM,
author = "Mohammad Hasan Samadani and Mehdi Berenjkoob and
Marina Blanton",
title = "Secure pattern matching based on bit parallelism",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "3",
pages = "371--391",
month = jun,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-018-0410-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Thu May 23 17:57:24 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib;
https://www.math.utah.edu/pub/tex/bib/string-matching.bib",
URL = "http://link.springer.com/article/10.1007/s10207-018-0410-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Kulah:2019:SAD,
author = "Yusuf Kulah and Berkay Dincer and Cemal Yilmaz and
Erkay Savas",
title = "{SpyDetector}: an approach for detecting side-channel
attacks at runtime",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "4",
pages = "393--422",
month = aug,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-018-0411-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Jul 13 14:23:17 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-018-0411-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Faghani:2019:MBM,
author = "Mohammad R. Faghani and Uyen T. Nguyen",
title = "Mobile botnets meet social networks: design and
analysis of a new type of botnet",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "4",
pages = "423--449",
month = aug,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-018-0412-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Jul 13 14:23:17 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-018-0412-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Perez-Sola:2019:DSP,
author = "Cristina P{\'e}rez-Sol{\`a} and Sergi Delgado-Segura
and Guillermo Navarro-Arribas and Jordi
Herrera-Joancomart{\'\i}",
title = "Double-spending prevention for {Bitcoin}
zero-confirmation transactions",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "4",
pages = "451--463",
month = aug,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-018-0422-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Jul 13 14:23:17 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-018-0422-4",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Rezvani:2019:AXP,
author = "Mohsen Rezvani and David Rajaratnam and Aleksandar
Ignjatovic and Maurice Pagnucco and Sanjay Jha",
title = "Analyzing {XACML} policies using answer set
programming",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "4",
pages = "465--479",
month = aug,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-018-0421-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Jul 13 14:23:17 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-018-0421-5",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Saini:2019:YCS,
author = "Anil Saini and Manoj Singh Gaur and Vijay Laxmi and
Mauro Conti",
title = "You click, {I} steal: analyzing and detecting click
hijacking attacks in web pages",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "4",
pages = "481--504",
month = aug,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-018-0423-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Jul 13 14:23:17 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-018-0423-3",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Resende:2019:BMI,
author = "Jo{\~a}o S. Resende and Patr{\'\i}cia R. Sousa and
Rolando Martins and Lu{\'\i}s Antunes",
title = "Breaking {MPC} implementations through compression",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "4",
pages = "505--518",
month = aug,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-018-0424-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Jul 13 14:23:17 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/datacompression.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-018-0424-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
keywords = "multiparty computation (MPC) [a sub-field of
cryptography with the goal of creating methods for
parties to jointly compute a function over their inputs
while keeping those inputs private]",
}
@Article{Marco-Gisbert:2019:SES,
author = "H{\'e}ctor Marco-Gisbert and Ismael Ripoll-Ripoll",
title = "{SSPFA}: effective stack smashing protection for
{Android OS}",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "4",
pages = "519--532",
month = aug,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-018-00425-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Jul 13 14:23:17 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-018-00425-8;
http://link.springer.com/content/pdf/10.1007/s10207-018-00425-8.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Farras:2019:PSP,
author = "Oriol Farr{\`a}s and Jordi Ribes-Gonz{\'a}lez",
title = "Provably secure public-key encryption with conjunctive
and subset keyword search",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "5",
pages = "533--548",
month = oct,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-018-00426-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Sep 11 11:59:37 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-018-00426-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Dyer:2019:PHE,
author = "James Dyer and Martin Dyer and Jie Xu",
title = "Practical homomorphic encryption over the integers for
secure computation in the cloud",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "5",
pages = "549--579",
month = oct,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00427-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Sep 11 11:59:37 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00427-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Takahashi:2019:SSF,
author = "Kenta Takahashi and Takahiro Matsuda and Takao
Murakami and Goichiro Hanaoka and Masakatsu Nishigaki",
title = "Signature schemes with a fuzzy private key",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "5",
pages = "581--617",
month = oct,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00428-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Sep 11 11:59:37 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00428-z;
http://link.springer.com/content/pdf/10.1007/s10207-019-00428-z.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Rastegari:2019:CDV,
author = "Parvin Rastegari and Willy Susilo and Mohammad
Dakhilalian",
title = "Certificateless designated verifier signature
revisited: achieving a concrete scheme in the standard
model",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "5",
pages = "619--635",
month = oct,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00430-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Sep 11 11:59:37 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00430-5",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Garra:2019:RAB,
author = "Ricard Garra and Dominik Leibenger and Josep M. Miret
and Francesc Seb{\'e}",
title = "Repairing an aggregation-based smart metering system",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "5",
pages = "637--646",
month = oct,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00435-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Sep 11 11:59:37 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00435-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Yu:2019:UUP,
author = "Xiaoying Yu and Qi Liao",
title = "Understanding user passwords through password prefix
and postfix ({P3}) graph analysis and visualization",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "5",
pages = "647--663",
month = oct,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00432-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Sep 11 11:59:37 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00432-3",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Makhlouf:2019:SAS,
author = "Amel Meddeb Makhlouf and Mohsen Guizani",
title = "{SE-AOMDV}: secure and efficient {AOMDV} routing
protocol for vehicular communications",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "5",
pages = "665--676",
month = oct,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00436-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Sep 11 11:59:37 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00436-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Cai:2019:STP,
author = "Yixian Cai and George Karakostas and Alan Wassyng",
title = "Secure and trusted partial grey-box verification",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "6",
pages = "677--700",
month = dec,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00431-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Sep 23 07:53:38 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00431-4",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Zhang:2019:FGA,
author = "Tao Zhang and Wang Hao Lee and Mingyuan Gao and
Jianying Zhou",
title = "{File Guard}: automatic format-based media file
sanitization",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "6",
pages = "701--713",
month = dec,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00440-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Sep 23 07:53:38 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00440-3",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Riesco:2019:LCT,
author = "R. Riesco and V. A. Villagr{\'a}",
title = "Leveraging cyber threat intelligence for a dynamic
risk framework",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "6",
pages = "715--739",
month = dec,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00433-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Sep 23 07:53:38 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00433-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Yildirim:2019:EUI,
author = "M. Yildirim and I. Mackie",
title = "Encouraging users to improve password security and
memorability",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "6",
pages = "741--759",
month = dec,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00429-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Sep 23 07:53:38 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00429-y;
http://link.springer.com/content/pdf/10.1007/s10207-019-00429-y.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Aamir:2019:DAD,
author = "Muhammad Aamir and Syed Mustafa Ali Zaidi",
title = "{DDoS} attack detection with feature engineering and
machine learning: the framework and performance
evaluation",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "6",
pages = "761--785",
month = dec,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00434-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Sep 23 07:53:38 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00434-1",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Patsakis:2019:HID,
author = "Constantinos Patsakis and Fran Casino",
title = "{Hydras} and {IPFS}: a decentralised playground for
malware",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "6",
pages = "787--799",
month = dec,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00443-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Sep 23 07:53:38 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00443-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Toreini:2019:DEW,
author = "Ehsan Toreini and Siamak F. Shahandashti and Maryam
Mehrnezhad and Feng Hao",
title = "{DOMtegrity}: ensuring web page integrity against
malicious browser extensions",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "6",
pages = "801--814",
month = dec,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00442-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Sep 23 07:53:38 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00442-1;
http://link.springer.com/content/pdf/10.1007/s10207-019-00442-1.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Takahashi:2020:MGE,
author = "Takeshi Takahashi and Rodrigo Roman Castro and
Bilhanan Silverajan and Ryan K. L. Ko and Said Tabet",
title = "Message from the guest editors",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "1",
pages = "1--2",
month = feb,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00472-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Feb 1 14:23:11 MST 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00472-9;
http://link.springer.com/content/pdf/10.1007/s10207-019-00472-9.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Aufner:2020:ISG,
author = "Peter Aufner",
title = "The {IoT} security gap: a look down into the valley
between threat models and their implementation",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "1",
pages = "3--14",
month = feb,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00445-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Feb 1 14:23:11 MST 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00445-y;
http://link.springer.com/content/pdf/10.1007/s10207-019-00445-y.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Anada:2020:KUP,
author = "Hiroaki Anada and Akira Kanaoka and Natsume Matsuzaki
and Yohei Watanabe",
title = "Key-updatable public-key encryption with keyword
search (Or: How to realize {PEKS} with efficient key
updates for {IoT} environments)",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "1",
pages = "15--38",
month = feb,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00441-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Feb 1 14:23:11 MST 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00441-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Yehuda:2020:PAR,
author = "Raz {Ben Yehuda} and Nezer Jacob Zaidenberg",
title = "Protection against reverse engineering in {ARM}",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "1",
pages = "39--51",
month = feb,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00450-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Feb 1 14:23:11 MST 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00450-1",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Ko:2020:FDD,
author = "Ili Ko and Desmond Chambers and Enda Barrett",
title = "Feature dynamic deep learning approach for {DDoS}
mitigation within the {ISP} domain",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "1",
pages = "53--70",
month = feb,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00453-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Feb 1 14:23:11 MST 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00453-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Takase:2020:PIE,
author = "Hayate Takase and Ryotaro Kobayashi and Masahiko Kato
and Ren Ohmura",
title = "A prototype implementation and evaluation of the
malware detection mechanism for {IoT} devices using the
processor information",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "1",
pages = "71--81",
month = feb,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00437-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Feb 1 14:23:11 MST 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00437-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Ozawa:2020:SIM,
author = "Seiichi Ozawa and Tao Ban and Naoki Hashimoto and
Junji Nakazato and Jumpei Shimamura",
title = "A study of {IoT} malware activities using association
rule learning for darknet sensor data",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "1",
pages = "83--92",
month = feb,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00439-w",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Feb 1 14:23:11 MST 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00439-w",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Shayesteh:2020:TMS,
author = "Behshid Shayesteh and Vesal Hakami and Ahmad Akbari",
title = "A trust management scheme for {IoT-enabled}
environmental health\slash accessibility monitoring
services",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "1",
pages = "93--110",
month = feb,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00446-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Feb 1 14:23:11 MST 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00446-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Ferraris:2020:TTR,
author = "Davide Ferraris and Carmen Fernandez-Gago",
title = "{TrUStAPIS}: a trust requirements elicitation method
for {IoT}",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "1",
pages = "111--127",
month = feb,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00438-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Feb 1 14:23:11 MST 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00438-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Sowjanya:2020:ECC,
author = "K. Sowjanya and Mou Dasgupta and Sangram Ray",
title = "An elliptic curve cryptography based enhanced
anonymous authentication protocol for wearable health
monitoring systems",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "1",
pages = "129--146",
month = feb,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00464-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Feb 1 14:23:11 MST 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00464-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Patil:2020:DVA,
author = "Rajendra Patil and Harsha Dudeja and Chirag Modi",
title = "Designing in-{VM}-assisted lightweight agent-based
malware detection framework for securing virtual
machines in cloud computing",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "2",
pages = "147--162",
month = apr,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00447-w",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 18 12:04:16 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00447-w",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{BenAttia:2020:UHT,
author = "Hasiba {Ben Attia} and Laid Kahloul Saber Benharzallah
and Samir Bourekkache",
title = "Using Hierarchical Timed Coloured {Petri} Nets in the
formal study of {TRBAC} security policies",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "2",
pages = "163--187",
month = apr,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00448-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 18 12:04:16 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
note = "See author name correction \cite{BenAttia:2020:CUH}.",
URL = "http://link.springer.com/article/10.1007/s10207-019-00448-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Adepu:2020:ASG,
author = "Sridhar Adepu and Nandha Kumar Kandasamy and Jianying
Zhou and Aditya Mathur",
title = "Attacks on smart grid: power supply interruption and
malicious power generation",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "2",
pages = "189--211",
month = apr,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00452-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 18 12:04:16 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00452-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Cheng:2020:SAA,
author = "Peng Cheng and Ibrahim Ethem Bagci and Utz Roedig and
Jeff Yan",
title = "{SonarSnoop}: active acoustic side-channel attacks",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "2",
pages = "213--228",
month = apr,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00449-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 18 12:04:16 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00449-8;
http://link.springer.com/content/pdf/10.1007/s10207-019-00449-8.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Nayak:2020:SSE,
author = "Sanjeet Kumar Nayak and Somanath Tripathy",
title = "{SEDS}: secure and efficient server-aided data
deduplication scheme for cloud storage",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "2",
pages = "229--240",
month = apr,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00455-w",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 18 12:04:16 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00455-w",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{BenAttia:2020:CUH,
author = "Hasiba {Ben Attia} and Laid Kahloul and Saber
Benharzallah and Samir Bourekkache",
title = "Correction to: {Using Hierarchical Timed Coloured
Petri Nets in the formal study of TRBAC security
policies}",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "2",
pages = "241--241",
month = apr,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00454-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 18 12:04:16 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
note = "See \cite{BenAttia:2020:UHT}.",
URL = "http://link.springer.com/article/10.1007/s10207-019-00454-x;
http://link.springer.com/content/pdf/10.1007/s10207-019-00454-x.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
remark = "In the original publication of this article, the third
author's name was incorrectly published. The correct
name of the third author should read as ``Saber
Benharzallah''.",
}
@Article{Yeh:2020:SIS,
author = "Kuo-Hui Yeh and Chunhua Su and Robert H. Deng and Moti
Yung and Miroslaw Kutylowski",
title = "Special issue on security and privacy of blockchain
technologies",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "3",
pages = "243--244",
month = jun,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00496-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue May 19 08:49:45 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00496-6;
http://link.springer.com/content/pdf/10.1007/s10207-020-00496-6.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Fan:2020:SHB,
author = "Chun-I Fan and Yi-Fan Tseng and Hui-Po Su and Ruei-Hau
Hsu and Hiroaki Kikuchi",
title = "Secure hierarchical {Bitcoin} wallet scheme against
privilege escalation attacks",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "3",
pages = "245--255",
month = jun,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00476-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue May 19 08:49:45 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00476-5",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Yohan:2020:FSB,
author = "Alexander Yohan and Nai-Wei Lo",
title = "{FOTB}: a secure blockchain-based firmware update
framework for {IoT} environment",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "3",
pages = "257--278",
month = jun,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00467-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue May 19 08:49:45 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00467-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Meng:2020:ECB,
author = "Weizhi Meng and Wenjuan Li and Laurence T. Yang and
Peng Li",
title = "Enhancing challenge-based collaborative intrusion
detection networks against insider attacks using
blockchain",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "3",
pages = "279--290",
month = jun,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00462-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue May 19 08:49:45 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00462-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Sattath:2020:IQB,
author = "Or Sattath",
title = "On the insecurity of quantum {Bitcoin} mining",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "3",
pages = "291--302",
month = jun,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00493-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue May 19 08:49:45 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00493-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Zhou:2020:IFV,
author = "Yuanjian Zhou and Yining Liu and Chengshun Jiang and
Shulan Wang",
title = "An improved {FOO} voting scheme using blockchain",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "3",
pages = "303--310",
month = jun,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00457-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue May 19 08:49:45 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00457-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Bao:2020:LSP,
author = "Zijian Bao and Wenbo Shi and Saru Kumari and Zhi-yin
Kong and Chien-Ming Chen",
title = "{Lockmix}: a secure and privacy-preserving mix service
for {Bitcoin} anonymity",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "3",
pages = "311--321",
month = jun,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00459-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue May 19 08:49:45 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00459-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Zhang:2020:CBE,
author = "Shufan Zhang and Lili Wang and Hu Xiong",
title = "{Chaintegrity}: blockchain-enabled large-scale
e-voting system with robustness and universal
verifiability",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "3",
pages = "323--341",
month = jun,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00465-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue May 19 08:49:45 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00465-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Tiloca:2020:GRB,
author = "Marco Tiloca and Gianluca Dini and Kiki Rizki and
Shahid Raza",
title = "Group rekeying based on member join history",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "4",
pages = "343--381",
month = aug,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00451-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jul 21 07:55:30 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00451-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Seo:2020:ERL,
author = "Minhye Seo and Suhri Kim and Dong Hoon Lee and Jong
Hwan Park",
title = "{EMBLEM}: {(R)LWE}-based key encapsulation with a new
multi-bit encoding method",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "4",
pages = "383--399",
month = aug,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00456-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jul 21 07:55:30 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00456-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Holzl:2020:DDA,
author = "Michael H{\"o}lzl and Michael Roland and Omid Mir and
Ren{\'e} Mayrhofer",
title = "Disposable dynamic accumulators: toward practical
privacy-preserving mobile {eIDs} with scalable
revocation",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "4",
pages = "401--417",
month = aug,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00458-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jul 21 07:55:30 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00458-7;
http://link.springer.com/content/pdf/10.1007/s10207-019-00458-7.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Ogata:2020:SAS,
author = "Wakaha Ogata and Takaaki Otemori",
title = "Security analysis of secure {kNN} and ranked keyword
search over encrypted data",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "4",
pages = "419--425",
month = aug,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00461-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jul 21 07:55:30 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00461-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Pilz:2020:SAS,
author = "M. Pilz and F. Baghaei Naeini and K. Grammont and C.
Smagghe and M. Davis and J.-C. Nebel and L. Al-Fagih
and E. Pfluegel",
title = "Security attacks on smart grid scheduling and their
defences: a game-theoretic approach",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "4",
pages = "427--443",
month = aug,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00460-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jul 21 07:55:30 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00460-z;
http://link.springer.com/content/pdf/10.1007/s10207-019-00460-z.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Ueda:2020:SIR,
author = "Itaru Ueda and Daiki Miyahara and Akihiro Nishimura
and Yu-ichi Hayashi and Takaaki Mizuki and Hideaki
Sone",
title = "Secure implementations of a random bisection cut",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "4",
pages = "445--452",
month = aug,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00463-w",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jul 21 07:55:30 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00463-w",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Wu:2020:CIB,
author = "Chunhui Wu and Xiaofeng Chen and Willy Susilo",
title = "Concise {ID}-based mercurial functional commitments
and applications to zero-knowledge sets",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "4",
pages = "453--464",
month = aug,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00466-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jul 21 07:55:30 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00466-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Casas-Roma:2020:DGD,
author = "Jordi Casas-Roma",
title = "{DUEF-GA}: data utility and privacy evaluation
framework for graph anonymization",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "4",
pages = "465--478",
month = aug,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00469-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jul 21 07:55:30 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00469-4",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Mitropoulos:2020:PAC,
author = "Dimitris Mitropoulos and Thodoris Sotiropoulos and
Nikos Koutsovasilis and Diomidis Spinellis",
title = "{PDGuard}: an architecture for the control and secure
processing of personal data",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "4",
pages = "479--498",
month = aug,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00468-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jul 21 07:55:30 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00468-5",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Sheikhalishahi:2020:DWD,
author = "Mina Sheikhalishahi and Andrea Saracino and Fabio
Martinelli and Antonio {La Marra} and Mohammed Mejri
and Nadia Tawbi",
title = "Digital Waste Disposal: an automated framework for
analysis of spam emails",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "5",
pages = "499--522",
month = oct,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00470-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Aug 15 07:08:49 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00470-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Alzaidi:2020:DHP,
author = "Areej Alzaidi and Suhair Alshehri and Seyed M.
Buhari",
title = "{DroidRista}: a highly precise static data flow
analysis framework for {Android} applications",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "5",
pages = "523--536",
month = oct,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00471-w",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Aug 15 07:08:49 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00471-w",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Torra:2020:RDP,
author = "Vicen{\c{c}} Torra",
title = "Random dictatorship for privacy-preserving social
choice",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "5",
pages = "537--545",
month = oct,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00474-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Aug 15 07:08:49 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00474-7;
http://link.springer.com/content/pdf/10.1007/s10207-019-00474-7.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Bernardini:2020:ASS,
author = "Riccardo Bernardini and Roberto Rinaldo",
title = "Analysis of some simple stabilizers for physically
obfuscated keys",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "5",
pages = "547--565",
month = oct,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00473-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Aug 15 07:08:49 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00473-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Nguyen:2020:NGB,
author = "Huy-Trung Nguyen and Quoc-Dung Ngo and Van-Hoang Le",
title = "A novel graph-based approach for {IoT} botnet
detection",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "5",
pages = "567--577",
month = oct,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00475-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Aug 15 07:08:49 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00475-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Manasrah:2020:KPD,
author = "Ahmed M. Manasrah and Areej R. AL-Rabadi and Najib A.
Kofahi",
title = "Key pre-distribution approach using block {$ L U $}
decomposition in wireless sensor network",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "5",
pages = "579--596",
month = oct,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00477-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Aug 15 07:08:49 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00477-4",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Taheri:2020:CTU,
author = "Sona Taheri and Adil M. Bagirov and Iqbal Gondal and
Simon Brown",
title = "Cyberattack triage using incremental clustering for
intrusion detection systems",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "5",
pages = "597--607",
month = oct,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00478-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Aug 15 07:08:49 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00478-3",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Hale:2020:UMA,
author = "Britta Hale",
title = "User-mediated authentication protocols and
unforgeability in key collision",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "6",
pages = "609--621",
month = dec,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00479-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 19 07:03:34 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00479-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Picazo-Sanchez:2020:AYP,
author = "Pablo Picazo-Sanchez and Juan Tapiador and Gerardo
Schneider",
title = "After you, please: browser extensions order attacks
and countermeasures",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "6",
pages = "623--638",
month = dec,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00481-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 19 07:03:34 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00481-8;
http://link.springer.com/content/pdf/10.1007/s10207-019-00481-8.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Zhang:2020:FAB,
author = "Yanting Zhang and Jianwei Liu and Zongyang Zhang and
Weiran Liu",
title = "{FDCO}: attribute-based fast data cloud-outsourcing
scheme for mobile devices",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "6",
pages = "639--656",
month = dec,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00480-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 19 07:03:34 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00480-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Sethi:2020:CAR,
author = "Kamalakanta Sethi and E. Sai Rupesh and Rahul Kumar
and Padmalochan Bera and Y. Venu Madhav",
title = "A context-aware robust intrusion detection system: a
reinforcement learning-based approach",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "6",
pages = "657--678",
month = dec,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00482-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 19 07:03:34 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00482-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Melki:2020:LMF,
author = "Reem Melki and Hassan N. Noura and Ali Chehab",
title = "Lightweight multi-factor mutual authentication
protocol for {IoT} devices",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "6",
pages = "679--694",
month = dec,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00484-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 19 07:03:34 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00484-5",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Tavizi:2020:LPS,
author = "Tina Tavizi and Mehdi Shajari",
title = "A language and a pattern system for temporal property
specification: advanced metering infrastructure case
study",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "6",
pages = "695--710",
month = dec,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00483-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 19 07:03:34 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00483-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Sun:2020:PDI,
author = "Lixue Sun and Chunxiang Xu and Yuan Zhang and Kefei
Chen",
title = "Public data integrity auditing without homomorphic
authenticators from indistinguishability obfuscation",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "6",
pages = "711--720",
month = dec,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00486-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 19 07:03:34 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00486-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Leontiadis:2021:SCR,
author = "Iraklis Leontiadis and Ming Li",
title = "Secure and collusion-resistant data aggregation from
convertible tags",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "1",
pages = "1--20",
month = feb,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00485-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 19 07:03:35 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00485-4",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Schlette:2021:MVC,
author = "Daniel Schlette and Fabian B{\"o}hm and Marco Caselli
and G{\"u}nther Pernul",
title = "Measuring and visualizing cyber threat intelligence
quality",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "1",
pages = "21--38",
month = feb,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00490-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 19 07:03:35 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00490-y;
http://link.springer.com/content/pdf/10.1007/s10207-020-00490-y.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{El-Zawawy:2021:DLN,
author = "Mohamed A. El-Zawawy and Eleonora Losiouk and Mauro
Conti",
title = "Do not let {Next-Intent Vulnerability} be your next
nightmare: type system-based approach to detect it in
{Android} apps",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "1",
pages = "39--58",
month = feb,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00491-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 19 07:03:35 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00491-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Liu:2021:NEM,
author = "Pengfei Liu and Weiping Wang and Xi Luo and Haodong
Wang and Chushu Liu",
title = "{NSDroid}: efficient multi-classification of {Android}
malware using neighborhood signature in local function
call graphs",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "1",
pages = "59--71",
month = feb,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00489-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 19 07:03:35 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00489-5",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{VandenBroeck:2021:OIS,
author = "Jens {Van den Broeck} and Bart Coppens and Bjorn {De
Sutter}",
title = "Obfuscated integration of software protections",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "1",
pages = "73--101",
month = feb,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00494-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 19 07:03:35 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00494-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Jia:2021:CNI,
author = "Huiwen Jia and Chunming Tang",
title = "Cryptanalysis of a non-interactive deniable ring
signature scheme",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "1",
pages = "103--112",
month = feb,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00497-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 19 07:03:35 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00497-5",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Ibnugraha:2021:RMD,
author = "Prajna Deshanta Ibnugraha and Lukito Edi Nugroho and
Paulus Insap Santosa",
title = "Risk model development for information security in
organization environment based on business
perspectives",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "1",
pages = "113--126",
month = feb,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00495-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 19 07:03:35 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00495-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Li:2021:TBB,
author = "Wenjuan Li and Yu Wang and Man Ho Au",
title = "Toward a blockchain-based framework for
challenge-based collaborative intrusion detection",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "2",
pages = "127--139",
month = apr,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00488-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Mar 23 08:25:39 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-020-00488-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
online-date = "Published: 11 February 2020 Pages: 127 - 139",
}
@Article{Xu:2021:SLR,
author = "Jia Xu and Jianying Zhou",
title = "Strong leakage-resilient encryption: enhancing data
confidentiality by hiding partial ciphertext",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "2",
pages = "141--159",
month = apr,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00487-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Mar 23 08:25:39 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-020-00487-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
online-date = "Published: 12 February 2020 Pages: 141 - 159",
}
@Article{Faisal:2021:SAT,
author = "Abu Faisal and Mohammad Zulkernine",
title = "A secure architecture for {TCP\slash UDP}-based cloud
communications",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "2",
pages = "161--179",
month = apr,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00511-w",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Mar 23 08:25:39 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-020-00511-w",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
online-date = "Published: 07 July 2020 Pages: 161 - 179",
}
@Article{Solano:2021:CBB,
author = "Jesus Solano and Luis Camacho and Mart{\'\i}n Ochoa",
title = "Combining behavioral biometrics and session context
analytics to enhance risk-based static authentication
in web applications",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "2",
pages = "181--197",
month = apr,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00510-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Mar 23 08:25:39 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-020-00510-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
online-date = "Published: 16 June 2020 Pages: 181 - 197",
}
@Article{Chatterjee:2021:SEW,
author = "Sanjit Chatterjee and Manish Kesarwani and Akash
Shah",
title = "Secure and efficient wildcard search over encrypted
data",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "2",
pages = "199--244",
month = apr,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00492-w",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Mar 23 08:25:39 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-020-00492-w",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
online-date = "Published: 30 March 2020 Pages: 199 - 244",
}
@Article{Medina-Lopez:2021:SAD,
author = "Crist{\'o}bal Medina-L{\'o}pez and L. G. Casado and
Yuansong Qiao",
title = "An {SDN} approach to detect targeted attacks in {P2P}
fully connected overlays",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "2",
pages = "245--255",
month = apr,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00499-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Mar 23 08:25:39 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-020-00499-3",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
online-date = "Published: 02 May 2020 Pages: 245 - 255",
}
@Article{Wang:2021:SLR,
author = "Yuntao Wang and Tsuyoshi Takagi",
title = "Studying lattice reduction algorithms improved by
quick reordering technique",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "2",
pages = "257--268",
month = apr,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00501-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Mar 23 08:25:39 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-020-00501-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
online-date = "Published: 13 May 2020 Pages: 257 - 268",
}
@Article{Benarfa:2021:CED,
author = "Abdelmadjid Benarfa and Muhammad Hassan and Eleonora
Losiouk and Alberto Compagno and Mohamed Bachir Yagoubi
and Mauro Conti",
title = "{ChoKIFA+}: an early detection and mitigation approach
against interest flooding attacks in {NDN}",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "3",
pages = "269--285",
month = jun,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00500-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat May 29 07:09:27 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00500-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Manulis:2021:CSN,
author = "M. Manulis and C. P. Bridges and R. Harrison and V.
Sekar and A. Davis",
title = "Cyber security in New Space",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "3",
pages = "287--311",
month = jun,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00503-w",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat May 29 07:09:27 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00503-w;
http://link.springer.com/content/pdf/10.1007/s10207-020-00503-w.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Berger:2021:WTC,
author = "Harel Berger and Amit Z. Dvir and Moti Geva",
title = "A wrinkle in time: a case study in {DNS} poisoning",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "3",
pages = "313--329",
month = jun,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00502-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat May 29 07:09:27 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00502-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Ji:2021:EVA,
author = "Soo-Yeon Ji and Bong-Keun Jeong and Dong Hyun Jeong",
title = "Evaluating visualization approaches to detect abnormal
activities in network traffic data",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "3",
pages = "331--345",
month = jun,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00504-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat May 29 07:09:27 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00504-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Spathoulas:2021:UHE,
author = "Georgios Spathoulas and Georgios Theodoridis and
Georgios-Paraskevas Damiris",
title = "Using homomorphic encryption for privacy-preserving
clustering of intrusion detection alerts",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "3",
pages = "347--370",
month = jun,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00506-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat May 29 07:09:27 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00506-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Pitolli:2021:MAF,
author = "Gregorio Pitolli and Giuseppe Laurenza and Leonardo
Aniello and Leonardo Querzoni and Roberto Baldoni",
title = "{MalFamAware}: automatic family identification and
malware classification through online clustering",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "3",
pages = "371--386",
month = jun,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00509-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat May 29 07:09:27 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00509-4",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Mighan:2021:NSI,
author = "Soosan Naderi Mighan and Mohsen Kahani",
title = "A novel scalable intrusion detection system based on
deep learning",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "3",
pages = "387--403",
month = jun,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00508-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat May 29 07:09:27 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00508-5",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Mandal:2021:ATC,
author = "Mriganka Mandal",
title = "Anonymity in traceable cloud data broadcast system
with simultaneous individual messaging",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "3",
pages = "405--430",
month = jun,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00512-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat May 29 07:09:27 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00512-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Khan:2021:EAB,
author = "Fawad Khan and Hui Li and Yinghui Zhang and Haider
Abbas and Tahreem Yaqoob",
title = "Efficient attribute-based encryption with repeated
attributes optimization",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "3",
pages = "431--444",
month = jun,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00505-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat May 29 07:09:27 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00505-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Aniello:2021:ABT,
author = "Leonardo Aniello and Basel Halak and Peter Chai and
Riddhi Dhall and Mircea Mihalea and Adrian Wilczynski",
title = "{Anti-BlUFf}: towards counterfeit mitigation in {IC}
supply chains using blockchain and {PUF}",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "3",
pages = "445--460",
month = jun,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00513-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat May 29 07:09:27 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00513-8;
http://link.springer.com/content/pdf/10.1007/s10207-020-00513-8.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Yamauchi:2021:AKO,
author = "Toshihiro Yamauchi and Yohei Akao and Ryota Yoshitani
and Yuichi Nakamura and Masaki Hashimoto",
title = "Additional kernel observer: privilege escalation
attack prevention mechanism focusing on system call
privilege changes",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "4",
pages = "461--473",
month = aug,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00514-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Jul 28 09:12:45 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00514-7;
http://link.springer.com/content/pdf/10.1007/s10207-020-00514-7.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Kim:2021:ISD,
author = "Hyoseung Kim and Kwangsu Lee and Jong Hwan Park and
Dong Hoon Lee",
title = "Improving the security of direct anonymous attestation
under host corruptions",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "4",
pages = "475--492",
month = aug,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00507-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Jul 28 09:12:45 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00507-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Jouini:2021:QAS,
author = "Mouna Jouini and Latifa {Ben Arfa Rabai} and Ridha
Khedri",
title = "A quantitative assessment of security risks based on a
multifaceted classification approach",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "4",
pages = "493--510",
month = aug,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00515-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Jul 28 09:12:45 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00515-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Deldar:2021:EST,
author = "Fatemeh Deldar and Mahdi Abadi",
title = "Enhancing spatial and temporal utilities in
differentially private moving objects database
release",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "4",
pages = "511--533",
month = aug,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00516-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Jul 28 09:12:45 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00516-5",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Bi:2021:MPA,
author = "Kun Bi and Dezhi Han and Guichen Zhang and Kuan-Ching
Li and Aniello Castiglione",
title = "{$K$} maximum probability attack paths generation
algorithm for target nodes in networked systems",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "4",
pages = "535--551",
month = aug,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00517-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Jul 28 09:12:45 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00517-4",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Sermpinis:2021:DDT,
author = "Thomas Sermpinis and George Vlahavas and Konstantinos
Karasavvas and Athena Vakali",
title = "{DeTRACT}: a decentralized, transparent, immutable and
open {PKI} certificate framework",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "4",
pages = "553--570",
month = aug,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00518-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Jul 28 09:12:45 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00518-3",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Ferraris:2021:TMP,
author = "Davide Ferraris and Daniel Bastos and Carmen
Fernandez-Gago and Fadi El-Moussa",
title = "A trust model for popular smart home devices",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "4",
pages = "571--587",
month = aug,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00519-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Jul 28 09:12:45 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00519-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Lee:2021:BBM,
author = "Tian-Fu Lee and Hong-Ze Li and Yi-Pei Hsieh",
title = "A blockchain-based medical data preservation scheme
for telecare medical information systems",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "4",
pages = "589--601",
month = aug,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00521-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Jul 28 09:12:45 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00521-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Parida:2021:PMC,
author = "Trushna Parida and Suvrojit Das",
title = "{PageDumper}: a mechanism to collect page table
manipulation information at run-time",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "4",
pages = "603--619",
month = aug,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00520-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Jul 28 09:12:45 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00520-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Ngamboe:2021:RAC,
author = "Mika{\"e}la Ngambo{\'e} and Paul Berthier and Nader
Ammari and Katia Dyrda and Jos{\'e} M. Fernandez",
title = "Risk assessment of cyber-attacks on telemetry-enabled
cardiac implantable electronic devices ({CIED})",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "4",
pages = "621--645",
month = aug,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00522-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Jul 28 09:12:45 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00522-7;
http://link.springer.com/content/pdf/10.1007/s10207-020-00522-7.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Gomez:2021:CCM,
author = "Juan Manuel Castelo G{\'o}mez and Javier Carrillo
Mond{\'e}jar and Jos{\'e} Rold{\'a}n G{\'o}mez and
Jos{\'e} Luis Mart{\'\i}nez Mart{\'\i}nez",
title = "A context-centered methodology for {IoT} forensic
investigations",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "5",
pages = "647--673",
month = oct,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00523-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Aug 14 05:33:52 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00523-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Chen:2021:PAS,
author = "Liqun Chen and Kaibin Huang and Mark Manulis and
Venkkatesh Sekar",
title = "Password-authenticated searchable encryption",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "5",
pages = "675--693",
month = oct,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00524-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Aug 14 05:33:52 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00524-5;
http://link.springer.com/content/pdf/10.1007/s10207-020-00524-5.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Sicari:2021:ABE,
author = "Sabrina Sicari and Alessandra Rizzardi and Gianluca
Dini and Pericle Perazzo and Michele {La Manna} and
Alberto Coen-Porisini",
title = "Attribute-based encryption and sticky policies for
data access control in a smart home scenario: a
comparison on networked smart object middleware",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "5",
pages = "695--713",
month = oct,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00526-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Aug 14 05:33:52 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00526-3;
http://link.springer.com/content/pdf/10.1007/s10207-020-00526-3.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Borges:2021:EPP,
author = "Ricard Borges and Francesc Seb{\'e}",
title = "An efficient privacy-preserving pay-by-phone system
for regulated parking areas",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "5",
pages = "715--727",
month = oct,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00527-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Aug 14 05:33:52 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00527-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Miyahara:2021:ECB,
author = "Daiki Miyahara and Itaru Ueda and Yu-ichi Hayashi and
Takaaki Mizuki and Hideaki Sone",
title = "Evaluating card-based protocols in terms of execution
time",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "5",
pages = "729--740",
month = oct,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00525-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Aug 14 05:33:52 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00525-4;
http://link.springer.com/content/pdf/10.1007/s10207-020-00525-4.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Menges:2021:DDI,
author = "Florian Menges and Benedikt Putz and G{\"u}nther
Pernul",
title = "{DEALER}: decentralized incentives for threat
intelligence reporting and exchange",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "5",
pages = "741--761",
month = oct,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00528-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Aug 14 05:33:52 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00528-1;
http://link.springer.com/content/pdf/10.1007/s10207-020-00528-1.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Granese:2021:EMP,
author = "Federica Granese and Daniele Gorla and Catuscia
Palamidessi",
title = "Enhanced models for privacy and utility in
continuous-time diffusion networks",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "5",
pages = "763--782",
month = oct,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00530-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Aug 14 05:33:52 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00530-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Josephlal:2021:EIR,
author = "Edwin Franco Myloth Josephlal and Sridhar Adepu and
Zheng Yang and Jianying Zhou",
title = "Enabling isolation and recovery in {PLC} redundancy
framework of metro train systems",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "6",
pages = "783--795",
month = dec,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00529-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Oct 19 09:44:52 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00529-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Alecakir:2021:ATI,
author = "Huseyin Alecakir and Burcu Can and Sevil Sen",
title = "Attention: there is an inconsistency between {Android}
permissions and application metadata!",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "6",
pages = "797--815",
month = dec,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00536-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Oct 19 09:44:52 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00536-1",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Murvay:2021:SCA,
author = "Pal-Stefan Murvay and Lucian Popa and Bogdan Groza",
title = "Securing the controller area network with covert
voltage channels",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "6",
pages = "817--831",
month = dec,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00532-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Oct 19 09:44:52 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00532-5",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Imamura:2021:WAM,
author = "Yuta Imamura and Rintaro Orito and Hiroyuki Uekawa and
Kritsana Chaikaew and Pattara Leelaprute and Masaya
Sato and Toshihiro Yamauchi",
title = "{Web} access monitoring mechanism via {Android
WebView} for threat analysis",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "6",
pages = "833--847",
month = dec,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00534-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Oct 19 09:44:52 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00534-3;
http://link.springer.com/content/pdf/10.1007/s10207-020-00534-3.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Yankson:2021:CIP,
author = "Benjamin Yankson",
title = "Continuous improvement process ({CIP})-based
privacy-preserving framework for smart connected toys",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "6",
pages = "849--869",
month = dec,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00535-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Oct 19 09:44:52 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00535-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Cianciullo:2021:OCD,
author = "Louis Cianciullo and Hossein Ghodosi",
title = "Outsourced cheating detection for secret sharing",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "6",
pages = "871--878",
month = dec,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-021-00538-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Oct 19 09:44:52 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-021-00538-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Bonte:2021:THM,
author = "Charlotte Bonte and Nigel P. Smart and Titouan
Tanguy",
title = "Thresholdizing {HashEdDSA}: {MPC} to the Rescue",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "6",
pages = "879--894",
month = dec,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-021-00539-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Oct 19 09:44:52 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/hash.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-021-00539-6",
abstract = "Following recent comments in a NIST document related
to threshold cryptographic standards, we examine the
case of thresholdizing the HashEdDSA signature scheme.
This is a deterministic signature scheme based on
Edwards elliptic curves. Unlike DSA, it has a
Schnorr-like signature equation, which is an advantage
for threshold implementations, but it has the
disadvantage of having the ephemeral secret obtained by
hashing the secret key and the message. We show that
one can obtain relatively efficient implementations of
threshold HashEdDSA with no modifications to the
behaviour of the signing algorithm; we achieve this
using a doubly authenticated bit (daBit) generation
protocol tailored for $ Q_2 $ access structures that is
more efficient than prior work. However, if one was to
modify the standard algorithm to use an MPC-friendly
hash function, such as Rescue, the performance becomes
very fast indeed.",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Kim:2022:DAD,
author = "Hee Yeon Kim and Ji Hoon Kim and Kyounggon Kim",
title = "{DAPP}: automatic detection and analysis of prototype
pollution vulnerability in \pkg{Node.js} modules",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "1",
pages = "1--23",
month = feb,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00537-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Feb 14 11:57:44 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-020-00537-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Shin:2022:NSS,
author = "Hansub Shin and Sungyong Sim and Younho Lee",
title = "A new smart smudge attack using {CNN}",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "1",
pages = "25--36",
month = feb,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-021-00540-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Feb 14 11:57:44 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-021-00540-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Stergiopoulos:2022:AAA,
author = "George Stergiopoulos and Panagiotis Dedousis and
Dimitris Gritzalis",
title = "Automatic analysis of attack graphs for risk
mitigation and prioritization on large-scale and
complex networks in {Industry 4.0}",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "1",
pages = "37--59",
month = feb,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00533-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Feb 14 11:57:44 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-020-00533-4",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Lyvas:2022:MME,
author = "Christos Lyvas and Christoforos Ntantogian and
Christos Xenakis",
title = "\pkg{[m]allotROPism}: a metamorphic engine for
malicious software variation development",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "1",
pages = "61--78",
month = feb,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-021-00541-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Feb 14 11:57:44 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-021-00541-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Sheikhalishahi:2022:PPD,
author = "Mina Sheikhalishahi and Andrea Saracino and Antonio
{La Marra}",
title = "Privacy preserving data sharing and analysis for
edge-based architectures",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "1",
pages = "79--101",
month = feb,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-021-00542-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Feb 14 11:57:44 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-021-00542-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Braeken:2022:PKV,
author = "An Braeken",
title = "Public key versus symmetric key cryptography in
client--server authentication protocols",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "1",
pages = "103--114",
month = feb,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-021-00543-w",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Feb 14 11:57:44 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-021-00543-w",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Yaacoub:2022:RCS,
author = "Jean-Paul A. Yaacoub and Hassan N. Noura and Ali
Chehab",
title = "Robotics cyber security: vulnerabilities, attacks,
countermeasures, and recommendations",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "1",
pages = "115--158",
month = feb,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-021-00545-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Feb 14 11:57:44 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-021-00545-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Anonymous:2022:TS,
author = "Anonymous",
title = "Track for surveys",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "1",
pages = "159--159",
month = feb,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-021-00546-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Feb 14 11:57:44 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-021-00546-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Yichiet:2022:SAL,
author = "Aun Yichiet and Yen-Min Jasmina Khaw and Vasaki
Ponnusamy",
title = "A semantic-aware log generation method for network
activities",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "2",
pages = "161--177",
month = apr,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-021-00547-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Thu Mar 24 07:43:45 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-021-00547-6",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Tommasi:2022:BMB,
author = "Franco Tommasi and Christian Catalano and Ivan
Taurino",
title = "{Browser-in-the-Middle (BitM)} attack",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "2",
pages = "179--189",
month = apr,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-021-00548-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Thu Mar 24 07:43:45 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-021-00548-5",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Melo:2022:IAI,
author = "Roberto Vasconcelos Melo and Douglas D. J. de Macedo
and Mauricio Martinuzzi Fiorenza",
title = "{ISM-AC}: an immune security model based on alert
correlation and software-defined networking",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "2",
pages = "191--205",
month = apr,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-021-00550-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Thu Mar 24 07:43:45 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-021-00550-x",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Hougaard:2022:ALO,
author = "Hector B. Hougaard and Atsuko Miyaji",
title = "Authenticated logarithmic-order supersingular isogeny
group key exchange",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "2",
pages = "207--221",
month = apr,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-021-00549-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Thu Mar 24 07:43:45 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-021-00549-4",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Munonye:2022:MLA,
author = "Kindson Munonye and Martinek P{\'e}ter",
title = "Machine learning approach to vulnerability detection
in {OAuth 2.0} authentication and authorization flow",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "2",
pages = "223--237",
month = apr,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-021-00551-w",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Thu Mar 24 07:43:45 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-021-00551-w",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Yildirim:2022:MIT,
author = "Metehan Yildirim and Emin Anarim",
title = "Mitigating insider threat by profiling users based on
mouse usage pattern: ensemble learning and frequency
domain analysis",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "2",
pages = "239--251",
month = apr,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-021-00544-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Thu Mar 24 07:43:45 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-021-00544-9",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Bajic:2022:ABN,
author = "Alexander Bajic and Georg T. Becker",
title = "Automated benchmark network diversification for
realistic attack simulation with application to moving
target defense",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "2",
pages = "253--278",
month = apr,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-021-00552-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Thu Mar 24 07:43:45 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-021-00552-9",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Mimura:2022:ANT,
author = "Mamoru Mimura and Ryo Ito",
title = "Applying {NLP} techniques to malware detection in a
practical environment",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "2",
pages = "279--291",
month = apr,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-021-00553-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Thu Mar 24 07:43:45 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-021-00553-8",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Erdodi:2022:AWM,
author = "L{\'a}szl{\'o} Erd{\H{o}}di and Fabio Massimo
Zennaro",
title = "The {Agent Web Model}: modeling web hacking for
reinforcement learning",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "2",
pages = "293--309",
month = apr,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-021-00554-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Thu Mar 24 07:43:45 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-021-00554-7",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Lee:2022:SPM,
author = "Junwon Lee and Heejo Lee",
title = "An {SSH} predictive model using machine learning with
web proxy session logs",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "2",
pages = "311--322",
month = apr,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-021-00555-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Thu Mar 24 07:43:45 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-021-00555-6",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Hadjadj:2022:OPF,
author = "Taha Elamine Hadjadj and Adel Bouhoula and Riadh
Ksantini",
title = "Optimization of parallel firewalls filtering rules",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "2",
pages = "323--340",
month = apr,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-021-00557-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Thu Mar 24 07:43:45 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-021-00557-4",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Zhang:2022:THG,
author = "Zheng Zhang and Shaohao Xie and Fangguo Zhang",
title = "Topology-hiding garbled circuits without universal
circuits",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "2",
pages = "341--356",
month = apr,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-021-00556-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Thu Mar 24 07:43:45 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-021-00556-5",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Kazoleas:2022:NMR,
author = "Ioannis Kazoleas and Panagiotis Karampelas",
title = "A novel malicious remote administration tool using
stealth and self-defense techniques",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "2",
pages = "357--378",
month = apr,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-021-00559-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Thu Mar 24 07:43:45 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-021-00559-2",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Ahmad:2022:EAC,
author = "Tahir Ahmad and Umberto Morelli and Nicola Zannone",
title = "Extending access control in {AWS} {IoT} through
event-driven functions: an experimental evaluation
using a smart lock system",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "2",
pages = "379--408",
month = apr,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-021-00558-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Thu Mar 24 07:43:45 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-021-00558-3",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Parish:2022:PGU,
author = "Zach Parish and Connor Cushing and Julie Thorpe",
title = "Password guessers under a microscope: an in-depth
analysis to inform deployments",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "2",
pages = "409--425",
month = apr,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-021-00560-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Thu Mar 24 07:43:45 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-021-00560-9",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Bhattacharjya:2022:EVS,
author = "Sairath Bhattacharjya and Hossein Saiedian",
title = "Establishing and validating secured keys for {IoT}
devices: using {P3} connection model on a cloud-based
architecture",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "3",
pages = "427--436",
month = jun,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-021-00562-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat May 28 06:50:21 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-021-00562-7",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Spence:2022:SBC,
author = "Aaron Spence and Shaun Bangay",
title = "Security beyond cybersecurity: side-channel attacks
against non-cyber systems and their countermeasures",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "3",
pages = "437--453",
month = jun,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-021-00563-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat May 28 06:50:21 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-021-00563-6",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Park:2022:EDP,
author = "Cheolhee Park and Dowon Hong and Changho Seo",
title = "Evaluating differentially private decision tree model
over model inversion attack",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "3",
pages = "1--14",
month = jun,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-021-00564-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat May 28 06:50:21 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-021-00564-5",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Alghamdi:2022:NTA,
author = "Saleh A. Alghamdi",
title = "Novel trust-aware intrusion detection and prevention
system for {5G} {MANET-Cloud}",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "3",
pages = "469--488",
month = jun,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00531-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat May 28 06:50:21 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-020-00531-6",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Ghorbel:2022:APP,
author = "Amal Ghorbel and Mahmoud Ghorbel and Mohamed Jmaiel",
title = "Accountable privacy preserving attribute-based access
control for cloud services enforced using blockchain",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "3",
pages = "489--508",
month = jun,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-021-00565-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat May 28 06:50:21 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-021-00565-4",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Zhang:2022:RLA,
author = "Lu Zhang and Arie Taal and Paola Grosso",
title = "A risk-level assessment system based on the
{STRIDE\slash DREAD} model for digital data
marketplaces",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "3",
pages = "509--525",
month = jun,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-021-00566-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat May 28 06:50:21 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-021-00566-3",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Singh:2022:IAM,
author = "Jaya Singh and Ayush Sinha and Om Prakash Vyas",
title = "Insider attack mitigation in a smart metering
infrastructure using reputation score and blockchain
technology",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "3",
pages = "527--546",
month = jun,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-021-00561-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat May 28 06:50:21 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-021-00561-8",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Soltani:2022:CBD,
author = "Mahdi Soltani and Mahdi Jafari Siavoshani and Amir
Hossein Jahangir",
title = "A content-based deep intrusion detection system",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "3",
pages = "547--562",
month = jun,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-021-00567-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat May 28 06:50:21 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-021-00567-2",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Tiplea:2022:NPD,
author = "Ferucio Laurentiu Tiplea",
title = "Narrow privacy and desynchronization in {Vaudenay}'s
{RFID} model",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "3",
pages = "563--575",
month = jun,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-021-00569-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat May 28 06:50:21 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-021-00569-0",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Khan:2022:PAK,
author = "Haibat Khan and Benjamin Dowling and Keith M. Martin",
title = "Pragmatic authenticated key agreement for {IEEE Std
802.15.6}",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "3",
pages = "577--595",
month = jun,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-021-00570-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat May 28 06:50:21 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-021-00570-7",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Potteiger:2022:DSR,
author = "Bradley Potteiger and Feiyang Cai and Xenofon
Koutsoukos",
title = "Data space randomization for securing cyber-physical
systems",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "3",
pages = "597--610",
month = jun,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-021-00568-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat May 28 06:50:21 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-021-00568-1",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Amraoui:2022:ABD,
author = "Noureddine Amraoui and Belhassen Zouari",
title = "Anomalous behavior detection-based approach for
authenticating smart home system users",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "3",
pages = "611--636",
month = jun,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-021-00571-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat May 28 06:50:21 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-021-00571-6",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Shah:2022:MLO,
author = "Ankit Shah and Rajesh Ganesan and Hasan Cam",
title = "Maintaining the level of operational effectiveness of
a {CSOC} under adverse conditions",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "3",
pages = "637--651",
month = jun,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-021-00573-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat May 28 06:50:21 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-021-00573-4",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Zulfiqar:2022:TAR,
author = "Maryam Zulfiqar and Muhammad Umar Janjua and Jack W.
Stokes",
title = "Tracking adoption of revocation and cryptographic
features in {X.509} certificates",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "3",
pages = "653--668",
month = jun,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-021-00572-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat May 28 06:50:21 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-021-00572-5",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{DArco:2022:GWP,
author = "P. D'Arco and R. {De Prisco} and R. Zaccagnino",
title = "{Gossamer}: weaknesses and performance",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "3",
pages = "669--687",
month = jun,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-021-00575-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat May 28 06:50:21 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-021-00575-2",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Zhang:2022:DTA,
author = "Xiaokuan Zhang and Jihun Hamm and Yinqian Zhang",
title = "Defeating traffic analysis via differential privacy: a
case study on streaming traffic",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "3",
pages = "689--706",
month = jun,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-021-00574-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat May 28 06:50:21 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-021-00574-3",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Huszti:2022:SPB,
author = "Andrea Huszti and Szabolcs Kov{\'a}cs and Norbert
Ol{\'a}h",
title = "Scalable, password-based and threshold authentication
for smart homes",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "4",
pages = "707--723",
month = aug,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00578-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Fri Jul 29 14:41:26 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00578-7",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Kim:2022:MPD,
author = "Jinsung Kim and Younghoon Ban and Jeong Hyun Yi",
title = "{MAPAS}: a practical deep learning-based {Android}
malware detection system",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "4",
pages = "725--738",
month = aug,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00579-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Fri Jul 29 14:41:26 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00579-6",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Zabihimayvan:2022:FLR,
author = "Mahdieh Zabihimayvan and Derek Doran",
title = "A first look at references from the dark to the
surface web world: a case study in {Tor}",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "4",
pages = "739--755",
month = aug,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00580-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Fri Jul 29 14:41:26 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00580-z",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Koike:2022:IOH,
author = "Kazuki Koike and Ryotaro Kobayashi and Masahiko
Katoh",
title = "{IoT}-oriented high-efficient anti-malware hardware
focusing on time series metadata extractable from
inside a processor core",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "4",
pages = "1--19",
month = aug,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-021-00577-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Fri Jul 29 14:41:26 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-021-00577-0",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Karl:2022:DNI,
author = "Ryan Karl and Hannah Burchfield and Taeho Jung",
title = "Developing non-interactive {MPC} with trusted hardware
for enhanced security",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "4",
pages = "777--797",
month = aug,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00583-w",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Fri Jul 29 14:41:26 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00583-w",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Gong:2022:TDR,
author = "Qian Gong and Phil DeMar and Mine Altunay",
title = "{ThunderSecure}: deploying real-time intrusion
detection for {100G} research networks by leveraging
stream-based features and one-class classification
network",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "4",
pages = "799--812",
month = aug,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00584-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Fri Jul 29 14:41:26 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00584-9",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Zenitani:2022:MOC,
author = "Kengo Zenitani",
title = "A multi-objective cost-benefit optimization algorithm
for network hardening",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "4",
pages = "813--832",
month = aug,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00586-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Fri Jul 29 14:41:26 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00586-7",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Komano:2022:CBS,
author = "Yuichi Komano and Takaaki Mizuki",
title = "Coin-based Secure Computations",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "4",
pages = "833--846",
month = aug,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00585-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Fri Jul 29 14:41:26 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00585-8",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Saifuzzaman:2022:SLR,
author = "Munshi Saifuzzaman and Tajkia Nuri Ananna and Farida
Chowdhury",
title = "A systematic literature review on wearable health data
publishing under differential privacy",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "4",
pages = "847--872",
month = aug,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-021-00576-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Fri Jul 29 14:41:26 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-021-00576-1",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Agrawal:2022:SAE,
author = "Ankit Agrawal and Ashutosh Bhatia and Rekha Kaushik",
title = "A survey on analyzing encrypted network traffic of
mobile devices",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "4",
pages = "873--915",
month = aug,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00581-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Fri Jul 29 14:41:26 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00581-y",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Zia:2022:SIE,
author = "Unsub Zia and Mark McCartney and Ali Sajjad",
title = "Survey on image encryption techniques using chaotic
maps in spatial, transform and spatiotemporal domains",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "4",
pages = "917--935",
month = aug,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00588-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Fri Jul 29 14:41:26 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00588-5",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Tan:2022:CPQ,
author = "Teik Guan Tan and Pawel Szalachowski and Jianying
Zhou",
title = "Challenges of post-quantum digital signing in
real-world applications: a survey",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "4",
pages = "937--952",
month = aug,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00587-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Fri Jul 29 14:41:26 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00587-6",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Park:2022:EVC,
author = "Jai Hyun Park and Jung Hee Cheon and Dongwoo Kim",
title = "Efficient verifiable computation over quotient
polynomial rings",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "5",
pages = "953--971",
month = oct,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00590-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Sep 24 10:44:14 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00590-x",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Lyvas:2022:EIS,
author = "Christos Lyvas and Costas Lambrinoudakis and Dimitris
Geneiatakis",
title = "\pkg{IntentAuth}: Securing {Android}'s intent-based
inter-process communication",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "5",
pages = "973--982",
month = oct,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00592-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Sep 24 10:44:14 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00592-9",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Singh:2022:DAI,
author = "Ram Govind Singh and Ananya Shrivastava and Sushmita
Ruj",
title = "A Digital Asset Inheritance Model to Convey Online
Persona Posthumously",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "5",
pages = "983--1003",
month = oct,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00593-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Sep 24 10:44:14 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00593-8",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Agostini:2022:BBM,
author = "E. Agostini and M. Bernaschi",
title = "{BitCracker}: {BitLocker} meets {GPUs}",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "5",
pages = "1005--1018",
month = oct,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00589-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Sep 24 10:44:14 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00589-4",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Ahmim:2022:SAT,
author = "Ilyes Ahmim and Nacira Ghoualmi-Zine and Marwa Ahmim",
title = "Security analysis on ``{Three}-factor authentication
protocol using physical unclonable function for
{IoV}''",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "5",
pages = "1019--1026",
month = oct,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00595-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Sep 24 10:44:14 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00595-6",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Armour:2022:ASA,
author = "Marcel Armour and Bertram Poettering",
title = "Algorithm substitution attacks against receivers",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "5",
pages = "1027--1050",
month = oct,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00596-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Sep 24 10:44:14 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00596-5",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Camtepe:2022:ABC,
author = "Seyit Camtepe and Jarek Duda and Josef Pieprzyk",
title = "{ANS}-based compression and encryption with 128-bit
security",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "5",
pages = "1051--1067",
month = oct,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00597-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Sep 24 10:44:14 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00597-4",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Pericas-Gornals:2022:HPB,
author = "Rosa Peric{\`a}s-Gornals and Maci{\`a} Mut-Puigserver
and M. Magdalena Payeras-Capell{\`a}",
title = "Highly private blockchain-based management system for
digital {COVID-19} certificates",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "5",
pages = "1069--1090",
month = oct,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00598-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Sep 24 10:44:14 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00598-3",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Vlachos:2022:SOS,
author = "Vasileios Vlachos and Yannis C. Stamatiou and Sotiris
Nikoletseas",
title = "The {SAINT} observatory subsystem: an open-source
intelligence tool for uncovering cybersecurity
threats",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "5",
pages = "1091--1106",
month = oct,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00599-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Sep 24 10:44:14 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00599-2",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Cevik:2022:LAG,
author = "Beyza Cevik and Nur Altiparmak and Sevil Sen",
title = "{Lib2Desc}: automatic generation of security-centric
{Android} app descriptions using third-party
libraries",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "5",
pages = "1107--1125",
month = oct,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00601-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Sep 24 10:44:14 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00601-x",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Inayoshi:2022:VUT,
author = "Hiroki Inayoshi and Shohei Kakei and Shoichi Saito",
title = "Value-utilized taint propagation: toward precise
detection of apps' information flows across {Android}
{API} calls",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "5",
pages = "1127--1149",
month = oct,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00603-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Sep 24 10:44:14 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00603-9",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Borges:2022:AUE,
author = "Ricard Borges and Francesc Seb{\'e} and Magda Valls",
title = "An anonymous and unlinkable electronic toll collection
system",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "5",
pages = "1151--1162",
month = oct,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00604-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Sep 24 10:44:14 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00604-8",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Jeet:2022:SIP,
author = "Rabari Jeet and P. Arun Raj Kumar",
title = "A survey on interest packet flooding attacks and its
countermeasures in named data networking",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "5",
pages = "1163--1187",
month = oct,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00591-w",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Sep 24 10:44:14 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00591-w",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Syrmakesis:2022:CRA,
author = "Andrew D. Syrmakesis and Cristina Alcaraz and Nikos D.
Hatziargyriou",
title = "Classifying resilience approaches for protecting smart
grids against cyber threats",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "5",
pages = "1189--1210",
month = oct,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00594-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Sep 24 10:44:14 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00594-7",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Lygerou:2022:DHI,
author = "Irini Lygerou and Shreyas Srinivasa and Dimitris
Gritzalis",
title = "A decentralized honeypot for {IoT} Protocols based on
{Android} devices",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "6",
pages = "1211--1222",
month = dec,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00605-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Oct 15 16:48:15 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
note = "See correction \cite{Lygerou:2023:CDH}.",
URL = "https://link.springer.com/article/10.1007/s10207-022-00605-7",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Fu:2022:CGP,
author = "Bingxue Fu and Xing Yu and Tao Feng",
title = "{CT-GCN}: a phishing identification model for
blockchain cryptocurrency transactions",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "6",
pages = "1223--1232",
month = dec,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00606-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Oct 15 16:48:15 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00606-6",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Templ:2022:SOM,
author = "Matthias Templ and Murat Sariyar",
title = "A systematic overview on methods to protect sensitive
data provided for various analyses",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "6",
pages = "1233--1246",
month = dec,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00607-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Oct 15 16:48:15 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00607-5",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Kifouche:2022:DIN,
author = "Abdenour Kifouche and Mohamed Salah Azzaz and Remy
Kocik",
title = "Design and implementation of a new lightweight
chaos-based cryptosystem to secure {IoT}
communications",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "6",
pages = "1247--1262",
month = dec,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00609-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Oct 15 16:48:15 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00609-3",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Prajisha:2022:EID,
author = "C. Prajisha and A. R. Vasudevan",
title = "An efficient intrusion detection system for {MQTT-IoT}
using enhanced chaotic salp swarm algorithm and
{LightGBM}",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "6",
pages = "1263--1282",
month = dec,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00611-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Oct 15 16:48:15 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00611-9",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Picazo-Sanchez:2022:CEC,
author = "Pablo Picazo-Sanchez and Lara Ortiz-Martin and Andrei
Sabelfeld",
title = "Are chrome extensions compliant with the spirit of
least privilege?",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "6",
pages = "1283--1297",
month = dec,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00610-w",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Oct 15 16:48:15 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00610-w",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Adewole:2022:DDL,
author = "Kayode S. Adewole and Vicen{\c{c}} Torra",
title = "{DFTMicroagg}: a dual-level anonymization algorithm
for smart grid data",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "6",
pages = "1299--1321",
month = dec,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00612-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Oct 15 16:48:15 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00612-8",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Skopik:2022:SDA,
author = "Florian Skopik and Arndt Bonitz and G{\"u}nter
G{\"o}hler",
title = "From scattered data to actionable knowledge: flexible
cyber security reporting in the military domain",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "6",
pages = "1323--1347",
month = dec,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00613-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Oct 15 16:48:15 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00613-7",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Torra:2022:PFP,
author = "Vicen{\c{c}} Torra and Edgar Galv{\'a}n and Guillermo
Navarro-Arribas",
title = "{PSO + FL = PAASO}: particle swarm optimization +
federated learning = privacy-aware agent swarm
optimization",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "6",
pages = "1349--1359",
month = dec,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00614-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Oct 15 16:48:15 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00614-6",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Yang:2022:SAI,
author = "Xiaodong Yang and Wenjia Wang and Caifen Wang",
title = "Security analysis and improvement of a
privacy-preserving authentication scheme in {VANET}",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "6",
pages = "1361--1371",
month = dec,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00617-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Oct 15 16:48:15 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00617-3",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Abdussami:2022:LLA,
author = "Mohammad Abdussami and Ruhul Amin and Satyanarayana
Vollala",
title = "{LASSI}: a lightweight authenticated key agreement
protocol for fog-enabled {IoT} deployment",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "6",
pages = "1373--1387",
month = dec,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00619-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Oct 15 16:48:15 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00619-1",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Kishore:2022:SPD,
author = "R. Kishore and I. Ioannou and A. Pitsillides",
title = "A security protocol for {D2D} communications in {5G}
networks using elliptic curve cryptography",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "6",
pages = "1389--1408",
month = dec,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00620-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Oct 15 16:48:15 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00620-8",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Kumar:2022:SML,
author = "Raju Kumar and Aruna Bhat",
title = "A study of machine learning-based models for
detection, control, and mitigation of cyberbullying in
online social media",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "6",
pages = "1409--1431",
month = dec,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00600-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Oct 15 16:48:15 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00600-y",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Sah:2023:IDS,
author = "Gulab Sah and Subhasish Banerjee and Sweety Singh",
title = "Intrusion detection system over real-time data traffic
using machine learning methods with feature selection
approaches",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "1",
pages = "1--27",
month = feb,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00616-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Fri Mar 17 09:48:22 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00616-4",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Picazo-Sanchez:2023:GIP,
author = "Pablo Picazo-Sanchez and Magnus Almgren",
title = "{Gridchain}: an investigation of privacy for the
future local distribution grid",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "1",
pages = "29--46",
month = feb,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00622-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Fri Mar 17 09:48:22 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00622-6",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Hannousse:2023:DLM,
author = "Abdelhakim Hannousse and Mohamed Cherif Nait-Hamoud
and Salima Yahiouche",
title = "A deep learner model for multi-language webshell
detection",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "1",
pages = "47--61",
month = feb,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00615-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Fri Mar 17 09:48:22 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00615-5",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Sangari:2023:MRD,
author = "Seema Sangari and Eric Dallal and Michael Whitman",
title = "Modeling reporting delays in cyber incidents: an
industry-level comparison",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "1",
pages = "63--76",
month = feb,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00623-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Fri Mar 17 09:48:22 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00623-5",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Rajic:2023:EWA,
author = "Branislav Raji{\'c} and Zarko Stanisavljevi{\'c} and
Pavle Vuleti{\'c}",
title = "Early web application attack detection using network
traffic analysis",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "1",
pages = "77--91",
month = feb,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00627-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Fri Mar 17 09:48:22 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00627-1",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Rathore:2023:RDL,
author = "Nemi Chandra Rathore and Somanath Tripathy",
title = "Restricting data-leakage using fine-grained access
control on {OSN} objects",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "1",
pages = "93--106",
month = feb,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00629-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Fri Mar 17 09:48:22 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00629-z",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Balikcioglu:2023:MCD,
author = "Pinar G. Balikcioglu and Melih Sirlanci and Ozge A.
Kucuk and Bulut Ulukapi and Ramazan K. Turkmen and
Cengiz Acarturk",
title = "Malicious code detection in {Android}: the role of
sequence characteristics and disassembling methods",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "1",
pages = "107--118",
month = feb,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00626-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Fri Mar 17 09:48:22 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00626-2",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Sharma:2023:NAD,
author = "Amit Sharma and Brij B. Gupta and Awadhesh Kumar Singh
and V. K. Saraswat",
title = "A novel approach for detection of {APT} malware using
multi-dimensional hybrid {Bayesian} belief network",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "1",
pages = "119--135",
month = feb,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00631-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Fri Mar 17 09:48:22 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00631-5",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Hamzenejadi:2023:MBD,
author = "Sajad Hamzenejadi and Mahdieh Ghazvini and
Seyedamiryousef Hosseini",
title = "Mobile botnet detection: a comprehensive survey",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "1",
pages = "137--175",
month = feb,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00624-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Fri Mar 17 09:48:22 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00624-4",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Rastogi:2023:RFN,
author = "Shubhangi Rastogi and Divya Bansal",
title = "A review on fake news detection {3T's}: typology, time
of detection, taxonomies",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "1",
pages = "177--212",
month = feb,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00625-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Fri Mar 17 09:48:22 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00625-3",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Suren:2023:PPA,
author = "Emre S{\"u}ren and Fredrik Heiding and Johannes
Oleg{\aa}rd and Robert Lagerstr{\"o}m",
title = "{PatrIoT}: practical and agile threat research for
{IoT}",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "1",
pages = "213--233",
month = feb,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00633-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Fri Mar 17 09:48:22 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00633-3",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Mohamed:2023:DSB,
author = "Safa Mohamed and Ridha Ejbali",
title = "Deep {SARSA}-based reinforcement learning approach for
anomaly network intrusion detection system",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "1",
pages = "235--247",
month = feb,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00634-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Fri Mar 17 09:48:22 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00634-2",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Amro:2023:CRM,
author = "Ahmed Amro and Vasileios Gkioulos",
title = "Cyber risk management for autonomous passenger ships
using threat-informed defense-in-depth",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "1",
pages = "249--288",
month = feb,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00638-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Fri Mar 17 09:48:22 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00638-y",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Alawneh:2023:UIU,
author = "Luay Alawneh and Mohammad Al-Zinati and Mahmoud
Al-Ayyoub",
title = "User identification using deep learning and human
activity mobile sensor data",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "1",
pages = "289--301",
month = feb,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00640-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Fri Mar 17 09:48:22 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00640-4",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Lygerou:2023:CDH,
author = "Irini Lygerou and Shreyas Srinivasa and Emmanouil
Vasilomanolakis and George Stergiopoulos and Dimitris
Gritzalis",
title = "Correction to: {A decentralized honeypot for IoT
Protocols based on Android devices}",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "1",
pages = "303--303",
month = feb,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00628-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Fri Mar 17 09:48:22 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
note = "See \cite{Lygerou:2022:DHI}.",
URL = "https://link.springer.com/article/10.1007/s10207-022-00628-0",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{An:2023:HEL,
author = "Qin An and Wilson Cheong Hin Hong and XiaoShu Xu and
Yunfeng Zhang and Kimberly Kolletar-Zhu",
title = "How education level influences {Internet} security
knowledge, behaviour, and attitude: a comparison among
undergraduates, postgraduates and working graduates",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "2",
pages = "305--317",
month = apr,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00637-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Fri Mar 17 09:48:23 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00637-z",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Kuzlu:2023:ASM,
author = "Murat Kuzlu and Ferhat Ozgur Catak and Umit Cali and
Evren Catak and Ozgur Guler",
title = "Adversarial security mitigations of {mmWave}
beamforming prediction models using defensive
distillation and adversarial retraining",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "2",
pages = "319--332",
month = apr,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00644-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Fri Mar 17 09:48:23 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00644-0",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Swati:2023:DAD,
author = "Swati and Sangita Roy and Jawar Singh and Jimson
Mathew",
title = "Design and analysis of {DDoS} mitigating network
architecture",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "2",
pages = "333--345",
month = apr,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00635-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Fri Mar 17 09:48:23 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00635-1",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Chatzoglou:2023:RQA,
author = "Efstratios Chatzoglou and Vasileios Kouliaridis and
Georgios Karopoulos and Georgios Kambourakis",
title = "Revisiting {QUIC} attacks: a comprehensive review on
{QUIC} security and a hands-on study",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "2",
pages = "347--365",
month = apr,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00630-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Fri Mar 17 09:48:23 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00630-6",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Mohammadi:2023:HML,
author = "Reza Mohammadi and Chhagan Lal and Mauro Conti",
title = "{HTTPScout}: a Machine Learning based Countermeasure
for {HTTP} Flood Attacks in {SDN}",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "2",
pages = "367--379",
month = apr,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00641-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Fri Mar 17 09:48:23 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00641-3",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Andriotis:2023:BDU,
author = "Panagiotis Andriotis and Myles Kirby and Atsuhiro
Takasu",
title = "\pkg{Bu-Dash}: a universal and dynamic graphical
password scheme (extended version)",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "2",
pages = "381--401",
month = apr,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00642-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Fri Mar 17 09:48:23 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00642-2",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Mishra:2023:SSU,
author = "Kailash Chandra Mishra and Subrata Dutta",
title = "A simple and secure user authentication scheme using
{Map Street View} with usability analysis based on
{ISO\slash IEC 25022}",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "2",
pages = "403--415",
month = apr,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00636-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Fri Mar 17 09:48:23 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00636-0",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Gandhi:2023:TUS,
author = "Kapilan Kulayan Arumugam Gandhi and Chamundeswari
Arumugam",
title = "Toward a unified and secure approach for extraction of
forensic digital evidence from an {IoT} device",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "2",
pages = "417--431",
month = apr,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00645-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Fri Mar 17 09:48:23 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00645-z",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Zhou:2023:IDA,
author = "Hanxun Zhou and Longyu Kang and Hong Pan and Guo Wei
and Yong Feng",
title = "An intrusion detection approach based on incremental
long short-term memory",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "2",
pages = "433--446",
month = apr,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00632-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Fri Mar 17 09:48:23 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib