Valid HTML 4.0! Valid CSS!
%%% -*-BibTeX-*-
%%% ====================================================================
%%%  BibTeX-file{
%%%     author          = "Nelson H. F. Beebe",
%%%     version         = "1.36",
%%%     date            = "16 September 2024",
%%%     time            = "15:24:25 MDT",
%%%     filename        = "intjinfosec.bib",
%%%     address         = "University of Utah
%%%                        Department of Mathematics, 110 LCB
%%%                        155 S 1400 E RM 233
%%%                        Salt Lake City, UT 84112-0090
%%%                        USA",
%%%     telephone       = "+1 801 581 5254",
%%%     FAX             = "+1 801 581 4148",
%%%     URL             = "https://www.math.utah.edu/~beebe",
%%%     checksum        = "60345 22403 85010 927162",
%%%     email           = "beebe at math.utah.edu, beebe at acm.org,
%%%                        beebe at computer.org (Internet)",
%%%     codetable       = "ISO/ASCII",
%%%     keywords        = "bibliography; BibTeX; International Journal
%%%                        of Information Security",
%%%     license         = "public domain",
%%%     supported       = "yes",
%%%     docstring       = "This is a COMPLETE bibliography of the
%%%                        International Journal of Information Security
%%%                        (CODEN none, ISSN 1615-5262 (print),
%%%                        1615-5270 (electronic)), published by
%%%                        Springer-Verlag.  Publication began with
%%%                        volume 1, number 1, in August 2001.  Journal
%%%                        issues appeared four times a year through
%%%                        2006, and since then, six times a year, with
%%%                        one volume per year.
%%%
%%%                        At version 1.36, the COMPLETE year coverage
%%%                        looked like this:
%%%
%%%                             2001 (   5)    2009 (  31)    2017 (  37)
%%%                             2002 (  10)    2010 (  26)    2018 (  43)
%%%                             2003 (   9)    2011 (  28)    2019 (  41)
%%%                             2004 (  22)    2012 (  29)    2020 (  47)
%%%                             2005 (  22)    2013 (  27)    2021 (  48)
%%%                             2006 (  22)    2014 (  35)    2022 (  78)
%%%                             2007 (  28)    2015 (  39)    2023 ( 110)
%%%                             2008 (  24)    2016 (  38)    2024 ( 162)
%%%
%%%                             Article:        961
%%%
%%%                             Total entries:  961
%%%
%%%                        Data for this bibliography have been derived
%%%                        primarily from the publisher Web site, with
%%%                        contributions from the BibNet Project and TeX
%%%                        User Group bibliography archives.
%%%
%%%                        Numerous errors in the publisher metadata
%%%                        sources noted above have been corrected.
%%%                        Spelling has been verified with the UNIX
%%%                        spell and GNU ispell programs using the
%%%                        exception dictionary stored in the companion
%%%                        file with extension .sok.
%%%
%%%                        BibTeX citation tags are uniformly chosen
%%%                        as name:year:abbrev, where name is the
%%%                        family name of the first author or editor,
%%%                        year is a 4-digit number, and abbrev is a
%%%                        3-letter condensation of important title
%%%                        words. Citation tags were automatically
%%%                        generated by software developed for the
%%%                        BibNet Project.
%%%
%%%                        In this bibliography, journal entries are
%%%                        sorted in publication order, using
%%%                        bibsort -byvolume.
%%%
%%%                        The checksum field above contains a CRC-16
%%%                        checksum as the first value, followed by the
%%%                        equivalent of the standard UNIX wc (word
%%%                        count) utility output of lines, words, and
%%%                        characters.  This is produced by Robert
%%%                        Solovay's checksum utility.",
%%%  }
%%% ====================================================================
@Preamble{
 "\ifx \undefined \booktitle \def \booktitle#1{{{\em #1}}} \fi" #
 "\ifx \undefined \pkg       \def \pkg       #1{{{\tt #1}}} \fi"
}

%%% ====================================================================
%%% Acknowledgement abbreviations:
@String{ack-nhfb = "Nelson H. F. Beebe,
                    University of Utah,
                    Department of Mathematics, 110 LCB,
                    155 S 1400 E RM 233,
                    Salt Lake City, UT 84112-0090, USA,
                    Tel: +1 801 581 5254,
                    FAX: +1 801 581 4148,
                    e-mail: \path|beebe@math.utah.edu|,
                            \path|beebe@acm.org|,
                            \path|beebe@computer.org| (Internet),
                    URL: \path|https://www.math.utah.edu/~beebe/|"}

%%% ====================================================================
%%% Journal abbreviations:
@String{j-INT-J-INFO-SEC        = "International Journal of Information
                                  Security"}

%%% ====================================================================
%%% Bibliography entries, in publication order, with ``bibsort -byvol'':
@Article{Gollman:2001:E,
  author =       "Dieter Gollman and Catherine A. Meadows and Eiji
                 Okamoto",
  title =        "Editorial",
  journal =      j-INT-J-INFO-SEC,
  volume =       "1",
  number =       "1",
  pages =        "1--2",
  month =        aug,
  year =         "2001",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s102070100004",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:21 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s102070100004",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Landwehr:2001:CS,
  author =       "Carl E. Landwehr",
  title =        "Computer security",
  journal =      j-INT-J-INFO-SEC,
  volume =       "1",
  number =       "1",
  pages =        "3--13",
  month =        aug,
  year =         "2001",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s102070100003",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:21 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s102070100003",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{McHugh:2001:IID,
  author =       "John McHugh",
  title =        "Intrusion and intrusion detection",
  journal =      j-INT-J-INFO-SEC,
  volume =       "1",
  number =       "1",
  pages =        "14--35",
  month =        aug,
  year =         "2001",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s102070100001",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:21 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s102070100001",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Johnson:2001:ECD,
  author =       "Don Johnson and Alfred Menezes and Scott Vanstone",
  title =        "The {Elliptic Curve Digital Signature Algorithm
                 (ECDSA)}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "1",
  number =       "1",
  pages =        "36--63",
  month =        aug,
  year =         "2001",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s102070100002",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:21 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s102070100002",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Blundo:2001:PDI,
  author =       "Carlo Blundo and Paolo D'Arco and Alfredo {De
                 Santis}",
  title =        "A $t$-private $k$-database information retrieval
                 scheme",
  journal =      j-INT-J-INFO-SEC,
  volume =       "1",
  number =       "1",
  pages =        "64--68",
  month =        aug,
  year =         "2001",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s102070100005",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:21 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s102070100005",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Monrose:2002:PHB,
  author =       "Fabian Monrose and Michael K. Reiter and Susanne
                 Wetzel",
  title =        "Password hardening based on keystroke dynamics",
  journal =      j-INT-J-INFO-SEC,
  volume =       "1",
  number =       "2",
  pages =        "69--83",
  month =        feb,
  year =         "2002",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s102070100006",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:21 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s102070100006",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Rodeh:2002:UAT,
  author =       "Ohad Rodeh and Kenneth P. Birman and Danny Dolev",
  title =        "Using {AVL} trees for fault-tolerant group key
                 management",
  journal =      j-INT-J-INFO-SEC,
  volume =       "1",
  number =       "2",
  pages =        "84--99",
  month =        feb,
  year =         "2002",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s102070100008",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:21 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s102070100008",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Damiani:2002:SSS,
  author =       "E. Damiani and S. {De Capitani di Vimercati} and S.
                 Paraboschi and P. Samarati",
  title =        "Securing {SOAP} e-services",
  journal =      j-INT-J-INFO-SEC,
  volume =       "1",
  number =       "2",
  pages =        "100--115",
  month =        feb,
  year =         "2002",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s102070100009",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:21 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s102070100009",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kudo:2002:PPB,
  author =       "Michiharu Kudo",
  title =        "{PBAC}: Provision-based access control model",
  journal =      j-INT-J-INFO-SEC,
  volume =       "1",
  number =       "2",
  pages =        "116--130",
  month =        feb,
  year =         "2002",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s102070100010",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:21 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s102070100010",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Mizuki:2002:CCF,
  author =       "Takaaki Mizuki and Hiroki Shizuya and Takao
                 Nishizeki",
  title =        "A complete characterization of a family of key
                 exchange protocols",
  journal =      j-INT-J-INFO-SEC,
  volume =       "1",
  number =       "2",
  pages =        "131--142",
  month =        feb,
  year =         "2002",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s102070100011",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:21 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s102070100011",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Steinwandt:2002:APB,
  author =       "Rainer Steinwandt and Willi Geiselmann and Regine
                 Endsuleit",
  title =        "Attacking a polynomial-based cryptosystem: {Polly}
                 Cracker",
  journal =      j-INT-J-INFO-SEC,
  volume =       "1",
  number =       "3",
  pages =        "143--148",
  month =        nov,
  year =         "2002",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-002-0012-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:21 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-002-0012-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Itakura:2002:PPI,
  author =       "Yukio Itakura and Masaki Hashiyada and Toshio
                 Nagashima and Shigeo Tsujii",
  title =        "Proposal on personal identifiers generated from the
                 {STR} information of {DNA}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "1",
  number =       "3",
  pages =        "149--160",
  month =        nov,
  year =         "2002",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-002-0013-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:21 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-002-0013-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Nieto:2002:KRC,
  author =       "J. M. Gonz{\'a}les Nieto and K. Viswanathan and C.
                 Boyd and A. Clark and E. Dawson",
  title =        "Key recovery for the commercial environment",
  journal =      j-INT-J-INFO-SEC,
  volume =       "1",
  number =       "3",
  pages =        "161--174",
  month =        nov,
  year =         "2002",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-002-0014-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:21 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-002-0014-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kim:2002:NEC,
  author =       "S. Kim and H. Oh",
  title =        "A new electronic check system with reusable refunds",
  journal =      j-INT-J-INFO-SEC,
  volume =       "1",
  number =       "3",
  pages =        "175--188",
  month =        nov,
  year =         "2002",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-002-0015-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:21 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-002-0015-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Dawson:2002:CCP,
  author =       "Ed Dawson and Kapali Viswanathan and Colin Boyd",
  title =        "Compliant cryptologic protocols",
  journal =      j-INT-J-INFO-SEC,
  volume =       "1",
  number =       "3",
  pages =        "189--202",
  month =        nov,
  year =         "2002",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-002-0016-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:21 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-002-0016-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Korzhik:2003:HAB,
  author =       "Valery Korzhik and Guillermo Morales-Luna",
  title =        "Hybrid authentication based on noisy channels",
  journal =      j-INT-J-INFO-SEC,
  volume =       "1",
  number =       "4",
  pages =        "203--210",
  month =        jul,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-002-0017-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:22 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-002-0017-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Ruan:2003:FGB,
  author =       "Chun Ruan and Vijay Varadharajan",
  title =        "A formal graph based framework for supporting
                 authorization delegations and conflict resolutions",
  journal =      j-INT-J-INFO-SEC,
  volume =       "1",
  number =       "4",
  pages =        "211--222",
  month =        jul,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-003-0018-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:22 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-003-0018-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kremer:2003:FMP,
  author =       "Steve Kremer and Olivier Markowitch",
  title =        "Fair multi-party non-repudiation protocols",
  journal =      j-INT-J-INFO-SEC,
  volume =       "1",
  number =       "4",
  pages =        "223--235",
  month =        jul,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-003-0019-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:22 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-003-0019-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Carminati:2003:MAC,
  author =       "Barbara Carminati and Elena Ferrari",
  title =        "Management of access control policies for {XML}
                 document sources",
  journal =      j-INT-J-INFO-SEC,
  volume =       "1",
  number =       "4",
  pages =        "236--260",
  month =        jul,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-003-0020-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:22 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-003-0020-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{MacKenzie:2003:NCD,
  author =       "Philip MacKenzie and Michael K. Reiter",
  title =        "Networked cryptographic devices resilient to capture",
  journal =      j-INT-J-INFO-SEC,
  volume =       "2",
  number =       "1",
  pages =        "1--20",
  month =        nov,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-003-0022-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:22 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-003-0022-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Gurgens:2003:ACP,
  author =       "Sigrid G{\"u}rgens and Javier Lopez and Ren{\'e}
                 Peralta",
  title =        "Analysis of e-commerce protocols: Adapting a
                 traditional technique",
  journal =      j-INT-J-INFO-SEC,
  volume =       "2",
  number =       "1",
  pages =        "21--36",
  month =        nov,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-003-0021-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:22 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-003-0021-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Baek:2003:ZSP,
  author =       "Joonsang Baek and Yuliang Zheng",
  title =        "{Zheng} and {Seberry}'s public key encryption scheme
                 revisited",
  journal =      j-INT-J-INFO-SEC,
  volume =       "2",
  number =       "1",
  pages =        "37--44",
  month =        nov,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-003-0023-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:22 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-003-0023-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bertino:2003:CBF,
  author =       "Elisa Bertino and Elena Ferrari and Andrea Perego",
  title =        "Content-based filtering of {Web} documents: the {MaX}
                 system and the {EUFORBIA} project",
  journal =      j-INT-J-INFO-SEC,
  volume =       "2",
  number =       "1",
  pages =        "45--58",
  month =        nov,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-003-0024-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:22 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-003-0024-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Geiselmann:2003:AIP,
  author =       "Willi Geiselmann and Willi Meier and Rainer
                 Steinwandt",
  title =        "An attack on the isomorphisms of polynomials problem
                 with one secret",
  journal =      j-INT-J-INFO-SEC,
  volume =       "2",
  number =       "1",
  pages =        "59--64",
  month =        nov,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-003-0025-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:22 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-003-0025-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Dawson:2004:PSI,
  author =       "E. Dawson",
  title =        "Preface to the special issue on {PKI}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "2",
  number =       "2",
  pages =        "65--65",
  month =        jan,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-003-0031-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:22 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-003-0031-7;
                 http://link.springer.com/content/pdf/10.1007/s10207-003-0031-7.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Blakley:2004:ASN,
  author =       "B. Blakley and G. R. Blakley",
  title =        "All sail, no anchor {II}: Acceptable high-end {PKI}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "2",
  number =       "2",
  pages =        "66--77",
  month =        jan,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-003-0029-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:22 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-003-0029-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Russell:2004:TBR,
  author =       "Selwyn Russell",
  title =        "Theory and benefits of recursive certificate
                 structures",
  journal =      j-INT-J-INFO-SEC,
  volume =       "2",
  number =       "2",
  pages =        "78--90",
  month =        jan,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-003-0028-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:22 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-003-0028-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Lopez:2004:PDB,
  author =       "Javier Lopez and Antonio Ma{\~n}a and Jose A.
                 Montenegro and Juan J. Ortega",
  title =        "{PKI} design based on the use of on-line certification
                 authorities",
  journal =      j-INT-J-INFO-SEC,
  volume =       "2",
  number =       "2",
  pages =        "91--102",
  month =        jan,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-003-0027-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:22 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-003-0027-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Laih:2004:GVR,
  author =       "C. S. Laih and K. Y. Chen",
  title =        "Generating visible {RSA} public keys for {PKI}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "2",
  number =       "2",
  pages =        "103--109",
  month =        jan,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-003-0030-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:22 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-003-0030-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Munoz:2004:CRS,
  author =       "Jose L. Mu{\~n}oz and Jordi Forne and Oscar Esparza
                 and Miguel Soriano",
  title =        "Certificate revocation system implementation based on
                 the {Merkle} hash tree",
  journal =      j-INT-J-INFO-SEC,
  volume =       "2",
  number =       "2",
  pages =        "110--124",
  month =        jan,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-003-0026-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:22 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-003-0026-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Priami:2004:PSI,
  author =       "Corrado Priami",
  title =        "Preface to the special issue on {Security in Global
                 Computing}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "2",
  number =       "3--4",
  pages =        "125--125",
  month =        aug,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0034-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:23 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0034-z;
                 http://link.springer.com/content/pdf/10.1007/s10207-004-0034-z.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Teller:2004:UAC,
  author =       "David Teller and Pascal Zimmer and Daniel Hirschkoff",
  title =        "Using ambients to control resources",
  journal =      j-INT-J-INFO-SEC,
  volume =       "2",
  number =       "3--4",
  pages =        "126--144",
  month =        aug,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0035-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:23 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0035-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Buchholtz:2004:CCF,
  author =       "Mikael Buchholtz and Hanne Riis Nielson and Flemming
                 Nielson",
  title =        "A calculus for control flow analysis of security
                 protocols",
  journal =      j-INT-J-INFO-SEC,
  volume =       "2",
  number =       "3--4",
  pages =        "145--167",
  month =        aug,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0036-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:23 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0036-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Gorrieri:2004:AAT,
  author =       "Roberto Gorrieri and Ruggero Lanotte and Andrea
                 Maggiolo-Schettini and Fabio Martinelli and Simone Tini
                 and Enrico Tronci",
  title =        "Automated analysis of timed security: a case study on
                 web privacy",
  journal =      j-INT-J-INFO-SEC,
  volume =       "2",
  number =       "3--4",
  pages =        "168--186",
  month =        aug,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0037-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:23 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0037-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bartoletti:2004:SIS,
  author =       "Massimo Bartoletti and Pierpaolo Degano and Gian Luigi
                 Ferrari",
  title =        "Stack inspection and secure program transformations",
  journal =      j-INT-J-INFO-SEC,
  volume =       "2",
  number =       "3--4",
  pages =        "187--217",
  month =        aug,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0038-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:23 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0038-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{MacKenzie:2004:TPG,
  author =       "Philip MacKenzie and Michael K. Reiter",
  title =        "Two-party generation of {DSA} signatures",
  journal =      j-INT-J-INFO-SEC,
  volume =       "2",
  number =       "3--4",
  pages =        "218--239",
  month =        aug,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0041-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:23 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0041-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Waidner:2004:P,
  author =       "Michael Waidner",
  title =        "Preface",
  journal =      j-INT-J-INFO-SEC,
  volume =       "3",
  number =       "1",
  pages =        "1--1",
  month =        oct,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0051-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:23 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0051-y;
                 http://link.springer.com/content/pdf/10.1007/s10207-004-0051-y.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Hopcroft:2004:ASA,
  author =       "Philippa Hopcroft and Gavin Lowe",
  title =        "Analysing a stream authentication protocol using model
                 checking",
  journal =      j-INT-J-INFO-SEC,
  volume =       "3",
  number =       "1",
  pages =        "2--13",
  month =        oct,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0040-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:23 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0040-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Biskup:2004:CQE,
  author =       "Joachim Biskup and Piero Bonatti",
  title =        "Controlled query evaluation for enforcing
                 confidentiality in complete information systems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "3",
  number =       "1",
  pages =        "14--27",
  month =        oct,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0032-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:23 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0032-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Smith:2004:OAP,
  author =       "Sean W. Smith",
  title =        "Outbound authentication for programmable secure
                 coprocessors",
  journal =      j-INT-J-INFO-SEC,
  volume =       "3",
  number =       "1",
  pages =        "28--41",
  month =        oct,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0033-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:23 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0033-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Backes:2004:CPN,
  author =       "Michael Backes and Birgit Pfitzmann",
  title =        "Computational probabilistic noninterference",
  journal =      j-INT-J-INFO-SEC,
  volume =       "3",
  number =       "1",
  pages =        "42--60",
  month =        oct,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0039-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:23 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0039-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Daza:2004:PUI,
  author =       "Vanesa Daza and Javier Herranz and Germ{\'a}n
                 S{\'a}ez",
  title =        "Protocols useful on the {Internet} from distributed
                 signature schemes",
  journal =      j-INT-J-INFO-SEC,
  volume =       "3",
  number =       "2",
  pages =        "61--69",
  month =        nov,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0043-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:23 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0043-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Burgess:2004:GTM,
  author =       "Mark Burgess and Geoffrey Canright and Kenth
                 Eng{\o}-Monsen",
  title =        "A graph-theoretical model of computer security",
  journal =      j-INT-J-INFO-SEC,
  volume =       "3",
  number =       "2",
  pages =        "70--85",
  month =        nov,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0044-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:23 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0044-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Hitchcock:2004:ESM,
  author =       "Yvonne Hitchcock and Paul Montague and Gary Carter and
                 Ed Dawson",
  title =        "The efficiency of solving multiple discrete logarithm
                 problems and the implications for the security of fixed
                 elliptic curves",
  journal =      j-INT-J-INFO-SEC,
  volume =       "3",
  number =       "2",
  pages =        "86--98",
  month =        nov,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0045-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:23 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0045-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Mana:2004:FSE,
  author =       "Antonio Ma{\~n}a and Javier Lopez and Juan J. Ortega
                 and Ernesto Pimentel and Jose M. Troya",
  title =        "A framework for secure execution of software",
  journal =      j-INT-J-INFO-SEC,
  volume =       "3",
  number =       "2",
  pages =        "99--112",
  month =        nov,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0048-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:23 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0048-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Abie:2004:DDR,
  author =       "Habtamu Abie and P{\aa}l Spilling and Bent Foyn",
  title =        "A distributed digital rights management model for
                 secure information-distribution systems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "3",
  number =       "2",
  pages =        "113--128",
  month =        nov,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0058-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:23 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0058-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Autexier:2005:PSI,
  author =       "Serge Autexier and Iliano Cervesato and Heiko Mantel",
  title =        "Preface to the special issue of selected papers from
                 {FCS\slash VERIFY 2002}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "4",
  number =       "1--2",
  pages =        "1--1",
  month =        feb,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0053-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:24 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0053-9;
                 http://link.springer.com/content/pdf/10.1007/s10207-004-0053-9.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Ligatti:2005:EAE,
  author =       "Jay Ligatti and Lujo Bauer and David Walker",
  title =        "Edit automata: enforcement mechanisms for run-time
                 security policies",
  journal =      j-INT-J-INFO-SEC,
  volume =       "4",
  number =       "1--2",
  pages =        "2--16",
  month =        feb,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0046-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:24 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0046-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bella:2005:OVS,
  author =       "Giampaolo Bella and Fabio Massacci and Lawrence C.
                 Paulson",
  title =        "An overview of the verification of {SET}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "4",
  number =       "1--2",
  pages =        "17--28",
  month =        feb,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0047-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:24 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0047-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Guttman:2005:RAN,
  author =       "Joshua D. Guttman and Amy L. Herzog",
  title =        "Rigorous automated network security management",
  journal =      j-INT-J-INFO-SEC,
  volume =       "4",
  number =       "1--2",
  pages =        "29--48",
  month =        feb,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0052-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:24 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0052-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kusters:2005:DCP,
  author =       "Ralf K{\"u}sters",
  title =        "On the decidability of cryptographic protocols with
                 open-ended data structures",
  journal =      j-INT-J-INFO-SEC,
  volume =       "4",
  number =       "1--2",
  pages =        "49--70",
  month =        feb,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0050-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:24 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0050-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Lye:2005:GSN,
  author =       "Kong-wei Lye and Jeannette M. Wing",
  title =        "Game strategies in network security",
  journal =      j-INT-J-INFO-SEC,
  volume =       "4",
  number =       "1--2",
  pages =        "71--86",
  month =        feb,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0060-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:24 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0060-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Skalka:2005:SUB,
  author =       "Christian Skalka and Scott Smith",
  title =        "Static use-based object confinement",
  journal =      j-INT-J-INFO-SEC,
  volume =       "4",
  number =       "1--2",
  pages =        "87--104",
  month =        feb,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0049-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:24 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0049-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Lhee:2005:DFB,
  author =       "Kyung-suk Lhee and Steve J. Chapin",
  title =        "Detection of file-based race conditions",
  journal =      j-INT-J-INFO-SEC,
  volume =       "4",
  number =       "1--2",
  pages =        "105--119",
  month =        feb,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0068-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:24 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0068-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bai:2005:SAP,
  author =       "Yun Bai and Yan Zhang and Vijay Varadharajan",
  title =        "On the sequence of authorization policy
                 transformations",
  journal =      j-INT-J-INFO-SEC,
  volume =       "4",
  number =       "1--2",
  pages =        "120--131",
  month =        feb,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0069-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:24 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0069-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Snekkenes:2005:PSI,
  author =       "Einar Snekkenes",
  title =        "Preface to the special issue on {ESORICS 2003}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "4",
  number =       "3",
  pages =        "133--134",
  month =        jun,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0054-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:24 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0054-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Backes:2005:SAS,
  author =       "Michael Backes and Birgit Pfitzmann and Michael
                 Waidner",
  title =        "Symmetric authentication in a simulatable
                 {Dolev--Yao}-style cryptographic library",
  journal =      j-INT-J-INFO-SEC,
  volume =       "4",
  number =       "3",
  pages =        "135--154",
  month =        jun,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0056-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:24 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0056-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{vonOheimb:2005:ASM,
  author =       "David von Oheimb and Volkmar Lotz and Georg Walter",
  title =        "Analyzing {SLE 88} memory management security using
                 {Interacting State Machines}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "4",
  number =       "3",
  pages =        "155--171",
  month =        jun,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0057-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:24 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0057-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Serjantov:2005:PAA,
  author =       "Andrei Serjantov and Peter Sewell",
  title =        "Passive-attack analysis for connection-based anonymity
                 systems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "4",
  number =       "3",
  pages =        "172--180",
  month =        jun,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0059-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:24 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0059-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Basin:2005:OSM,
  author =       "David Basin and Sebastian M{\"o}dersheim and Luca
                 Vigan{\`o}",
  title =        "{OFMC}: a symbolic model checker for security
                 protocols",
  journal =      j-INT-J-INFO-SEC,
  volume =       "4",
  number =       "3",
  pages =        "181--208",
  month =        jun,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0055-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:24 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0055-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Trostle:2005:TIS,
  author =       "Jonathan Trostle and Bill Gossman",
  title =        "Techniques for improving the security and
                 manageability of {IPsec} policy",
  journal =      j-INT-J-INFO-SEC,
  volume =       "4",
  number =       "3",
  pages =        "209--226",
  month =        jun,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0064-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:24 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0064-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Boyd:2005:PSI,
  author =       "Colin Boyd and Wenbo Mao",
  title =        "Preface to the special issue on {ISC 2003}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "4",
  number =       "4",
  pages =        "227--227",
  month =        oct,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0066-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:25 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0066-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Galindo:2005:FOH,
  author =       "David Galindo and Sebasti{\`a} Mart{\'\i}n and Paz
                 Morillo and Jorge L. Villar",
  title =        "{Fujisaki--Okamoto} hybrid encryption revisited",
  journal =      j-INT-J-INFO-SEC,
  volume =       "4",
  number =       "4",
  pages =        "228--241",
  month =        oct,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0042-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:25 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0042-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Backes:2005:RSS,
  author =       "Michael Backes and Birgit Pfitzmann and Michael
                 Waidner",
  title =        "Reactively secure signature schemes",
  journal =      j-INT-J-INFO-SEC,
  volume =       "4",
  number =       "4",
  pages =        "242--252",
  month =        oct,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0062-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:25 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0062-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Gurgens:2005:SFN,
  author =       "Sigrid G{\"u}rgens and Carsten Rudolph and Holger
                 Vogt",
  title =        "On the security of fair non-repudiation protocols",
  journal =      j-INT-J-INFO-SEC,
  volume =       "4",
  number =       "4",
  pages =        "253--262",
  month =        oct,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0063-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:25 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0063-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Baldwin:2005:ESA,
  author =       "Adrian Baldwin and Simon Shiu",
  title =        "Enabling shared audit data",
  journal =      j-INT-J-INFO-SEC,
  volume =       "4",
  number =       "4",
  pages =        "263--276",
  month =        oct,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0061-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:25 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0061-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Atallah:2005:SOS,
  author =       "Mikhail J. Atallah and Jiangtao Li",
  title =        "Secure outsourcing of sequence comparisons",
  journal =      j-INT-J-INFO-SEC,
  volume =       "4",
  number =       "4",
  pages =        "277--287",
  month =        oct,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-005-0070-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:25 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-005-0070-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Itakura:2005:PMB,
  author =       "Yukio Itakura and Shigeo Tsujii",
  title =        "Proposal on a multifactor biometric authentication
                 method based on cryptosystem keys containing biometric
                 signatures",
  journal =      j-INT-J-INFO-SEC,
  volume =       "4",
  number =       "4",
  pages =        "288--296",
  month =        oct,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-004-0065-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:25 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-004-0065-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Gritzalis:2006:PKI,
  author =       "Stefanos Gritzalis",
  title =        "{Public Key Infrastructure}: Research and
                 Applications",
  journal =      j-INT-J-INFO-SEC,
  volume =       "5",
  number =       "1",
  pages =        "1--2",
  month =        jan,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-005-0075-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:25 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-005-0075-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Vanrenen:2006:DSM,
  author =       "Gabriel Vanrenen and Sean Smith and John Marchesini",
  title =        "Distributing security-mediated {PKI}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "5",
  number =       "1",
  pages =        "3--17",
  month =        jan,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-005-0076-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:25 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-005-0076-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Lioy:2006:PPP,
  author =       "Antonio Lioy and Marius Marian and Natalia Moltchanova
                 and Massimiliano Pala",
  title =        "{PKI} past, present and future",
  journal =      j-INT-J-INFO-SEC,
  volume =       "5",
  number =       "1",
  pages =        "18--29",
  month =        jan,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-005-0077-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:25 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-005-0077-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bohli:2006:KSA,
  author =       "Jens-Matthias Bohli and Stefan R{\"o}hrich and Rainer
                 Steinwandt",
  title =        "Key substitution attacks revisited: Taking into
                 account malicious signers",
  journal =      j-INT-J-INFO-SEC,
  volume =       "5",
  number =       "1",
  pages =        "30--36",
  month =        jan,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-005-0071-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:25 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-005-0071-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Zhou:2006:MTI,
  author =       "Jianying Zhou and Feng Bao and Robert Deng",
  title =        "Minimizing {TTP}'s involvement in signature
                 validation",
  journal =      j-INT-J-INFO-SEC,
  volume =       "5",
  number =       "1",
  pages =        "37--47",
  month =        jan,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-005-0072-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:25 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-005-0072-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Li:2006:USS,
  author =       "Ninghui Li and John C. Mitchell",
  title =        "Understanding {SPKI\slash SDSI} using first-order
                 logic",
  journal =      j-INT-J-INFO-SEC,
  volume =       "5",
  number =       "1",
  pages =        "48--64",
  month =        jan,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-005-0073-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:25 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-005-0073-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Zhou:2006:P,
  author =       "Jianying Zhou and Javier Lopez",
  title =        "Preface",
  journal =      j-INT-J-INFO-SEC,
  volume =       "5",
  number =       "2",
  pages =        "65--66",
  month =        apr,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-006-0087-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:25 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-006-0087-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Young:2006:CEU,
  author =       "Adam L. Young",
  title =        "Cryptoviral extortion using {Microsoft}'s Crypto
                 {API}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "5",
  number =       "2",
  pages =        "67--76",
  month =        apr,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-006-0082-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:25 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-006-0082-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Sidiroglou:2006:ETD,
  author =       "Stelios Sidiroglou and Angelos D. Keromytis",
  title =        "Execution transactions for defending against software
                 failures: use and evaluation",
  journal =      j-INT-J-INFO-SEC,
  volume =       "5",
  number =       "2",
  pages =        "77--91",
  month =        apr,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-006-0083-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:25 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-006-0083-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Nali:2006:HTB,
  author =       "Deholo Nali and Carlisle Adams and Ali Miri",
  title =        "Hierarchical time-based information release",
  journal =      j-INT-J-INFO-SEC,
  volume =       "5",
  number =       "2",
  pages =        "92--104",
  month =        apr,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-006-0084-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:25 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-006-0084-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Chakrabarti:2006:KPD,
  author =       "Dibyendu Chakrabarti and Subhamoy Maitra and Bimal
                 Roy",
  title =        "A key pre-distribution scheme for wireless sensor
                 networks: merging blocks in combinatorial design",
  journal =      j-INT-J-INFO-SEC,
  volume =       "5",
  number =       "2",
  pages =        "105--114",
  month =        apr,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-006-0085-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:25 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-006-0085-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Yeo:2006:SWE,
  author =       "Gary S.-W. Yeo and Raphael C.-W. Phan",
  title =        "On the security of the {WinRAR} encryption feature",
  journal =      j-INT-J-INFO-SEC,
  volume =       "5",
  number =       "2",
  pages =        "115--123",
  month =        apr,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-006-0086-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:25 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-006-0086-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Mayer:2006:OFA,
  author =       "Alain Mayer and Avishai Wool and Elisha Ziskind",
  title =        "Offline firewall analysis",
  journal =      j-INT-J-INFO-SEC,
  volume =       "5",
  number =       "3",
  pages =        "125--144",
  month =        jul,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-005-0074-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:26 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-005-0074-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Crescini:2006:PSD,
  author =       "Vino Fernando Crescini and Yan Zhang",
  title =        "{PolicyUpdater}: a system for dynamic access control",
  journal =      j-INT-J-INFO-SEC,
  volume =       "5",
  number =       "3",
  pages =        "145--165",
  month =        jul,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-005-0078-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:26 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-005-0078-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Tsunoo:2006:ICA,
  author =       "Yukiyasu Tsunoo and Etsuko Tsujihara and Maki Shigeri
                 and Hiroyasu Kubo and Kazuhiko Minematsu",
  title =        "Improving cache attacks by considering cipher
                 structure",
  journal =      j-INT-J-INFO-SEC,
  volume =       "5",
  number =       "3",
  pages =        "166--176",
  month =        jul,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-005-0079-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:26 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-005-0079-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Okeya:2006:SAC,
  author =       "Katsuyuki Okeya and Tsuyoshi Takagi",
  title =        "Security analysis of {CRT}-based cryptosystems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "5",
  number =       "3",
  pages =        "177--185",
  month =        jul,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-005-0080-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:26 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-005-0080-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{vanOorschot:2006:MSD,
  author =       "Paul C. van Oorschot and Jean-Marc Robert and Miguel
                 Vargas Martin",
  title =        "A monitoring system for detecting repeated packets
                 with applications to computer worms",
  journal =      j-INT-J-INFO-SEC,
  volume =       "5",
  number =       "3",
  pages =        "186--199",
  month =        jul,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-006-0081-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:26 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-006-0081-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Brandt:2006:HOF,
  author =       "Felix Brandt",
  title =        "How to obtain full privacy in auctions",
  journal =      j-INT-J-INFO-SEC,
  volume =       "5",
  number =       "4",
  pages =        "201--216",
  month =        oct,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-006-0001-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:26 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-006-0001-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Al-Riyami:2006:EFE,
  author =       "S. S. Al-Riyami and J. Malone-Lee and N. P. Smart",
  title =        "Escrow-free encryption supporting cryptographic
                 workflow",
  journal =      j-INT-J-INFO-SEC,
  volume =       "5",
  number =       "4",
  pages =        "217--229",
  month =        oct,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-006-0002-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:26 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-006-0002-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Ding:2006:CNT,
  author =       "Jintai Ding and Dieter Schmidt and Zhijun Yin",
  title =        "Cryptanalysis of the new {TTS} scheme in {CHES 2004}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "5",
  number =       "4",
  pages =        "231--240",
  month =        oct,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-006-0003-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:26 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-006-0003-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Nguyen:2006:VSF,
  author =       "Lan Nguyen and Rei Safavi-Naini and Kaoru Kurosawa",
  title =        "Verifiable shuffles: a formal model and a
                 Paillier-based three-round construction with provable
                 security",
  journal =      j-INT-J-INFO-SEC,
  volume =       "5",
  number =       "4",
  pages =        "241--255",
  month =        oct,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-006-0004-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:26 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-006-0004-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Giorgini:2006:RET,
  author =       "Paolo Giorgini and Fabio Massacci and John Mylopoulos
                 and Nicola Zannone",
  title =        "Requirements engineering for trust management: model,
                 methodology, and reasoning",
  journal =      j-INT-J-INFO-SEC,
  volume =       "5",
  number =       "4",
  pages =        "257--274",
  month =        oct,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-006-0005-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:26 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-006-0005-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Clarke:2007:AMP,
  author =       "N. L. Clarke and S. M. Furnell",
  title =        "Authenticating mobile phone users using keystroke
                 analysis",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "1",
  pages =        "1--14",
  month =        jan,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-006-0006-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:26 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-006-0006-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Blundo:2007:LRC,
  author =       "Carlo Blundo and Clemente Galdi and Giuseppe
                 Persiano",
  title =        "Low-randomness constant-round private {XOR}
                 computations",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "1",
  pages =        "15--26",
  month =        jan,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-006-0007-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:26 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-006-0007-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Wang:2007:HDA,
  author =       "Shujing Wang and Yan Zhang",
  title =        "Handling distributed authorization with delegation
                 through answer set programming",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "1",
  pages =        "27--46",
  month =        jan,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-006-0008-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:26 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-006-0008-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Konstantinou:2007:EGS,
  author =       "Elisavet Konstantinou and Yannis C. Stamatiou and
                 Christos Zaroliagis",
  title =        "Efficient generation of secure elliptic curves",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "1",
  pages =        "47--63",
  month =        jan,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-006-0009-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:26 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-006-0009-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Dimitrakos:2007:GEP,
  author =       "Theo Dimitrakos and Fabio Martinelli and Peter Y. A.
                 Ryan and Steve Schneider",
  title =        "{Guest Editors}' Preface",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "2--3",
  pages =        "65--66",
  month =        mar,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0012-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:27 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0012-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Zheng:2007:DSL,
  author =       "Lantian Zheng and Andrew C. Myers",
  title =        "Dynamic security labels and static information flow
                 control",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "2--3",
  pages =        "67--84",
  month =        mar,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0019-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:27 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0019-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{DeFrancesco:2007:ILS,
  author =       "Nicoletta {De Francesco} and Luca Martini",
  title =        "Instruction-level security typing by abstract
                 interpretation",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "2--3",
  pages =        "85--106",
  month =        mar,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0015-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:27 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0015-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kopf:2007:TTU,
  author =       "Boris K{\"o}pf and Heiko Mantel",
  title =        "Transformational typing and unification for
                 automatically correcting insecure programs",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "2--3",
  pages =        "107--131",
  month =        mar,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0016-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:27 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0016-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Cederquist:2007:ABC,
  author =       "J. G. Cederquist and R. Corin and M. A. C. Dekker and
                 S. Etalle and J. I. den Hartog and G. Lenzini",
  title =        "Audit-based compliance control",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "2--3",
  pages =        "133--151",
  month =        mar,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0017-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:27 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0017-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Krukow:2007:TS,
  author =       "Karl Krukow and Mogens Nielsen",
  title =        "Trust structures",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "2--3",
  pages =        "153--181",
  month =        mar,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0014-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:27 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0014-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Delicata:2007:AAV,
  author =       "Rob Delicata and Steve Schneider",
  title =        "An algebraic approach to the verification of a class
                 of {Diffie--Hellman} protocols",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "2--3",
  pages =        "183--196",
  month =        mar,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0013-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:27 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0013-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Gritzalis:2007:PMO,
  author =       "S. Gritzalis and A. N. Yannacopoulos and C.
                 Lambrinoudakis and P. Hatzopoulos and S. K. Katsikas",
  title =        "A probabilistic model for optimal insurance contracts
                 against security risks and privacy violation in {IT}
                 outsourcing environments",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "4",
  pages =        "197--211",
  month =        jul,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-006-0010-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:27 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-006-0010-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Chen:2007:IBK,
  author =       "L. Chen and Z. Cheng and N. P. Smart",
  title =        "Identity-based key agreement protocols from pairings",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "4",
  pages =        "213--241",
  month =        jul,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-006-0011-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:27 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-006-0011-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bohli:2007:SGK,
  author =       "Jens-Matthias Bohli and Mar{\'\i}a Isabel Gonz{\'a}lez
                 Vasco and Rainer Steinwandt",
  title =        "Secure group key establishment revisited",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "4",
  pages =        "243--254",
  month =        jul,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0018-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:27 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0018-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bertino:2007:SSP,
  author =       "Elisa Bertino and Elena Ferrari and Federica Paci and
                 Loredana Parasiliti Provenza",
  title =        "A system for securing push-based distribution of {XML}
                 documents",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "4",
  pages =        "255--284",
  month =        jul,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0020-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:27 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0020-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Knight:2007:IJI,
  author =       "Scott Knight and Scott Buffett and Patrick C. K.
                 Hung",
  title =        "The {{\booktitle{International Journal of Information
                 Security}}} Special Issue on privacy, security and
                 trust technologies and E-business services",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "5",
  pages =        "285--286",
  month =        sep,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0036-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:27 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0036-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Wu:2007:RFT,
  author =       "Zhengping Wu and Alfred C. Weaver",
  title =        "Requirements of federated trust management for
                 service-oriented architectures",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "5",
  pages =        "287--296",
  month =        sep,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0027-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:27 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0027-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Liu:2007:ICR,
  author =       "Jinshan Liu and Val{\'e}rie Issarny",
  title =        "An incentive compatible reputation mechanism for
                 ubiquitous computing environments",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "5",
  pages =        "297--311",
  month =        sep,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0029-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:27 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0029-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Levin:2007:WSL,
  author =       "Avner Levin",
  title =        "Is workplace surveillance legal in {Canada}?",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "5",
  pages =        "313--321",
  month =        sep,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0026-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:27 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0026-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Lauer:2007:BOT,
  author =       "Thomas W. Lauer and Xiaodong Deng",
  title =        "Building online trust through privacy practices",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "5",
  pages =        "323--331",
  month =        sep,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0028-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:27 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0028-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Zhang:2007:FBT,
  author =       "Jie Zhang and Ali A. Ghorbani and Robin Cohen",
  title =        "A familiarity-based trust model for effective
                 selection of sellers in multiagent e-commerce systems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "5",
  pages =        "333--344",
  month =        sep,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0025-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:27 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0025-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Zulkernine:2007:ISS,
  author =       "Mohammad Zulkernine and Mathews Graves and Muhammad
                 Umair Ahmed Khan",
  title =        "Integrating software specifications into intrusion
                 detection",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "5",
  pages =        "345--357",
  month =        sep,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0023-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:27 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0023-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Backes:2007:P,
  author =       "Michael Backes and Stefanos Gritzalis and Bart
                 Preneel",
  title =        "Preface",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "6",
  pages =        "359--360",
  month =        oct,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0034-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:28 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0034-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Anagnostakis:2007:CDR,
  author =       "Kostas G. Anagnostakis and Michael B. Greenwald and
                 Sotiris Ioannidis and Angelos D. Keromytis",
  title =        "{COVERAGE}: detecting and reacting to worm epidemics
                 using cooperation and validation",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "6",
  pages =        "361--378",
  month =        oct,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0032-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:28 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0032-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bononi:2007:IDS,
  author =       "Luciano Bononi and Carlo Tacconi",
  title =        "Intrusion detection for secure clustering and routing
                 in {Mobile Multi-hop Wireless Networks}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "6",
  pages =        "379--392",
  month =        oct,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0035-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:28 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0035-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Danezis:2007:BFM,
  author =       "George Danezis",
  title =        "Breaking four mix-related schemes based on {Universal
                 Re-encryption}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "6",
  pages =        "393--402",
  month =        oct,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0033-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:28 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0033-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
  keywords =     "Anonymous communications; El-Gamal encryption; rWonGoo
                 anonymous channel; Traffic analysis; Universal
                 re-encryption",
  remark =       "From the abstract: ``Universal Re-encryption allows
                 El-Gamal ciphertexts to be re-encrypted without
                 knowledge of their corresponding public keys. This has
                 made it an enticing building block for anonymous
                 communications protocols. \ldots{} [we] find serious
                 weaknesses in all of them.''",
}

@Article{Esponda:2007:PDP,
  author =       "Fernando Esponda and Elena S. Ackley and Paul Helman
                 and Haixia Jia and Stephanie Forrest",
  title =        "Protecting data privacy through hard-to-reverse
                 negative databases",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "6",
  pages =        "403--415",
  month =        oct,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0030-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:28 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0030-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Klinkoff:2007:ENS,
  author =       "Patrick Klinkoff and Engin Kirda and Christopher
                 Kruegel and Giovanni Vigna",
  title =        "Extending {.NET} security to unmanaged code",
  journal =      j-INT-J-INFO-SEC,
  volume =       "6",
  number =       "6",
  pages =        "417--428",
  month =        oct,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0031-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:28 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0031-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Degano:2008:P,
  author =       "Pierpaolo Degano and Luca Vigan{\`o}",
  title =        "Preface",
  journal =      j-INT-J-INFO-SEC,
  volume =       "7",
  number =       "1",
  pages =        "1--1",
  month =        jan,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0038-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:28 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0038-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Armando:2008:SBM,
  author =       "Alessandro Armando and Luca Compagna",
  title =        "{SAT}-based model-checking for security protocols
                 analysis",
  journal =      j-INT-J-INFO-SEC,
  volume =       "7",
  number =       "1",
  pages =        "3--32",
  month =        jan,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0041-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:28 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0041-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Backes:2008:LBU,
  author =       "Michael Backes and Birgit Pfitzmann",
  title =        "Limits of the {BRSIM\slash UC} soundness of
                 {Dolev--Yao}-style {XOR}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "7",
  number =       "1",
  pages =        "33--54",
  month =        jan,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0040-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:28 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0040-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bracciali:2008:SFM,
  author =       "Andrea Bracciali and Gianluigi Ferrari and Emilio
                 Tuosto",
  title =        "A symbolic framework for multi-faceted security
                 protocol analysis",
  journal =      j-INT-J-INFO-SEC,
  volume =       "7",
  number =       "1",
  pages =        "55--84",
  month =        jan,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0043-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:28 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0043-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Estevez-Tapiador:2008:BRE,
  author =       "Juan M. Estevez-Tapiador and Almudena Alcaide and
                 Julio C. Hernandez-Castro and Arturo Ribagorda",
  title =        "{Bayesian} rational exchange",
  journal =      j-INT-J-INFO-SEC,
  volume =       "7",
  number =       "1",
  pages =        "85--100",
  month =        jan,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0039-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:28 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0039-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Gollmann:2008:E,
  author =       "Dieter Gollmann",
  title =        "Editorial",
  journal =      j-INT-J-INFO-SEC,
  volume =       "7",
  number =       "2",
  pages =        "101--101",
  month =        apr,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0052-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:28 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0052-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Alfaro:2008:CAC,
  author =       "J. G. Alfaro and N. Boulahia-Cuppens and F. Cuppens",
  title =        "Complete analysis of configuration rules to guarantee
                 reliable network security policies",
  journal =      j-INT-J-INFO-SEC,
  volume =       "7",
  number =       "2",
  pages =        "103--122",
  month =        apr,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0045-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:28 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0045-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Crampton:2008:DRB,
  author =       "Jason Crampton and Hemanth Khambhammettu",
  title =        "Delegation in role-based access control",
  journal =      j-INT-J-INFO-SEC,
  volume =       "7",
  number =       "2",
  pages =        "123--136",
  month =        apr,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0044-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:28 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0044-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Fong:2008:DCC,
  author =       "Philip W. L. Fong",
  title =        "Discretionary capability confinement",
  journal =      j-INT-J-INFO-SEC,
  volume =       "7",
  number =       "2",
  pages =        "137--154",
  month =        apr,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0047-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:28 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0047-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Backes:2008:CRS,
  author =       "Michael Backes and Markus D{\"u}rmuth and Dennis
                 Hofheinz and Ralf K{\"u}sters",
  title =        "Conditional reactive simulatability",
  journal =      j-INT-J-INFO-SEC,
  volume =       "7",
  number =       "2",
  pages =        "155--169",
  month =        apr,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0046-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:28 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0046-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Huang:2008:SUD,
  author =       "Xinyi Huang and Willy Susilo and Yi Mu and Wei Wu",
  title =        "Secure universal designated verifier signature without
                 random oracles",
  journal =      j-INT-J-INFO-SEC,
  volume =       "7",
  number =       "3",
  pages =        "171--183",
  month =        jun,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0021-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:29 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0021-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Chen:2008:IID,
  author =       "Pei-Te Chen and Chi-Sung Laih",
  title =        "{IDSIC}: an intrusion detection system with
                 identification capability",
  journal =      j-INT-J-INFO-SEC,
  volume =       "7",
  number =       "3",
  pages =        "185--197",
  month =        jun,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0024-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:29 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0024-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Biskup:2008:KSI,
  author =       "Joachim Biskup and Torben Weibert",
  title =        "Keeping secrets in incomplete databases",
  journal =      j-INT-J-INFO-SEC,
  volume =       "7",
  number =       "3",
  pages =        "199--217",
  month =        jun,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0037-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:29 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0037-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Aldini:2008:EMI,
  author =       "Alessandro Aldini and Alessandra {Di Pierro}",
  title =        "Estimating the maximum information leakage",
  journal =      j-INT-J-INFO-SEC,
  volume =       "7",
  number =       "3",
  pages =        "219--242",
  month =        jun,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0050-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:29 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0050-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Wang:2008:MLF,
  author =       "XiaoFeng Wang and Michael K. Reiter",
  title =        "A multi-layer framework for puzzle-based
                 denial-of-service defense",
  journal =      j-INT-J-INFO-SEC,
  volume =       "7",
  number =       "4",
  pages =        "243--263",
  month =        aug,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0042-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:29 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0042-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Tartary:2008:CAM,
  author =       "Christophe Tartary and Huaxiong Wang and Josef
                 Pieprzyk",
  title =        "A coding approach to the multicast stream
                 authentication problem",
  journal =      j-INT-J-INFO-SEC,
  volume =       "7",
  number =       "4",
  pages =        "265--283",
  month =        aug,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0048-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:29 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0048-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Cuppens:2008:MCS,
  author =       "Fr{\'e}d{\'e}ric Cuppens and Nora Cuppens-Boulahia",
  title =        "Modeling contextual security policies",
  journal =      j-INT-J-INFO-SEC,
  volume =       "7",
  number =       "4",
  pages =        "285--305",
  month =        aug,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0051-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:29 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0051-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Aimeur:2008:LPP,
  author =       "Esma A{\"\i}meur and Gilles Brassard and Jos{\'e} M.
                 Fernandez and Flavien Serge Mani Onana",
  title =        "{{\sc Alambic}}: a privacy-preserving recommender
                 system for electronic commerce",
  journal =      j-INT-J-INFO-SEC,
  volume =       "7",
  number =       "5",
  pages =        "307--334",
  month =        oct,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0049-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:29 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0049-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Corbett:2008:PCW,
  author =       "Cherita L. Corbett and Raheem A. Beyah and John A.
                 Copeland",
  title =        "Passive classification of wireless {NICs} during
                 active scanning",
  journal =      j-INT-J-INFO-SEC,
  volume =       "7",
  number =       "5",
  pages =        "335--348",
  month =        oct,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-007-0053-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:29 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-007-0053-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Dent:2008:SCE,
  author =       "Alexander W. Dent",
  title =        "A survey of certificateless encryption schemes and
                 security models",
  journal =      j-INT-J-INFO-SEC,
  volume =       "7",
  number =       "5",
  pages =        "349--377",
  month =        oct,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-008-0055-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:29 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-008-0055-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Zhao:2008:NAP,
  author =       "Chang-An Zhao and Fangguo Zhang and Jiwu Huang",
  title =        "A note on the {Ate} pairing",
  journal =      j-INT-J-INFO-SEC,
  volume =       "7",
  number =       "6",
  pages =        "379--382",
  month =        nov,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-008-0054-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:30 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-008-0054-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Imamoto:2008:AEC,
  author =       "Kenji Imamoto and Jianying Zhou and Kouichi Sakurai",
  title =        "Achieving evenhandedness in certified email system for
                 contract signing",
  journal =      j-INT-J-INFO-SEC,
  volume =       "7",
  number =       "6",
  pages =        "383--394",
  month =        nov,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-008-0056-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:30 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-008-0056-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Balopoulos:2008:SIP,
  author =       "Theodoros Balopoulos and Stefanos Gritzalis and
                 Sokratis K. Katsikas",
  title =        "Specifying and implementing privacy-preserving
                 cryptographic protocols",
  journal =      j-INT-J-INFO-SEC,
  volume =       "7",
  number =       "6",
  pages =        "395--420",
  month =        nov,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-008-0057-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:30 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-008-0057-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bryans:2008:OGT,
  author =       "Jeremy W. Bryans and Maciej Koutny and Laurent
                 Mazar{\'e} and Peter Y. A. Ryan",
  title =        "Opacity generalised to transition systems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "7",
  number =       "6",
  pages =        "421--435",
  month =        nov,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-008-0058-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:30 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-008-0058-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Lu:2009:RKR,
  author =       "Jiqiang Lu",
  title =        "Related-key rectangle attack on 36 rounds of the
                 {XTEA} block cipher",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "1",
  pages =        "1--11",
  month =        feb,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-008-0059-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:30 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-008-0059-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Yoshino:2009:BMM,
  author =       "Masayuki Yoshino and Katsuyuki Okeya and Camille
                 Vuillaume",
  title =        "Bipartite modular multiplication with twice the
                 bit-length of multipliers",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "1",
  pages =        "13--23",
  month =        feb,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-008-0060-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:30 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-008-0060-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Tian:2009:LSN,
  author =       "Daxin Tian and Yanheng Liu and Yang Xiang",
  title =        "Large-scale network intrusion detection based on
                 distributed learning algorithm",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "1",
  pages =        "25--35",
  month =        feb,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-008-0061-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:30 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-008-0061-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Cheng:2009:CKA,
  author =       "Jiin-Chiou Cheng and Chi-Sung Laih",
  title =        "Conference key agreement protocol with non-interactive
                 fault-tolerance over broadcast network",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "1",
  pages =        "37--48",
  month =        feb,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-008-0062-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:30 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-008-0062-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Mashatan:2009:ITC,
  author =       "Atefeh Mashatan and Douglas R. Stinson",
  title =        "Interactive two-channel message authentication based
                 on {Interactive--Collision Resistant} hash functions",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "1",
  pages =        "49--60",
  month =        feb,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-008-0063-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:30 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-008-0063-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
  keywords =     "Interactive--Collision Resistant (ICR) hash function",
}

@Article{Narasimha:2009:PPR,
  author =       "M. Narasimha and J. Solis and G. Tsudik",
  title =        "Privacy-preserving revocation checking",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "1",
  pages =        "61--75",
  month =        feb,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-008-0064-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:30 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-008-0064-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Elmufti:2009:MWS,
  author =       "Kalid Elmufti and Dasun Weerasinghe and M. Rajarajan
                 and Veselin Rakocevic and Sanowar Khan and John A.
                 MacDonald",
  title =        "Mobile {Web} services authentication using {SAML} and
                 {3GPP} generic bootstrapping architecture",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "2",
  pages =        "77--87",
  month =        apr,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-008-0065-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:30 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-008-0065-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Li:2009:DSA,
  author =       "Jiangtao Li and Ninghui Li and XiaoFeng Wang and Ting
                 Yu",
  title =        "Denial of service attacks and defenses in
                 decentralized trust management",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "2",
  pages =        "89--101",
  month =        apr,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-008-0068-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:30 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-008-0068-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Quinn:2009:AAE,
  author =       "Karl Quinn and David Lewis and Declan O'Sullivan and
                 Vincent P. Wade",
  title =        "An analysis of accuracy experiments carried out over
                 of a multi-faceted model of trust",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "2",
  pages =        "103--119",
  month =        apr,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-008-0069-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:30 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-008-0069-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Vasserman:2009:IKN,
  author =       "Eugene Y. Vasserman and Nicholas Hopper and James
                 Tyra",
  title =        "{{\sc SilentKnock}}: practical, provably undetectable
                 authentication",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "2",
  pages =        "121--135",
  month =        apr,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-008-0070-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:30 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-008-0070-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Chadwick:2009:ASX,
  author =       "David W. Chadwick and Sassa Otenko and Tuan Anh
                 Nguyen",
  title =        "Adding support to {XACML} for multi-domain user to
                 user dynamic delegation of authority",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "2",
  pages =        "137--152",
  month =        apr,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-008-0073-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:30 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-008-0073-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Wu:2009:IDV,
  author =       "Yu-Sung Wu and Vinita Apte and Saurabh Bagchi and
                 Sachin Garg and Navjot Singh",
  title =        "Intrusion detection in voice over {IP} environments",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "3",
  pages =        "153--172",
  month =        jun,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-008-0071-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:31 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-008-0071-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kuper:2009:GXS,
  author =       "Gabriel Kuper and Fabio Massacci and Nataliya
                 Rassadko",
  title =        "Generalized {XML} security views",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "3",
  pages =        "173--203",
  month =        jun,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-008-0074-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:31 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-008-0074-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Harn:2009:EIB,
  author =       "Lein Harn and Jian Ren and Changlu Lin",
  title =        "Efficient identity-based {GQ} multisignatures",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "3",
  pages =        "205--210",
  month =        jun,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-008-0072-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:31 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-008-0072-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Cook:2009:EBC,
  author =       "Debra L. Cook and Moti Yung and Angelos D. Keromytis",
  title =        "Elastic block ciphers: method, security and
                 instantiations",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "3",
  pages =        "211--231",
  month =        jun,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-008-0075-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:31 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-008-0075-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Sourour:2009:ESD,
  author =       "Meharouech Sourour and Bouhoula Adel and Abbes Tarek",
  title =        "Ensuring security in depth based on heterogeneous
                 network security technologies",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "4",
  pages =        "233--246",
  month =        aug,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-009-0077-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:31 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-009-0077-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Desoky:2009:LLB,
  author =       "Abdelrahman Desoky",
  title =        "{Listega}: list-based steganography methodology",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "4",
  pages =        "247--261",
  month =        aug,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-009-0079-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:31 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-009-0079-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
  keywords =     "List-Based Steganography Methodology (Listega)",
}

@Article{Lee:2009:RTB,
  author =       "Sangho Lee and Jong Kim and Sung Je Hong",
  title =        "Redistributing time-based rights between consumer
                 devices for content sharing in {DRM} system",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "4",
  pages =        "263--273",
  month =        aug,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-009-0082-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:31 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-009-0082-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Shay:2009:CST,
  author =       "Richard Shay and Elisa Bertino",
  title =        "A comprehensive simulation tool for the analysis of
                 password policies",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "4",
  pages =        "275--289",
  month =        aug,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-009-0084-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:31 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-009-0084-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Koshutanski:2009:EGS,
  author =       "Hristo Koshutanski and Aliaksandr Lazouski and Fabio
                 Martinelli and Paolo Mori",
  title =        "Enhancing grid security by fine-grained behavioral
                 control and negotiation-based authorization",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "4",
  pages =        "291--314",
  month =        aug,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-009-0083-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:31 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-009-0083-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Brickell:2009:SSN,
  author =       "Ernie Brickell and Liqun Chen and Jiangtao Li",
  title =        "Simplified security notions of direct anonymous
                 attestation and a concrete scheme from pairings",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "5",
  pages =        "315--330",
  month =        oct,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-009-0076-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:31 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-009-0076-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Esponda:2009:NRI,
  author =       "Fernando Esponda and Stephanie Forrest and Paul
                 Helman",
  title =        "Negative representations of information",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "5",
  pages =        "331--345",
  month =        oct,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-009-0078-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:31 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-009-0078-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Hasegawa:2009:PFC,
  author =       "Shingo Hasegawa and Shuji Isobe and Hiroki Shizuya and
                 Katsuhiro Tashiro",
  title =        "On the pseudo-freeness and the {CDH} assumption",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "5",
  pages =        "347--355",
  month =        oct,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-009-0087-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:31 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-009-0087-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Geron:2009:CCR,
  author =       "Erel Geron and Avishai Wool",
  title =        "{CRUST}: cryptographic remote untrusted storage
                 without public keys",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "5",
  pages =        "357--377",
  month =        oct,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-009-0081-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:31 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-009-0081-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Qin:2009:SSS,
  author =       "Huawang Qin and Yuewei Dai and Zhiquan Wang",
  title =        "A secret sharing scheme based on $ (t, n) $ threshold
                 and adversary structure",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "5",
  pages =        "379--385",
  month =        oct,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-009-0085-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:31 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-009-0085-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Chiasson:2009:UID,
  author =       "Sonia Chiasson and Alain Forget and Robert Biddle and
                 P. C. van Oorschot",
  title =        "User interface design affects security: patterns in
                 click-based graphical passwords",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "6",
  pages =        "387--398",
  month =        dec,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-009-0080-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:32 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-009-0080-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Hammer:2009:FSC,
  author =       "Christian Hammer and Gregor Snelting",
  title =        "Flow-sensitive, context-sensitive, and
                 object-sensitive information flow control based on
                 program dependence graphs",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "6",
  pages =        "399--422",
  month =        dec,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-009-0086-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:32 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-009-0086-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{An:2009:UIC,
  author =       "Xiangdong An and Dawn Jutla and Nick Cercone and
                 Charnyote Pluempitiwiriyawej and Hai Wang",
  title =        "Uncertain inference control in privacy protection",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "6",
  pages =        "423--431",
  month =        dec,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-009-0088-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:32 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-009-0088-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Sajedi:2009:SSB,
  author =       "Hedieh Sajedi and Mansour Jamzad",
  title =        "Secure steganography based on embedding capacity",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "6",
  pages =        "433--445",
  month =        dec,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-009-0089-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:32 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-009-0089-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Plaga:2009:BKS,
  author =       "Rainer Plaga",
  title =        "Biometric keys: suitable use cases and achievable
                 information content",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "6",
  pages =        "447--454",
  month =        dec,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-009-0090-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:32 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-009-0090-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kozina:2009:MIW,
  author =       "Mario Kozina and Marin Golub and Stjepan Gros",
  title =        "A method for identifying {Web} applications",
  journal =      j-INT-J-INFO-SEC,
  volume =       "8",
  number =       "6",
  pages =        "455--467",
  month =        dec,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-009-0092-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:32 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-009-0092-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Zheng:2010:AAB,
  author =       "Ruijuan Zheng and Mingchuan Zhang and Qingtao Wu and
                 Shibao Sun and Jiexin Pu",
  title =        "Analysis and application of {Bio-Inspired Multi-Net
                 Security Model}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "9",
  number =       "1",
  pages =        "1--17",
  month =        feb,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-009-0091-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:32 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-009-0091-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Han:2010:CBI,
  author =       "Shui-Hua Han and Chao-Hsien Chu",
  title =        "Content-based image authentication: current status,
                 issues, and challenges",
  journal =      j-INT-J-INFO-SEC,
  volume =       "9",
  number =       "1",
  pages =        "19--32",
  month =        feb,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-009-0093-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:32 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-009-0093-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Goldschlag:2010:THB,
  author =       "David M. Goldschlag and Stuart G. Stubblebine and Paul
                 F. Syverson",
  title =        "Temporarily hidden bit commitment and lottery
                 applications",
  journal =      j-INT-J-INFO-SEC,
  volume =       "9",
  number =       "1",
  pages =        "33--50",
  month =        feb,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-009-0094-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:32 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-009-0094-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Chakraborty:2010:CDB,
  author =       "Anindya Chakraborty and Arun K. Majumdar and Shamik
                 Sural",
  title =        "A column dependency-based approach for static and
                 dynamic recovery of databases from malicious
                 transactions",
  journal =      j-INT-J-INFO-SEC,
  volume =       "9",
  number =       "1",
  pages =        "51--67",
  month =        feb,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-009-0095-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:32 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-009-0095-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bayly:2010:FBS,
  author =       "Duncan Bayly and Maurice Castro and Arathi Arakala and
                 Jason Jeffers and Kathy Horadam",
  title =        "Fractional biometrics: safeguarding privacy in
                 biometric applications",
  journal =      j-INT-J-INFO-SEC,
  volume =       "9",
  number =       "1",
  pages =        "69--82",
  month =        feb,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-009-0096-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:32 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-009-0096-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bella:2010:PGA,
  author =       "Giampaolo Bella",
  title =        "The principle of guarantee availability for security
                 protocol analysis",
  journal =      j-INT-J-INFO-SEC,
  volume =       "9",
  number =       "2",
  pages =        "83--97",
  month =        apr,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-009-0097-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:32 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-009-0097-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{deAlbuquerque:2010:FVA,
  author =       "Jo{\~a}o Porto de Albuquerque and Heiko Krumm and
                 Paulo L{\'\i}cio de Geus",
  title =        "Formal validation of automated policy refinement in
                 the management of network security systems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "9",
  number =       "2",
  pages =        "99--125",
  month =        apr,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-010-0101-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:32 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-010-0101-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Knudsen:2010:CEA,
  author =       "Lars R. Knudsen and Charlotte V. Miolane",
  title =        "Counting equations in algebraic attacks on block
                 ciphers",
  journal =      j-INT-J-INFO-SEC,
  volume =       "9",
  number =       "2",
  pages =        "127--135",
  month =        apr,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-009-0099-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:32 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-009-0099-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Gauravaram:2010:HFU,
  author =       "Praveen Gauravaram and John Kelsey and Lars R. Knudsen
                 and S{\o}ren S. Thomsen",
  title =        "On hash functions using checksums",
  journal =      j-INT-J-INFO-SEC,
  volume =       "9",
  number =       "2",
  pages =        "137--151",
  month =        apr,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-009-0100-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:32 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-009-0100-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
  remark =       "From the abstract: ``We analyse the security of
                 iterated hash functions that compute an input dependent
                 checksum which is processed as part of the hash
                 computation. We show that a large class of such
                 schemes, including those using non-linear or even
                 one-way checksum functions, is not secure against the
                 second preimage attack of Kelsey and Schneier, the
                 herding attack of Kelsey and Kohno and the
                 multicollision attack of Joux. Our attacks also apply
                 to a large class of cascaded hash functions.''",
}

@Article{Lin:2010:MTE,
  author =       "Ching Lin and Vijay Varadharajan",
  title =        "{MobileTrust}: a trust enhanced security architecture
                 for mobile agent systems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "9",
  number =       "3",
  pages =        "153--178",
  month =        jun,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-009-0098-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:33 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-009-0098-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kundu:2010:DID,
  author =       "Amlan Kundu and Shamik Sural and A. K. Majumdar",
  title =        "Database intrusion detection using sequence
                 alignment",
  journal =      j-INT-J-INFO-SEC,
  volume =       "9",
  number =       "3",
  pages =        "179--191",
  month =        jun,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-010-0102-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:33 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-010-0102-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Buhan:2010:ERC,
  author =       "Ileana Buhan and Jeroen Doumen and Pieter Hartel and
                 Qian Tang and Raymond Veldhuis",
  title =        "Embedding renewable cryptographic keys into noisy
                 data",
  journal =      j-INT-J-INFO-SEC,
  volume =       "9",
  number =       "3",
  pages =        "193--208",
  month =        jun,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-010-0103-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:33 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-010-0103-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Ben-Ghorbel-Talbi:2010:DME,
  author =       "Meriam Ben-Ghorbel-Talbi and Fr{\'e}d{\'e}ric Cuppens
                 and Nora Cuppens-Boulahia and Adel Bouhoula",
  title =        "A delegation model for extended {RBAC}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "9",
  number =       "3",
  pages =        "209--236",
  month =        jun,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-010-0104-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:33 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-010-0104-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Ding:2010:NHA,
  author =       "Xuhua Ding and Yanjiang Yang and Robert H. Deng and
                 Shuhong Wang",
  title =        "A new hardware-assisted {PIR} with {$ O(n) $} shuffle
                 cost",
  journal =      j-INT-J-INFO-SEC,
  volume =       "9",
  number =       "4",
  pages =        "237--252",
  month =        aug,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-010-0105-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:33 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-010-0105-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
  keywords =     "private information retrieval (PIR)",
}

@Article{Lin:2010:ECE,
  author =       "Dan Lin and Prathima Rao and Elisa Bertino and Ninghui
                 Li and Jorge Lobo",
  title =        "{EXAM}: a comprehensive environment for the analysis
                 of access control policies",
  journal =      j-INT-J-INFO-SEC,
  volume =       "9",
  number =       "4",
  pages =        "253--273",
  month =        aug,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-010-0106-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:33 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-010-0106-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Pais:2010:NPR,
  author =       "Alwyn R. Pais and Shankar Joshi",
  title =        "A new probabilistic rekeying method for secure
                 multicast groups",
  journal =      j-INT-J-INFO-SEC,
  volume =       "9",
  number =       "4",
  pages =        "275--286",
  month =        aug,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-010-0108-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:33 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-010-0108-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Liu:2010:EOO,
  author =       "Joseph K. Liu and Joonsang Baek and Jianying Zhou and
                 Yanjiang Yang and Jun Wen Wong",
  title =        "Efficient online\slash offline identity-based
                 signature for wireless sensor network",
  journal =      j-INT-J-INFO-SEC,
  volume =       "9",
  number =       "4",
  pages =        "287--296",
  month =        aug,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-010-0109-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:33 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-010-0109-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Yuen:2010:HCI,
  author =       "Tsz Hon Yuen and Willy Susilo and Yi Mu",
  title =        "How to construct identity-based signatures without the
                 key escrow problem",
  journal =      j-INT-J-INFO-SEC,
  volume =       "9",
  number =       "4",
  pages =        "297--311",
  month =        aug,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-010-0110-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:33 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-010-0110-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Dupasquier:2010:AIL,
  author =       "Beno{\^\i}t Dupasquier and Stefan Burschka and Kieran
                 McLaughlin and Sakir Sezer",
  title =        "Analysis of information leakage from encrypted {Skype}
                 conversations",
  journal =      j-INT-J-INFO-SEC,
  volume =       "9",
  number =       "5",
  pages =        "313--325",
  month =        oct,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-010-0111-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:33 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-010-0111-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Skoric:2010:FDS,
  author =       "Boris Skori{\'c} and Marc X. Makkes",
  title =        "Flowchart description of security primitives for
                 controlled physical unclonable functions",
  journal =      j-INT-J-INFO-SEC,
  volume =       "9",
  number =       "5",
  pages =        "327--335",
  month =        oct,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-010-0113-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:33 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-010-0113-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Sajedi:2010:UCT,
  author =       "Hedieh Sajedi and Mansour Jamzad",
  title =        "Using contourlet transform and cover selection for
                 secure steganography",
  journal =      j-INT-J-INFO-SEC,
  volume =       "9",
  number =       "5",
  pages =        "337--352",
  month =        oct,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-010-0112-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:33 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-010-0112-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Chen:2010:HSS,
  author =       "Haiyong Chen and Hailiang Chen",
  title =        "A hybrid scheme for securing fingerprint templates",
  journal =      j-INT-J-INFO-SEC,
  volume =       "9",
  number =       "5",
  pages =        "353--361",
  month =        oct,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-010-0114-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:33 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-010-0114-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Baek:2010:RAR,
  author =       "Yoo-Jin Baek",
  title =        "Regular $ 2^w$-ary right-to-left exponentiation
                 algorithm with very efficient {DPA} and {FA}
                 countermeasures",
  journal =      j-INT-J-INFO-SEC,
  volume =       "9",
  number =       "5",
  pages =        "363--370",
  month =        oct,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-010-0118-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:33 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-010-0118-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Damgaard:2010:GPP,
  author =       "Ivan Damg{\aa}rd and Mads Jurik and Jesper Buus
                 Nielsen",
  title =        "A generalization of {Paillier}'s public-key system
                 with applications to electronic voting",
  journal =      j-INT-J-INFO-SEC,
  volume =       "9",
  number =       "6",
  pages =        "371--385",
  month =        dec,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-010-0119-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:34 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-010-0119-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{MacKenzie:2010:PAK,
  author =       "Philip MacKenzie and Sarvar Patel and Ram
                 Swaminathan",
  title =        "Password-authenticated key exchange based on {RSA}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "9",
  number =       "6",
  pages =        "387--410",
  month =        dec,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-010-0120-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:34 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-010-0120-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Naor:2010:ETR,
  author =       "Moni Naor and Benny Pinkas",
  title =        "Efficient trace and revoke schemes",
  journal =      j-INT-J-INFO-SEC,
  volume =       "9",
  number =       "6",
  pages =        "411--424",
  month =        dec,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-010-0121-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:34 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-010-0121-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Baumgarten:2011:CSH,
  author =       "Alex Baumgarten and Michael Steffen and Matthew
                 Clausman and Joseph Zambreno",
  title =        "A case study in hardware {Trojan} design and
                 implementation",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "1",
  pages =        "1--14",
  month =        feb,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-010-0115-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:34 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-010-0115-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Lim:2011:IBC,
  author =       "Hoon Wei Lim and Kenneth G. Paterson",
  title =        "Identity-based cryptography for grid security",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "1",
  pages =        "15--32",
  month =        feb,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-010-0116-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:34 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-010-0116-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Peng:2011:MOS,
  author =       "Kun Peng and Ed Dawson and Feng Bao",
  title =        "Modification and optimisation of a shuffling scheme:
                 stronger security, formal analysis and higher
                 efficiency",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "1",
  pages =        "33--47",
  month =        feb,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-010-0117-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:34 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-010-0117-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Peng:2011:GEC,
  author =       "Kun Peng",
  title =        "A general and efficient countermeasure to relation
                 attacks in mix-based e-voting",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "1",
  pages =        "49--60",
  month =        feb,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-010-0122-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:34 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-010-0122-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Anonymous:2011:P,
  author =       "Anonymous",
  title =        "Preface",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "2",
  pages =        "61--61",
  month =        jun,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0134-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:35 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0134-5;
                 http://link.springer.com/content/pdf/10.1007/s10207-011-0134-5.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Coker:2011:PRA,
  author =       "George Coker and Joshua Guttman and Peter Loscocco and
                 Amy Herzog and Jonathan Millen and Brian O'Hanlon and
                 John Ramsdell and Ariel Segall and Justin Sheehy and
                 Brian Sniffen",
  title =        "Principles of remote attestation",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "2",
  pages =        "63--81",
  month =        jun,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0124-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:35 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0124-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{DiPierro:2011:PTC,
  author =       "Alessandra {Di Pierro} and Chris Hankin and Herbert
                 Wiklicky",
  title =        "Probabilistic timing covert channels: to close or not
                 to close?",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "2",
  pages =        "83--106",
  month =        jun,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-010-0107-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:35 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-010-0107-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Backes:2011:CSS,
  author =       "Michael Backes and Iliano Cervesato and Aaron D.
                 Jaggard and Andre Scedrov and Joe-Kai Tsay",
  title =        "Cryptographically sound security proofs for basic and
                 public-key {Kerberos}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "2",
  pages =        "107--134",
  month =        jun,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0125-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:35 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0125-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Anonymous:2011:SIS,
  author =       "Anonymous",
  title =        "Special issue on ``{SCADA} and control system
                 security''",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "2",
  pages =        "135--136",
  month =        jun,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0128-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:35 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0128-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Crampton:2011:UFC,
  author =       "Jason Crampton and Hoon Wei Lim and Kenneth G.
                 Paterson and Geraint Price",
  title =        "User-friendly and certificate-free grid security
                 infrastructure",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "3",
  pages =        "137--153",
  month =        jun,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0123-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:35 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0123-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Zhu:2011:SLA,
  author =       "Wen Tao Zhu and Yang Xiang and Jianying Zhou and
                 Robert H. Deng and Feng Bao",
  title =        "Secure localization with attack detection in wireless
                 sensor networks",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "3",
  pages =        "155--171",
  month =        jun,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0127-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:35 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0127-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Roelse:2011:DST,
  author =       "Peter Roelse",
  title =        "Dynamic subtree tracing and its application in
                 pay-{TV} systems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "3",
  pages =        "173--187",
  month =        jun,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0126-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:35 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  note =         "See erratum \cite{Roelse:2011:EDS}.",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0126-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kate:2011:GCB,
  author =       "Aniket Kate and Ian Goldberg",
  title =        "Generalizing cryptosystems based on the subset sum
                 problem",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "3",
  pages =        "189--199",
  month =        jun,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0129-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:35 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0129-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Ustaoglu:2011:IIB,
  author =       "Berkant Ustao{\u{g}}lu",
  title =        "Integrating identity-based and certificate-based
                 authenticated key exchange protocols",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "4",
  pages =        "201--212",
  month =        aug,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0136-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:35 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0136-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Saxena:2011:DRE,
  author =       "Nitesh Saxena and Jonathan Voris",
  title =        "Data remanence effects on memory-based entropy
                 collection for {RFID} systems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "4",
  pages =        "213--222",
  month =        aug,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0139-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:35 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0139-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bouzida:2011:CAB,
  author =       "Yacine Bouzida and Luigi Logrippo and Serge
                 Mankovski",
  title =        "Concrete- and abstract-based access control",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "4",
  pages =        "223--238",
  month =        aug,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0138-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:35 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0138-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bielova:2011:DYR,
  author =       "Nataliia Bielova and Fabio Massacci",
  title =        "Do you really mean what you actually enforced?",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "4",
  pages =        "239--254",
  month =        aug,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0137-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:35 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0137-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Hanley:2011:UTD,
  author =       "Neil Hanley and Michael Tunstall and William P.
                 Marnane",
  title =        "Using templates to distinguish multiplications from
                 squaring operations",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "4",
  pages =        "255--266",
  month =        aug,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0135-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:35 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0135-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Jajodia:2011:MGE,
  author =       "Sushil Jajodia and Jianying Zhou",
  title =        "Message from the {Guest Editors}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "5",
  pages =        "267--268",
  month =        oct,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0131-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:36 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0131-8;
                 http://link.springer.com/content/pdf/10.1007/s10207-011-0131-8.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kong:2011:SSA,
  author =       "Deguang Kong and Yoon-Chan Jhi and Tao Gong and Sencun
                 Zhu and Peng Liu and Hongsheng Xi",
  title =        "{SAS}: semantics aware signature generation for
                 polymorphic worm detection",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "5",
  pages =        "269--283",
  month =        oct,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0132-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:36 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0132-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Chang:2011:EHS,
  author =       "Ee-Chien Chang and Liming Lu and Yongzheng Wu and
                 Roland H. C. Yap and Jie Yu",
  title =        "Enhancing host security using external environment
                 sensors",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "5",
  pages =        "285--299",
  month =        oct,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0130-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:36 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0130-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Marconi:2011:CPE,
  author =       "Luciana Marconi and Mauro Conti and Roberto {Di
                 Pietro}",
  title =        "{CASSANDRA}: a probabilistic, efficient, and
                 privacy-preserving solution to compute set
                 intersection",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "5",
  pages =        "301--319",
  month =        oct,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0133-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:36 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0133-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Gyorffy:2011:TBG,
  author =       "John Charles Gyorffy and Andrew F. Tappenden and James
                 Miller",
  title =        "Token-based graphical password authentication",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "6",
  pages =        "321--336",
  month =        nov,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0147-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:36 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0147-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Glisson:2011:ERW,
  author =       "William Bradley Glisson and Tim Storer and Gavin
                 Mayall and Iain Moug and George Grispos",
  title =        "Electronic retention: what does your mobile phone
                 reveal about you?",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "6",
  pages =        "337--349",
  month =        nov,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0144-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:36 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0144-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Garcia:2011:SID,
  author =       "Sergio S{\'a}nchez Garc{\'\i}a and Ana G{\'o}mez Oliva
                 and Emilia P{\'e}rez Belleboni and Iv{\'a}n Pau de la
                 Cruz",
  title =        "Solving identity delegation problem in the
                 e-government environment",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "6",
  pages =        "351--372",
  month =        nov,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0140-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:36 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0140-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Huang:2011:ESD,
  author =       "Qiong Huang and Guomin Yang and Duncan S. Wong and
                 Willy Susilo",
  title =        "Efficient strong designated verifier signature schemes
                 without random oracle or with non-delegatability",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "6",
  pages =        "373--385",
  month =        nov,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0146-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:36 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0146-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Miret:2011:CAH,
  author =       "Josep M. Miret and Francesc Seb{\'e}",
  title =        "Cryptanalysis of an ad-hoc cryptosystem for mix-based
                 e-voting robust against relation attacks",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "6",
  pages =        "387--389",
  month =        nov,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0145-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:36 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0145-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Roelse:2011:EDS,
  author =       "Peter Roelse",
  title =        "Erratum to: {Dynamic subtree tracing and its
                 application in pay-TV systems}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "10",
  number =       "6",
  pages =        "391--391",
  month =        nov,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0141-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:36 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  note =         "See \cite{Roelse:2011:DST}.",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0141-6;
                 http://link.springer.com/content/pdf/10.1007/s10207-011-0141-6.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Fiore:2012:RBS,
  author =       "D. Fiore and R. Gennaro and N. P. Smart",
  title =        "Relations between the security models for
                 certificateless encryption and {ID}-based key
                 agreement",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "1",
  pages =        "1--22",
  month =        feb,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0149-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:36 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0149-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Peng:2012:TDA,
  author =       "Kun Peng",
  title =        "Threshold distributed access control with public
                 verification: a practical application of {PVSS}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "1",
  pages =        "23--31",
  month =        feb,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0151-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:36 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0151-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Ates:2012:WHI,
  author =       "Mika{\"e}l Ates and Francesco Buccafurri and Jacques
                 Fayolle and Gianluca Lax",
  title =        "A warning on how to implement anonymous credential
                 protocols into the information card framework",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "1",
  pages =        "33--40",
  month =        feb,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0150-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:36 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0150-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Wang:2012:SGN,
  author =       "Yuanzhuo Wang and Min Yu and Jingyuan Li and Kun Meng
                 and Chuang Lin and Xueqi Cheng",
  title =        "Stochastic game net and applications in security
                 analysis for enterprise network",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "1",
  pages =        "41--52",
  month =        feb,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0148-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:36 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0148-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Huang:2012:NEO,
  author =       "Qiong Huang and Guomin Yang and Duncan S. Wong and
                 Willy Susilo",
  title =        "A new efficient optimistic fair exchange protocol
                 without random oracles",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "1",
  pages =        "53--63",
  month =        feb,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0152-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:36 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0152-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Guerra-Casanova:2012:AMD,
  author =       "J. Guerra-Casanova and C. S{\'a}nchez-{\'A}vila and G.
                 Bailador and A. de Santos Sierra",
  title =        "Authentication in mobile devices through hand gesture
                 recognition",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "2",
  pages =        "65--83",
  month =        apr,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0154-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:37 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0154-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Nuida:2012:SCS,
  author =       "Koji Nuida",
  title =        "Short collusion-secure fingerprint codes against three
                 pirates",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "2",
  pages =        "85--102",
  month =        apr,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0155-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:37 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0155-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Andreeva:2012:SAS,
  author =       "Elena Andreeva and Andrey Bogdanov and Bart Mennink
                 and Bart Preneel and Christian Rechberger",
  title =        "On security arguments of the second round {SHA-3}
                 candidates",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "2",
  pages =        "103--120",
  month =        apr,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0156-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:37 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0156-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
  keywords =     "Classification; Differential attacks; Hash functions;
                 Security reductions; SHA-3 competition; US National
                 Institute for Standards and Technology (NIST)
                 cryptographic hash algorithm design competition",
}

@Article{Gritzalis:2012:FAR,
  author =       "Dimitris Gritzalis and Panagiotis Katsaros and
                 Stylianos Basagiannis and Yannis Soupionis",
  title =        "Formal analysis for robust anti-{SPIT} protection
                 using model checking",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "2",
  pages =        "121--135",
  month =        apr,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0159-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:37 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0159-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Niebuhr:2012:SPS,
  author =       "Robert Niebuhr and Mohammed Meziani and Stanislav
                 Bulygin and Johannes Buchmann",
  title =        "Selecting parameters for secure {McEliece}-based
                 cryptosystems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "3",
  pages =        "137--147",
  month =        jun,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-011-0153-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:37 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-011-0153-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Andreeva:2012:PFG,
  author =       "Elena Andreeva and Bart Mennink and Bart Preneel",
  title =        "The parazoa family: generalizing the sponge hash
                 functions",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "3",
  pages =        "149--165",
  month =        jun,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0157-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:37 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0157-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Dewri:2012:OSH,
  author =       "Rinku Dewri and Indrajit Ray and Nayot Poolsappasit
                 and Darrell Whitley",
  title =        "Optimal security hardening on attack tree models of
                 networks: a cost-benefit analysis",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "3",
  pages =        "167--188",
  month =        jun,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0160-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:37 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0160-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Das:2012:RKE,
  author =       "Ashok Kumar Das",
  title =        "A random key establishment scheme for multi-phase
                 deployment in large-scale distributed sensor networks",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "3",
  pages =        "189--211",
  month =        jun,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0162-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:37 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0162-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Ahmed:2012:MGE,
  author =       "Irfan Ahmed and Martin Naedele and Bradley Schatz and
                 Ryoichi Sasaki and Andrew West",
  title =        "Message from the guest editors",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "4",
  pages =        "213--213",
  month =        aug,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0168-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:37 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0168-3;
                 http://link.springer.com/content/pdf/10.1007/s10207-012-0168-3.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Reaves:2012:OVT,
  author =       "Bradley Reaves and Thomas Morris",
  title =        "An open virtual testbed for industrial control system
                 security research",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "4",
  pages =        "215--229",
  month =        aug,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0164-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:37 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0164-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Hadziosmanovic:2012:LMA,
  author =       "Dina Hadziosmanovi{\'c} and Damiano Bolzoni and Pieter
                 H. Hartel",
  title =        "A log mining approach for process monitoring in
                 {SCADA}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "4",
  pages =        "231--251",
  month =        aug,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0163-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:37 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0163-8;
                 http://link.springer.com/content/pdf/10.1007/s10207-012-0163-8.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Sole:2012:EMT,
  author =       "Marc Sol{\'e} and Victor Munt{\'e}s-Mulero and Jordi
                 Nin",
  title =        "Efficient microaggregation techniques for large
                 numerical data volumes",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "4",
  pages =        "253--267",
  month =        aug,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0158-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:37 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0158-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Yaseen:2012:ITM,
  author =       "Qussai Yaseen and Brajendra Panda",
  title =        "Insider threat mitigation: preventing unauthorized
                 knowledge acquisition",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "4",
  pages =        "269--280",
  month =        aug,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0165-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:37 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0165-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Huber:2012:PSS,
  author =       "Michael Huber",
  title =        "Perfect secrecy systems immune to spoofing attacks",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "4",
  pages =        "281--289",
  month =        aug,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0166-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:37 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0166-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Zhou:2012:MGE,
  author =       "Jianying Zhou and Xuejia Lai and Hui Li",
  title =        "Message from the {Guest Editors}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "5",
  pages =        "291--292",
  month =        oct,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0172-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:38 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0172-7;
                 http://link.springer.com/content/pdf/10.1007/s10207-012-0172-7.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Xin:2012:RAA,
  author =       "Zhi Xin and Huiyu Chen and Xinche Wang and Peng Liu
                 and Sencun Zhu and Bing Mao and Li Xie",
  title =        "Replacement attacks: automatically evading
                 behavior-based software birthmark",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "5",
  pages =        "293--304",
  month =        oct,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0170-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:38 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0170-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Chen:2012:DHP,
  author =       "Liqun Chen and Yu Chen",
  title =        "The $n$-{Diffie--Hellman} problem and multiple-key
                 encryption",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "5",
  pages =        "305--320",
  month =        oct,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0171-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:38 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0171-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kontaxis:2012:MID,
  author =       "Georgios Kontaxis and Michalis Polychronakis and
                 Evangelos P. Markatos",
  title =        "Minimizing information disclosure to third parties in
                 social login platforms",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "5",
  pages =        "321--332",
  month =        oct,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0173-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:38 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0173-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Golic:2012:NAM,
  author =       "Jovan Dj. Goli{\'c}",
  title =        "A new authentication model for ad hoc networks",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "5",
  pages =        "333--347",
  month =        oct,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0167-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:38 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0167-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Camacho:2012:SAC,
  author =       "Philippe Camacho and Alejandro Hevia and Marcos Kiwi
                 and Roberto Opazo",
  title =        "Strong accumulators from collision-resistant hashing",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "5",
  pages =        "349--363",
  month =        oct,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0169-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:38 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0169-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Perez-Mendez:2012:CLS,
  author =       "Alejandro P{\'e}rez-M{\'e}ndez and Fernando
                 Pere{\~n}{\'\i}guez-Garc{\'\i}a and Rafael
                 Mar{\'\i}n-L{\'o}pez and Gabriel L{\'o}pez-Mill{\'a}n",
  title =        "A cross-layer {SSO} solution for federating access to
                 kerberized services in the {eduroam\slash DAMe}
                 network",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "6",
  pages =        "365--388",
  month =        nov,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0174-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:38 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0174-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Han:2012:NCO,
  author =       "Jinguang Han and Willy Susilo and Yi Mu and Jun Yan",
  title =        "New constructions of {OSBE} schemes and their
                 applications in oblivious access control",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "6",
  pages =        "389--401",
  month =        nov,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0176-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:38 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0176-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bogdanov:2012:HPS,
  author =       "Dan Bogdanov and Margus Niitsoo and Tomas Toft and Jan
                 Willemson",
  title =        "High-performance secure multi-party computation for
                 data mining applications",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "6",
  pages =        "403--418",
  month =        nov,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0177-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:38 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0177-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bagheri:2012:SFP,
  author =       "Nasour Bagheri and Praveen Gauravaram and Lars R.
                 Knudsen and Erik Zenner",
  title =        "The suffix-free-prefix-free hash function construction
                 and its indifferentiability security analysis",
  journal =      j-INT-J-INFO-SEC,
  volume =       "11",
  number =       "6",
  pages =        "419--434",
  month =        nov,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0175-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:38 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0175-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{DArco:2013:TTR,
  author =       "Paolo D'Arco and Angel Perez del Pozo",
  title =        "Toward tracing and revoking schemes secure against
                 collusion and any form of secret information leakage",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "1",
  pages =        "1--17",
  month =        feb,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0186-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:38 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0186-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Abe:2013:DTA,
  author =       "Masayuki Abe and Sherman S. M. Chow and Kristiyan
                 Haralambiev and Miyako Ohkubo",
  title =        "Double-trapdoor anonymous tags for traceable
                 signatures",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "1",
  pages =        "19--31",
  month =        feb,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0184-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:38 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0184-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Catalano:2013:FNI,
  author =       "Dario Catalano and Mario {Di Raimondo} and Dario Fiore
                 and Rosario Gennaro and Orazio Puglisi",
  title =        "Fully non-interactive onion routing with forward
                 secrecy",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "1",
  pages =        "33--47",
  month =        feb,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0185-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:38 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0185-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{DeCristofaro:2013:PDC,
  author =       "Emiliano {De Cristofaro} and Mark Manulis and Bertram
                 Poettering",
  title =        "Private discovery of common social contacts",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "1",
  pages =        "49--65",
  month =        feb,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0183-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:38 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0183-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Marmol:2013:PEA,
  author =       "F{\'e}lix G{\'o}mez M{\'a}rmol and Christoph Sorge and
                 Ronald Petrlic and Osman Ugus and Dirk Westhoff and
                 Gregorio Mart{\'\i}nez P{\'e}rez",
  title =        "Privacy-enhanced architecture for smart metering",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "2",
  pages =        "67--82",
  month =        apr,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0181-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:39 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0181-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Asghar:2013:CCH,
  author =       "Hassan Jameel Asghar and Shujun Li and Josef Pieprzyk
                 and Huaxiong Wang",
  title =        "Cryptanalysis of the convex hull click human
                 identification protocol",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "2",
  pages =        "83--96",
  month =        apr,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0161-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:39 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0161-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Alsaleh:2013:EAA,
  author =       "Mansour Alsaleh and P. C. van Oorschot",
  title =        "Evaluation in the absence of absolute ground truth:
                 toward reliable evaluation methodology for scan
                 detectors",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "2",
  pages =        "97--110",
  month =        apr,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0178-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:39 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0178-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Abbadi:2013:FET,
  author =       "Imad M. Abbadi",
  title =        "A framework for establishing trust in Cloud
                 provenance",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "2",
  pages =        "111--128",
  month =        apr,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0179-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:39 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0179-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Rebollo-Monedero:2013:MPA,
  author =       "David Rebollo-Monedero and Javier Parra-Arnau and
                 Claudia Diaz and Jordi Forn{\'e}",
  title =        "On the measurement of privacy as an attacker's
                 estimation error",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "2",
  pages =        "129--149",
  month =        apr,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0182-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:39 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0182-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Rizomiliotis:2013:SAP,
  author =       "Panagiotis Rizomiliotis and Stefanos Gritzalis",
  title =        "On the security of {AUTH}, a provably secure
                 authentication protocol based on the subspace {LPN}
                 problem",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "2",
  pages =        "151--154",
  month =        apr,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0188-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:39 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0188-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Xu:2013:VBP,
  author =       "Wenjuan Xu and Mohamed Shehab and Gail-Joon Ahn",
  title =        "Visualization-based policy analysis for {SELinux}:
                 framework and user study",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "3",
  pages =        "155--171",
  month =        jun,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0180-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:39 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0180-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Tormo:2013:DAI,
  author =       "Gin{\'e}s D{\'o}lera Tormo and Gabriel L{\'o}pez
                 Mill{\'a}n and Gregorio Mart{\'\i}nez P{\'e}rez",
  title =        "Definition of an advanced identity management
                 infrastructure",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "3",
  pages =        "173--200",
  month =        jun,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0189-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:39 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0189-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Vrakas:2013:IDP,
  author =       "Nikos Vrakas and Costas Lambrinoudakis",
  title =        "An intrusion detection and prevention system for {IMS}
                 and {VoIP} services",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "3",
  pages =        "201--217",
  month =        jun,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-012-0187-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:39 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-012-0187-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bernhard:2013:AAU,
  author =       "D. Bernhard and G. Fuchsbauer and E. Ghadafi and N. P.
                 Smart and B. Warinschi",
  title =        "Anonymous attestation with user-controlled
                 linkability",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "3",
  pages =        "219--249",
  month =        jun,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0191-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:39 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0191-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Phan:2013:ACB,
  author =       "Duong-Hieu Phan and David Pointcheval and Siamak F.
                 Shahandashti and Mario Strefler",
  title =        "Adaptive {CCA} broadcast encryption with constant-size
                 secret keys and ciphertexts",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "4",
  pages =        "251--265",
  month =        aug,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0190-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:39 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0190-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Brzuska:2013:LMR,
  author =       "C. Brzuska and M. Fischlin and N. P. Smart and B.
                 Warinschi and S. C. Williams",
  title =        "Less is more: relaxed yet composable security notions
                 for key exchange",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "4",
  pages =        "267--297",
  month =        aug,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0192-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:39 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0192-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Draper-Gil:2013:OFE,
  author =       "G. Draper-Gil and J. Zhou and J. L. Ferrer-Gomila and
                 M. F. Hinarejos",
  title =        "An optimistic fair exchange protocol with active
                 intermediaries",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "4",
  pages =        "299--318",
  month =        aug,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0194-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:39 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0194-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Beauquier:2013:SPE,
  author =       "Dani{\`e}le Beauquier and Jo{\"e}lle Cohen and Ruggero
                 Lanotte",
  title =        "Security policies enforcement using finite and
                 pushdown edit automata",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "4",
  pages =        "319--336",
  month =        aug,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0195-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:39 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0195-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Peng:2013:SAH,
  author =       "Kun Peng",
  title =        "A shuffle to achieve high efficiency through
                 pre-computation and batch verification",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "4",
  pages =        "337--345",
  month =        aug,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0193-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:39 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0193-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Boteanu:2013:CSQ,
  author =       "Daniel Boteanu and Jos{\'e} M. Fernandez",
  title =        "A comprehensive study of queue management as a {DoS}
                 counter-measure",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "5",
  pages =        "347--382",
  month =        oct,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0197-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:40 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0197-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Wang:2013:USM,
  author =       "Pu Wang and Marta C. Gonz{\'a}lez and Ronaldo Menezes
                 and Albert-L{\'a}szl{\'o} Barab{\'a}si",
  title =        "Understanding the spread of malicious mobile-phone
                 programs and their damage potential",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "5",
  pages =        "383--392",
  month =        oct,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0203-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:40 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0203-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Schreuders:2013:FBA,
  author =       "Z. Cliffe Schreuders and Christian Payne and Tanya
                 McGill",
  title =        "The functionality-based application confinement
                 model",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "5",
  pages =        "393--422",
  month =        oct,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0199-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:40 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0199-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Zakerzadeh:2013:DSA,
  author =       "Hessam Zakerzadeh and Sylvia L. Osborn",
  title =        "Delay-sensitive approaches for anonymizing numerical
                 streaming data",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "5",
  pages =        "423--437",
  month =        oct,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0196-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:40 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0196-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bresson:2013:LLS,
  author =       "Emmanuel Bresson and Dario Catalano and Mario {Di
                 Raimondo} and Dario Fiore and Rosario Gennaro",
  title =        "Off-line\slash on-line signatures revisited: a general
                 unifying paradigm, efficient threshold variants and
                 experimental results",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "6",
  pages =        "439--465",
  month =        nov,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0200-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:40 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0200-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kundu:2013:PPA,
  author =       "Ashish Kundu and Elisa Bertino",
  title =        "Privacy-preserving authentication of trees and
                 graphs",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "6",
  pages =        "467--494",
  month =        nov,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0198-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:40 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0198-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Chen:2013:AMA,
  author =       "Yu-Shian Chen and Chin-Laung Lei",
  title =        "Aggregate message authentication codes ({AMACs}) with
                 on-the-fly verification",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "6",
  pages =        "495--504",
  month =        nov,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0202-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:40 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0202-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Pereniguez-Garcia:2013:KPA,
  author =       "F. Pere{\~n}{\'\i}guez-Garc{\'\i}a and R.
                 Mar{\'\i}n-L{\'o}pez and G. Kambourakis and A.
                 Ruiz-Mart{\'\i}nez and S. Gritzalis and A. F.
                 Skarmeta-G{\'o}mez",
  title =        "{KAMU}: providing advanced user privacy in {Kerberos}
                 multi-domain scenarios",
  journal =      j-INT-J-INFO-SEC,
  volume =       "12",
  number =       "6",
  pages =        "505--525",
  month =        nov,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0201-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:40 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0201-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Liao:2014:POC,
  author =       "Qi Liao and Zhen Li",
  title =        "Portfolio optimization of computer and mobile
                 botnets",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "1",
  pages =        "1--14",
  month =        feb,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0206-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:41 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0206-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Mizuki:2014:FCB,
  author =       "Takaaki Mizuki and Hiroki Shizuya",
  title =        "A formalization of card-based cryptographic protocols
                 via abstract machine",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "1",
  pages =        "15--23",
  month =        feb,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0219-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:41 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0219-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Manulis:2014:PAI,
  author =       "Mark Manulis and Bertram Poettering and Douglas
                 Stebila",
  title =        "Plaintext awareness in identity-based key
                 encapsulation",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "1",
  pages =        "25--49",
  month =        feb,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0218-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:41 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0218-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Emura:2014:GSI,
  author =       "Keita Emura and Goichiro Hanaoka and Yusuke Sakai and
                 Jacob C. N. Schuldt",
  title =        "Group signature implies public-key encryption with
                 non-interactive opening",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "1",
  pages =        "51--62",
  month =        feb,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0204-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:41 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0204-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Granadillo:2014:RBC,
  author =       "Gustavo Gonzalez Granadillo and Malek Belhaouane and
                 Herv{\'e} Debar and Gr{\'e}goire Jacob",
  title =        "{RORI}-based countermeasure selection using the
                 {OrBAC} formalism",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "1",
  pages =        "63--79",
  month =        feb,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0207-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:41 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0207-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Saikia:2014:PHF,
  author =       "Navajit Saikia and Prabin K. Bora",
  title =        "Perceptual hash function for scalable video",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "1",
  pages =        "81--93",
  month =        feb,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0211-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:41 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0211-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Anonymous:2014:SCC,
  author =       "Anonymous",
  title =        "Security in cloud computing",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "2",
  pages =        "95--96",
  month =        apr,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0232-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:41 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0232-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Gouglidis:2014:SPV,
  author =       "Antonios Gouglidis and Ioannis Mavridis and Vincent C.
                 Hu",
  title =        "Security policy verification for multi-domains in
                 cloud systems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "2",
  pages =        "97--111",
  month =        apr,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0205-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:41 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0205-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Fernandes:2014:SIC,
  author =       "Diogo A. B. Fernandes and Liliana F. B. Soares and
                 Jo{\~a}o V. Gomes and M{\'a}rio M. Freire and Pedro R.
                 M. In{\'a}cio",
  title =        "Security issues in cloud environments: a survey",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "2",
  pages =        "113--170",
  month =        apr,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0208-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:41 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0208-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bates:2014:DCR,
  author =       "Adam Bates and Benjamin Mood and Joe Pletcher and
                 Hannah Pruse and Masoud Valafar and Kevin Butler",
  title =        "On detecting co-resident cloud instances using network
                 flow watermarking techniques",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "2",
  pages =        "171--189",
  month =        apr,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0210-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:41 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0210-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Albeshri:2014:EGI,
  author =       "Aiiad Albeshri and Colin Boyd and Juan Gonz{\'a}lez
                 Nieto",
  title =        "Enhanced {GeoProof}: improved geographic assurance for
                 data in the cloud",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "2",
  pages =        "191--198",
  month =        apr,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0217-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:41 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0217-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Nunez:2014:BPP,
  author =       "David Nu{\~n}ez and Isaac Agudo",
  title =        "{BlindIdM}: a privacy-preserving approach for identity
                 management as a service",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "2",
  pages =        "199--215",
  month =        apr,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0230-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:41 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0230-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Mavrogiannopoulos:2014:TSK,
  author =       "Nikos Mavrogiannopoulos and Andreas Pashalidis and
                 Bart Preneel",
  title =        "Toward a secure {Kerberos} key exchange with smart
                 cards",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "3",
  pages =        "217--228",
  month =        jun,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0213-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:41 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0213-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Li:2014:AAM,
  author =       "Fudong Li and Nathan Clarke and Maria Papadaki and
                 Paul Dowland",
  title =        "Active authentication for mobile devices utilising
                 behaviour profiling",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "3",
  pages =        "229--244",
  month =        jun,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0209-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:41 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0209-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Wu:2014:SSP,
  author =       "Tzong-Sun Wu and Ming-Lun Lee and Han-Yu Lin and
                 Chao-Yuan Wang",
  title =        "Shoulder-surfing-proof graphical password
                 authentication scheme",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "3",
  pages =        "245--254",
  month =        jun,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0216-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:41 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0216-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Mu:2014:RBD,
  author =       "Chengpo Mu and Meng Yu and Yingjiu Li and Wanyu Zang",
  title =        "Risk balance defense approach against intrusions for
                 network server",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "3",
  pages =        "255--269",
  month =        jun,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0214-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:41 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0214-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Lian:2014:PSC,
  author =       "Bin Lian and Gongliang Chen and Jianhua Li",
  title =        "Provably secure E-cash system with practical and
                 efficient complete tracing",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "3",
  pages =        "271--289",
  month =        jun,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0240-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:41 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0240-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{McEvoy:2014:ANT,
  author =       "Robert P. McEvoy and Michael Tunstall and Claire
                 Whelan and Colin C. Murphy and William P. Marnane",
  title =        "{All-or-Nothing Transforms} as a countermeasure to
                 differential side-channel analysis",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "3",
  pages =        "291--304",
  month =        jun,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0212-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:41 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0212-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kim:2014:EVE,
  author =       "Kee Sung Kim and Ik Rae Jeong",
  title =        "Efficient verifiably encrypted signatures from
                 lattices",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "4",
  pages =        "305--314",
  month =        aug,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0226-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:42 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0226-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Sepahi:2014:LBC,
  author =       "Reza Sepahi and Ron Steinfeld and Josef Pieprzyk",
  title =        "Lattice-based certificateless public-key encryption in
                 the standard model",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "4",
  pages =        "315--333",
  month =        aug,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0215-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:42 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0215-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bertoni:2014:SCS,
  author =       "Guido Bertoni and Joan Daemen and Micha{\"e}l Peeters
                 and Gilles {Van Assche}",
  title =        "Sufficient conditions for sound tree and sequential
                 hashing modes",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "4",
  pages =        "335--353",
  month =        aug,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0220-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:42 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0220-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Alabrah:2014:ESC,
  author =       "Amerah Alabrah and Jeffrey Cashion and Mostafa
                 Bassiouni",
  title =        "Enhancing security of cookie-based sessions in mobile
                 networks using sparse caching",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "4",
  pages =        "355--366",
  month =        aug,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0223-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:42 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0223-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Shameli-Sendi:2014:ACA,
  author =       "Alireza Shameli-Sendi and Michel Dagenais",
  title =        "{ARITO}: Cyber-attack response system using accurate
                 risk impact tolerance",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "4",
  pages =        "367--390",
  month =        aug,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0222-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:42 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0222-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Mousazadeh:2014:RGA,
  author =       "Mousa Mousazadeh and Behrouz Tork Ladani",
  title =        "Randomized gossip algorithms under attack",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "4",
  pages =        "391--402",
  month =        aug,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0221-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:42 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0221-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Garcia:2014:WLS,
  author =       "Flavio D. Garcia and Gerhard de Koning Gans and Roel
                 Verdult",
  title =        "Wirelessly lockpicking a smart card reader",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "5",
  pages =        "403--420",
  month =        oct,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0234-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:42 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0234-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Catuogno:2014:ATF,
  author =       "Luigi Catuogno and Clemente Galdi",
  title =        "Analysis of a two-factor graphical password scheme",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "5",
  pages =        "421--437",
  month =        oct,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0228-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:42 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0228-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Zhang:2014:DFA,
  author =       "Meng Zhang and Anand Raghunathan and Niraj K. Jha",
  title =        "A defense framework against malware and vulnerability
                 exploits",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "5",
  pages =        "439--452",
  month =        oct,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0233-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:42 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0233-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Yasmin:2014:PSP,
  author =       "Rehana Yasmin and Eike Ritter and Guilin Wang",
  title =        "Provable security of a pairing-free one-pass
                 authenticated key establishment protocol for wireless
                 sensor networks",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "5",
  pages =        "453--465",
  month =        oct,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0224-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:42 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0224-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Gao:2014:TTR,
  author =       "Weizheng Gao and Kashi Neupane and Rainer Steinwandt",
  title =        "Tuning a two-round group key agreement",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "5",
  pages =        "467--476",
  month =        oct,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-013-0225-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:42 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-013-0225-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Shin:2014:AAA,
  author =       "Sooyeon Shin and Taekyoung Kwon",
  title =        "{AAnA}: Anonymous authentication and authorization
                 based on short traceable signatures",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "5",
  pages =        "477--495",
  month =        oct,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0227-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:42 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0227-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Herranz:2014:SEA,
  author =       "Javier Herranz and Jordi Nin",
  title =        "Secure and efficient anonymization of distributed
                 confidential databases",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "6",
  pages =        "497--512",
  month =        nov,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0237-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:42 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0237-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Lee:2014:AGU,
  author =       "Ming-Feng Lee and Nigel P. Smart and Bogdan Warinschi
                 and Gaven J. Watson",
  title =        "Anonymity guarantees of the {UMTS\slash LTE}
                 authentication and connection protocol",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "6",
  pages =        "513--527",
  month =        nov,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0231-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:42 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0231-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Veeningen:2014:DMC,
  author =       "Meilof Veeningen and Benne de Weger and Nicola
                 Zannone",
  title =        "Data minimisation in communication protocols: a formal
                 analysis framework and application to identity
                 management",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "6",
  pages =        "529--569",
  month =        nov,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0235-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:42 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0235-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Jovanovikj:2014:CMS,
  author =       "Vladimir Jovanovikj and Dusan Gabrijelcic and Tomaz
                 Klobucar",
  title =        "A conceptual model of security context",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "6",
  pages =        "571--581",
  month =        nov,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0229-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:42 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0229-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Sen:2014:UIW,
  author =       "Sevil Sen",
  title =        "Using instance-weighted naive {Bayes} for adapting
                 concept drift in masquerade detection",
  journal =      j-INT-J-INFO-SEC,
  volume =       "13",
  number =       "6",
  pages =        "583--590",
  month =        nov,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0238-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:42 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0238-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Han:2015:MAU,
  author =       "Kyoung Soo Han and Jae Hyun Lim and Boojoong Kang and
                 Eul Gyu Im",
  title =        "Malware analysis using visualized images and entropy
                 graphs",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "1",
  pages =        "1--14",
  month =        feb,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0242-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:43 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0242-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Nappa:2015:MDI,
  author =       "Antonio Nappa and M. Zubair Rafique and Juan
                 Caballero",
  title =        "The {MALICIA} dataset: identification and analysis of
                 drive-by download operations",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "1",
  pages =        "15--33",
  month =        feb,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0248-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:43 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0248-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Silva:2015:RMP,
  author =       "Helber Silva and Aldri Santos and Michele Nogueira",
  title =        "Routing management for performance and security
                 tradeoff in wireless mesh networks",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "1",
  pages =        "35--46",
  month =        feb,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0246-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:43 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0246-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Dolzhenko:2015:MRE,
  author =       "Egor Dolzhenko and Jay Ligatti and Srikar Reddy",
  title =        "Modeling runtime enforcement with mandatory results
                 automata",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "1",
  pages =        "47--60",
  month =        feb,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0239-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:43 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0239-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Valenzuela:2015:MAO,
  author =       "Michael Valenzuela and Ferenc Szidarovszky and Jerzy
                 Rozenblit",
  title =        "A multiresolution approach for optimal defense against
                 random attacks",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "1",
  pages =        "61--72",
  month =        feb,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0245-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:43 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0245-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Tonicelli:2015:ITS,
  author =       "Rafael Tonicelli and Anderson C. A. Nascimento and
                 Rafael Dowsley and J{\"o}rn M{\"u}ller-Quade and Hideki
                 Imai and Goichiro Hanaoka and Akira Otsuka",
  title =        "Information-theoretically secure oblivious polynomial
                 evaluation in the commodity-based model",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "1",
  pages =        "73--84",
  month =        feb,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0247-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:43 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0247-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Arbit:2015:IPK,
  author =       "Alex Arbit and Yoel Livne and Yossef Oren and Avishai
                 Wool",
  title =        "Implementing public-key cryptography on passive {RFID}
                 tags is practical",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "1",
  pages =        "85--99",
  month =        feb,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0236-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:43 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0236-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bella:2015:SIS,
  author =       "Giampaolo Bella and Helge Janicke",
  title =        "Special issue on the {Security Track at the ACM
                 Symposium on Applied Computing 2013}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "2",
  pages =        "101--102",
  month =        apr,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0280-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:43 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0280-2;
                 http://link.springer.com/content/pdf/10.1007/s10207-015-0280-2.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Martina:2015:ATM,
  author =       "Jean Everson Martina and Eduardo dos Santos and
                 Marcelo Carlomagno Carlos and Geraint Price and Ricardo
                 Felipe Cust{\'o}dio",
  title =        "An adaptive threat model for security ceremonies",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "2",
  pages =        "103--121",
  month =        apr,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0253-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:43 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0253-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Armando:2015:FMA,
  author =       "Alessandro Armando and Gabriele Costa and Alessio
                 Merlo and Luca Verderame",
  title =        "Formal modeling and automatic enforcement of {Bring
                 Your Own Device} policies",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "2",
  pages =        "123--140",
  month =        apr,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0252-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:43 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0252-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Spreitzenbarth:2015:MSC,
  author =       "Michael Spreitzenbarth and Thomas Schreck and Florian
                 Echtler and Daniel Arp and Johannes Hoffmann",
  title =        "{Mobile-Sandbox}: combining static and dynamic
                 analysis with machine-learning techniques",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "2",
  pages =        "141--153",
  month =        apr,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0250-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:43 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0250-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Riecker:2015:LEC,
  author =       "Michael Riecker and Sebastian Biedermann and Rachid
                 {El Bansarkhani} and Matthias Hollick",
  title =        "Lightweight energy consumption-based intrusion
                 detection system for wireless sensor networks",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "2",
  pages =        "155--167",
  month =        apr,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0241-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:43 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0241-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Egners:2015:MOW,
  author =       "Andr{\'e} Egners and Patrick Herrmann and Ulrike
                 Meyer",
  title =        "Multi-operator wireless mesh networks secured by an
                 all-encompassing security architecture",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "2",
  pages =        "169--186",
  month =        apr,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0244-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:43 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0244-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Martina:2015:VMB,
  author =       "Jean Everson Martina and Lawrence Charles Paulson",
  title =        "Verifying multicast-based security protocols using the
                 inductive method",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "2",
  pages =        "187--204",
  month =        apr,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0251-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:43 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0251-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Chakravarty:2015:DAE,
  author =       "Sambuddho Chakravarty and Georgios Portokalidis and
                 Michalis Polychronakis and Angelos D. Keromytis",
  title =        "Detection and analysis of eavesdropping in anonymous
                 communication networks",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "3",
  pages =        "205--220",
  month =        jun,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0256-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:43 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0256-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Seifi:2015:ATA,
  author =       "Younes Seifi and Suriadi Suriadi and Ernest Foo and
                 Colin Boyd",
  title =        "Analysis of two authorization protocols using {Colored
                 Petri Nets}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "3",
  pages =        "221--247",
  month =        jun,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0243-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:43 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0243-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{James:2015:AIP,
  author =       "Joshua I. James and Pavel Gladyshev",
  title =        "Automated inference of past action instances in
                 digital investigations",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "3",
  pages =        "249--261",
  month =        jun,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0249-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:43 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0249-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Giffhorn:2015:NAL,
  author =       "Dennis Giffhorn and Gregor Snelting",
  title =        "A new algorithm for low-deterministic security",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "3",
  pages =        "263--287",
  month =        jun,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0257-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:43 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0257-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Vasiliadis:2015:GAM,
  author =       "Giorgos Vasiliadis and Michalis Polychronakis and
                 Sotiris Ioannidis",
  title =        "{GPU}-assisted malware",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "3",
  pages =        "289--297",
  month =        jun,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0262-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:43 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0262-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Pitropakis:2015:BRP,
  author =       "Nikolaos Pitropakis and Aggelos Pikrakis and Costas
                 Lambrinoudakis",
  title =        "Behaviour reflects personality: detecting co-residence
                 attacks on {Xen}-based cloud environments",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "4",
  pages =        "299--305",
  month =        aug,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0255-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:44 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0255-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Yu:2015:EPR,
  author =       "Yong Yu and Man Ho Au and Yi Mu and Shaohua Tang and
                 Jian Ren and Willy Susilo and Liju Dong",
  title =        "Enhanced privacy of a remote data integrity-checking
                 protocol for secure cloud storage",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "4",
  pages =        "307--318",
  month =        aug,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0263-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:44 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0263-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Casassa-Mont:2015:TSI,
  author =       "Marco Casassa-Mont and Ilaria Matteucci and Marinella
                 Petrocchi and Marco Luca Sbodio",
  title =        "Towards safer information sharing in the cloud",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "4",
  pages =        "319--334",
  month =        aug,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0258-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:44 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0258-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Isern-Deya:2015:PUG,
  author =       "Andreu Pere Isern-Dey{\`a} and Lloren{\c{c}}
                 Huguet-Rotger and M. Magdalena Payeras-Capell{\`a} and
                 Maci{\`a} Mut-Puigserver",
  title =        "On the practicability of using group signatures on
                 mobile devices: implementation and performance analysis
                 on the {Android} platform",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "4",
  pages =        "335--345",
  month =        aug,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0259-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:44 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0259-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Mustafa:2015:UIA,
  author =       "Tanveer Mustafa and Karsten Sohr",
  title =        "Understanding the implemented access control policy of
                 {Android} system services with slicing and extended
                 static checking",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "4",
  pages =        "347--366",
  month =        aug,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0260-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:44 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0260-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{ElHassani:2015:ION,
  author =       "Abdeljebar Ameziane {El Hassani} and Anas Abou {El
                 Kalam} and Adel Bouhoula and Ryma Abassi and Abdellah
                 Ait Ouahman",
  title =        "{Integrity-OrBAC}: a new model to preserve {Critical
                 Infrastructures} integrity",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "4",
  pages =        "367--385",
  month =        aug,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0254-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:44 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0254-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Al-Saleh:2015:IDC,
  author =       "Mohammed I. Al-Saleh and Fatima M. AbuHjeela and Ziad
                 A. Al-Sharif",
  title =        "Investigating the detection capabilities of
                 antiviruses under concurrent attacks",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "4",
  pages =        "387--396",
  month =        aug,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0261-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:44 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0261-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Wei:2015:TPE,
  author =       "Lei Wei and Michael K. Reiter",
  title =        "Toward practical encrypted email that supports
                 private, regular-expression searches",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "5",
  pages =        "397--416",
  month =        oct,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0268-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:44 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib;
                 https://www.math.utah.edu/pub/tex/bib/string-matching.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0268-3;
                 http://link.springer.com/content/pdf/10.1007/s10207-014-0268-3.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
  keywords =     "Cloud security; Private search on encrypted data;
                 Regular-expression search",
}

@Article{Zhou:2015:GCR,
  author =       "Lan Zhou and Vijay Varadharajan and Michael Hitchens",
  title =        "Generic constructions for role-based encryption",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "5",
  pages =        "417--430",
  month =        oct,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0267-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:44 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0267-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Lin:2015:RNR,
  author =       "Han-Yu Lin",
  title =        "{RPCAE}: a novel revocable proxy convertible
                 authenticated encryption scheme",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "5",
  pages =        "431--441",
  month =        oct,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0269-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:44 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0269-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Halevi:2015:KAS,
  author =       "Tzipora Halevi and Nitesh Saxena",
  title =        "Keyboard acoustic side channel attacks: exploring
                 realistic and security-sensitive scenarios",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "5",
  pages =        "443--456",
  month =        oct,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0264-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:44 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0264-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Li:2015:TMM,
  author =       "Tao Li and Aiqun Hu",
  title =        "Trusted mobile model based on {DTE} technology",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "5",
  pages =        "457--469",
  month =        oct,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0266-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:44 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0266-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Azkia:2015:DPA,
  author =       "Hanieh Azkia and Nora Cuppens-Boulahia and
                 Fr{\'e}d{\'e}ric Cuppens and Gouenou Coatrieux and Said
                 Oulmakhzoune",
  title =        "Deployment of a posteriori access control using {IHE
                 ATNA}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "5",
  pages =        "471--483",
  month =        oct,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0265-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:44 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0265-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bertino:2015:SPE,
  author =       "Elisa Bertino and Robert H. Deng and Xinyi Huang and
                 Jianying Zhou",
  title =        "Security and privacy of electronic health information
                 systems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "6",
  pages =        "485--486",
  month =        nov,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0303-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:44 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0303-z;
                 http://link.springer.com/content/pdf/10.1007/s10207-015-0303-z.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Qian:2015:PPP,
  author =       "Huiling Qian and Jiguo Li and Yichen Zhang and
                 Jinguang Han",
  title =        "Privacy-preserving personal health record using
                 multi-authority attribute-based encryption with
                 revocation",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "6",
  pages =        "487--497",
  month =        nov,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0270-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:44 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0270-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Qin:2015:FAB,
  author =       "Bo Qin and Hua Deng and Qianhong Wu and Josep
                 Domingo-Ferrer and David Naccache and Yunya Zhou",
  title =        "Flexible attribute-based encryption applicable to
                 secure e-healthcare records",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "6",
  pages =        "499--511",
  month =        nov,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0272-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:44 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0272-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Hadavi:2015:SSS,
  author =       "Mohammad Ali Hadavi and Rasool Jalili and Ernesto
                 Damiani and Stelvio Cimato",
  title =        "Security and searchability in secret sharing-based
                 data outsourcing",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "6",
  pages =        "513--529",
  month =        nov,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0277-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:44 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0277-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kamm:2015:SFP,
  author =       "Liina Kamm and Jan Willemson",
  title =        "Secure floating point arithmetic and private satellite
                 collision analysis",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "6",
  pages =        "531--548",
  month =        nov,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-014-0271-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:44 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/fparith.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-014-0271-8;
                 http://link.springer.com/content/pdf/10.1007/s10207-014-0271-8.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Hoang:2015:GAM,
  author =       "Thang Hoang and Deokjai Choi and Thuc Nguyen",
  title =        "Gait authentication on mobile phone using biometric
                 cryptosystem and fuzzy commitment scheme",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "6",
  pages =        "549--560",
  month =        nov,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0273-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:44 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0273-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kozakevicius:2015:UQS,
  author =       "Alice Kozakevicius and Cristian Cappo and Bruno A.
                 Mozzaquatro and Raul Ceretta Nunes and Christian E.
                 Schaerer",
  title =        "{URL} query string anomaly sensor designed with the
                 bidimensional {Haar} wavelet transform",
  journal =      j-INT-J-INFO-SEC,
  volume =       "14",
  number =       "6",
  pages =        "561--581",
  month =        nov,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0276-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:44 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0276-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Liu:2016:STP,
  author =       "Liang Liu and Xiaofeng Chen and Wenjing Lou",
  title =        "Secure three-party computational protocols for
                 triangle area",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "1",
  pages =        "1--13",
  month =        feb,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0284-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:45 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0284-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Chen:2016:SOK,
  author =       "Yu Chen and Qiong Huang and Zongyang Zhang",
  title =        "{Sakai--Ohgishi--Kasahara} identity-based
                 non-interactive key exchange revisited and more",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "1",
  pages =        "15--33",
  month =        feb,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0274-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:45 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0274-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Liu:2016:PCC,
  author =       "Weiran Liu and Jianwei Liu and Qianhong Wu and Bo Qin
                 and Yan Li",
  title =        "Practical chosen-ciphertext secure {Hierarchical
                 Identity-Based Broadcast Encryption}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "1",
  pages =        "35--50",
  month =        feb,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0287-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:45 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0287-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Susil:2016:SSA,
  author =       "Petr Susil and Pouyan Sepehrdad and Serge Vaudenay and
                 Nicolas Courtois",
  title =        "On selection of samples in algebraic attacks and a new
                 technique to find hidden low degree equations",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "1",
  pages =        "51--65",
  month =        feb,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0295-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:45 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0295-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Wang:2016:SSE,
  author =       "Yuyu Wang and Keisuke Tanaka",
  title =        "Strongly simulation-extractable leakage-resilient
                 {NIZK}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "1",
  pages =        "67--79",
  month =        feb,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0291-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:45 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0291-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Rao:2016:EAB,
  author =       "Y. Sreenivasa Rao and Ratna Dutta",
  title =        "Efficient attribute-based signature and signcryption
                 realizing expressive access structures",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "1",
  pages =        "81--109",
  month =        feb,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0289-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:45 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0289-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{DeKeulenaer:2016:LTS,
  author =       "Ronald {De Keulenaer} and Jonas Maebe and Koen {De
                 Bosschere} and Bjorn {De Sutter}",
  title =        "Link-time smart card code hardening",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "2",
  pages =        "111--130",
  month =        apr,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0282-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:45 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0282-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Chikha:2016:BBA,
  author =       "Randa Jabeur {Ben Chikha} and Tarek Abbes and Wassim
                 {Ben Chikha} and Adel Bouhoula",
  title =        "Behavior-based approach to detect spam over {IP}
                 telephony attacks",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "2",
  pages =        "131--143",
  month =        apr,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0281-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:45 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0281-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Karimi:2016:UAA,
  author =       "Vahid R. Karimi and Paulo S. C. Alencar and Donald D.
                 Cowan",
  title =        "A uniform approach for access control and business
                 models with explicit rule realization",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "2",
  pages =        "145--171",
  month =        apr,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0275-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:45 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0275-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Raad:2016:PSR,
  author =       "Elie Raad and Bechara {Al Bouna} and Richard Chbeir",
  title =        "Preventing sensitive relationships disclosure for
                 better social media preservation",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "2",
  pages =        "173--194",
  month =        apr,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0278-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:45 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0278-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Celdran:2016:RPP,
  author =       "Alberto Huertas Celdr{\'a}n and Gin{\'e}s D{\'o}lera
                 Tormo and F{\'e}lix G{\'o}mez M{\'a}rmol and Manuel Gil
                 P{\'e}rez and Gregorio Mart{\'\i}nez P{\'e}rez",
  title =        "Resolving privacy-preserving relationships over
                 outsourced encrypted data storages",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "2",
  pages =        "195--209",
  month =        apr,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0283-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:45 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0283-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Mateu:2016:HAV,
  author =       "V{\'\i}ctor Mateu and Josep M. Miret and Francesc
                 Seb{\'e}",
  title =        "A hybrid approach to vector-based homomorphic tallying
                 remote voting",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "2",
  pages =        "211--221",
  month =        apr,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0279-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:45 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0279-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Yang:2016:MGE,
  author =       "Guomin Yang and Willy Susilo and Yi Mu",
  title =        "Message from the {Guest Editors}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "2",
  pages =        "223--224",
  month =        apr,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0315-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:45 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0315-3;
                 http://link.springer.com/content/pdf/10.1007/s10207-016-0315-3.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Rashwan:2016:UTP,
  author =       "Hatem A. Rashwan and Agusti Solanas and Dom{\`e}nec
                 Puig and Antoni Mart{\'\i}nez-Ballest{\'e}",
  title =        "Understanding trust in privacy-aware video
                 surveillance systems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "3",
  pages =        "225--234",
  month =        jun,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0286-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:45 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0286-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kurek:2016:TBC,
  author =       "Tytus Kurek and Marcin Niemiec and Artur Lason",
  title =        "Taking back control of privacy: a novel framework for
                 preserving cloud-based firewall policy
                 confidentiality",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "3",
  pages =        "235--250",
  month =        jun,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0292-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:45 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0292-y;
                 http://link.springer.com/content/pdf/10.1007/s10207-015-0292-y.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Orencik:2016:MKS,
  author =       "Cengiz Orencik and Ayse Selcuk and Erkay Savas and
                 Murat Kantarcio{\u{g}}lu",
  title =        "Multi-keyword search over encrypted data with scoring
                 and search pattern obfuscation",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "3",
  pages =        "251--269",
  month =        jun,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0294-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:45 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib;
                 https://www.math.utah.edu/pub/tex/bib/string-matching.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0294-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
  keywords =     "Efficiency Scoring; Encrypted cloud data; Privacy
                 preservation; Secure search",
}

@Article{Gritti:2016:BED,
  author =       "Cl{\'e}mentine Gritti and Willy Susilo and Thomas
                 Plantard and Kaitai Liang and Duncan S. Wong",
  title =        "Broadcast encryption with dealership",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "3",
  pages =        "271--283",
  month =        jun,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0285-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:45 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0285-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Mennink:2016:EPH,
  author =       "Bart Mennink and Bart Preneel",
  title =        "Efficient parallelizable hashing using small
                 non-compressing primitives",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "3",
  pages =        "285--300",
  month =        jun,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0288-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:45 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0288-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Abbes:2016:DFC,
  author =       "Tarek Abbes and Adel Bouhoula and Micha{\"e}l
                 Rusinowitch",
  title =        "Detection of firewall configuration errors with
                 updatable tree",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "3",
  pages =        "301--317",
  month =        jun,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0290-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:45 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0290-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Salini:2016:EPA,
  author =       "P. Salini and S. Kanmani",
  title =        "Effectiveness and performance analysis of
                 model-oriented security requirements engineering to
                 elicit security requirements: a systematic solution for
                 developing secure software systems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "3",
  pages =        "319--334",
  month =        jun,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0305-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:45 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0305-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Khayati:2016:PPP,
  author =       "Leyli Javid Khayati and Cengiz Orencik and Erkay Savas
                 and Berkant Ustao{\u{g}}lu",
  title =        "A practical privacy-preserving targeted advertising
                 scheme for {IPTV} users",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "4",
  pages =        "335--360",
  month =        aug,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0296-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:46 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0296-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Miao:2016:MDU,
  author =       "Qiguang Miao and Jiachen Liu and Ying Cao and Jianfeng
                 Song",
  title =        "Malware detection using bilayer behavior abstraction
                 and improved one-class support vector machines",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "4",
  pages =        "361--379",
  month =        aug,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0297-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:46 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0297-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Skoric:2016:FBR,
  author =       "Boris Skori{\'c} and Sebastiaan J. A. de Hoogh and
                 Nicola Zannone",
  title =        "Flow-based reputation with uncertainty: evidence-based
                 subjective logic",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "4",
  pages =        "381--402",
  month =        aug,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0298-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:46 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0298-5;
                 http://link.springer.com/content/pdf/10.1007/s10207-015-0298-5.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Vajda:2016:ATA,
  author =       "Istv{\'a}n Vajda",
  title =        "On the analysis of time-aware protocols in universal
                 composability framework",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "4",
  pages =        "403--412",
  month =        aug,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0300-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:46 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0300-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Diaz-Santiago:2016:CST,
  author =       "Sandra D{\'\i}az-Santiago and Lil Mar{\'\i}a
                 Rodr{\'\i}guez-Henr{\'\i}quez and Debrup Chakraborty",
  title =        "A cryptographic study of tokenization systems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "4",
  pages =        "413--432",
  month =        aug,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0313-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:46 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0313-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Malhi:2016:PPA,
  author =       "Avleen Malhi and Shalini Batra",
  title =        "Privacy-preserving authentication framework using
                 {Bloom} filter for secure vehicular communications",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "4",
  pages =        "433--453",
  month =        aug,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0299-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:46 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0299-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Anagnostopoulos:2016:NFM,
  author =       "Marios Anagnostopoulos and Georgios Kambourakis and
                 Stefanos Gritzalis",
  title =        "New facets of mobile botnet: architecture and
                 evaluation",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "5",
  pages =        "455--473",
  month =        oct,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0310-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:46 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0310-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Almaatouq:2016:IIL,
  author =       "Abdullah Almaatouq and Erez Shmueli and Mariam Nouh
                 and Ahmad Alabdulkareem and Vivek K. Singh and Mansour
                 Alsaleh and Abdulrahman Alarifi and Anas Alfaris and
                 Alex `Sandy' Pentland",
  title =        "If it looks like a spammer and behaves like a spammer,
                 it must be a spammer: analysis and detection of
                 microblogging spam accounts",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "5",
  pages =        "475--491",
  month =        oct,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0321-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:46 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0321-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Blanton:2016:POS,
  author =       "Marina Blanton and Everaldo Aguiar",
  title =        "Private and oblivious set and multiset operations",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "5",
  pages =        "493--518",
  month =        oct,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0301-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:46 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0301-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kiraz:2016:EVA,
  author =       "Mehmet Sabir Kiraz and Osmanbey Uzunkol",
  title =        "Efficient and verifiable algorithms for secure
                 outsourcing of cryptographic computations",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "5",
  pages =        "519--537",
  month =        oct,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0308-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:46 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0308-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Hu:2016:EWS,
  author =       "Changhui Hu and Lidong Han",
  title =        "Efficient wildcard search over encrypted data",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "5",
  pages =        "539--547",
  month =        oct,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0302-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:46 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib;
                 https://www.math.utah.edu/pub/tex/bib/string-matching.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0302-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
  keywords =     "Cloud computing; Searchable symmetric encryption;
                 Wildcard search",
}

@Article{Kasamatsu:2016:TSE,
  author =       "Kohei Kasamatsu and Takahiro Matsuda and Keita Emura
                 and Nuttapong Attrapadung and Goichiro Hanaoka and
                 Hideki Imai",
  title =        "Time-specific encryption from forward-secure
                 encryption: generic and direct constructions",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "5",
  pages =        "549--571",
  month =        oct,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0304-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:46 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0304-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Chen:2016:MGE,
  author =       "Liqun Chen and Chris Mitchell",
  title =        "Message from the guest editors",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "6",
  pages =        "573--574",
  month =        nov,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0353-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:46 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0353-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Rowe:2016:MPS,
  author =       "Paul D. Rowe and Joshua D. Guttman and Moses D.
                 Liskov",
  title =        "Measuring protocol strength with security goals",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "6",
  pages =        "575--596",
  month =        nov,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0319-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:46 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0319-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Manulis:2016:SMP,
  author =       "Mark Manulis and Douglas Stebila and Franziskus Kiefer
                 and Nick Denham",
  title =        "Secure modular password authentication for the web
                 using channel bindings",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "6",
  pages =        "597--620",
  month =        nov,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0348-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:46 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0348-7;
                 http://link.springer.com/content/pdf/10.1007/s10207-016-0348-7.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Brown:2016:API,
  author =       "Christopher W. Brown and Michael Jenkins",
  title =        "Analyzing proposals for improving authentication on
                 the {TLS-\slash SSL}-protected {Web}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "6",
  pages =        "621--635",
  month =        nov,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0316-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:46 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0316-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Degabriele:2016:UPC,
  author =       "Jean Paul Degabriele and Victoria Fehr and Marc
                 Fischlin and Tommaso Gagliardoni and Felix G{\"u}nther
                 and Giorgia Azzurra Marson and Arno Mittelbach and
                 Kenneth G. Paterson",
  title =        "Unpicking {PLAID}: a cryptographic analysis of an
                 {ISO}-standards-track authentication protocol",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "6",
  pages =        "637--657",
  month =        nov,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0309-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:46 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0309-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Cremers:2016:III,
  author =       "Cas Cremers and Marko Horvat",
  title =        "Improving the {ISO\slash IEC 11770} standard for key
                 management techniques",
  journal =      j-INT-J-INFO-SEC,
  volume =       "15",
  number =       "6",
  pages =        "659--673",
  month =        nov,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0306-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:46 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0306-9;
                 http://link.springer.com/content/pdf/10.1007/s10207-015-0306-9.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Poettering:2017:DAP,
  author =       "Bertram Poettering and Douglas Stebila",
  title =        "Double-authentication-preventing signatures",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "1",
  pages =        "1--22",
  month =        feb,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0307-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:47 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0307-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Li:2017:WOO,
  author =       "Lichun Li and Anwitaman Datta",
  title =        "Write-only oblivious {RAM}-based privacy-preserved
                 access of outsourced data",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "1",
  pages =        "23--42",
  month =        feb,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0329-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:47 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0329-x;
                 http://link.springer.com/content/pdf/10.1007/s10207-016-0329-x.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Karimi:2017:FMA,
  author =       "Vahid R. Karimi and Paulo S. C. Alencar and Donald D.
                 Cowan",
  title =        "A formal modeling and analysis approach for access
                 control rules, policies, and their combinations",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "1",
  pages =        "43--74",
  month =        feb,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0314-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:47 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0314-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Albertini:2017:EAC,
  author =       "Davide Alberto Albertini and Barbara Carminati and
                 Elena Ferrari",
  title =        "An extended access control mechanism exploiting data
                 dependencies",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "1",
  pages =        "75--89",
  month =        feb,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0322-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:47 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0322-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Shaikh:2017:DCM,
  author =       "Riaz Ahmed Shaikh and Kamel Adi and Luigi Logrippo",
  title =        "A Data Classification Method for Inconsistency and
                 Incompleteness Detection in Access Control Policy
                 Sets",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "1",
  pages =        "91--113",
  month =        feb,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0317-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:47 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0317-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Stevanovic:2017:MIC,
  author =       "Matija Stevanovic and Jens Myrup Pedersen and
                 Alessandro D'Alconzo and Stefan Ruehrup",
  title =        "A method for identifying compromised clients based on
                 {DNS} traffic analysis",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "2",
  pages =        "115--132",
  month =        apr,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0331-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:47 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0331-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Mehrnezhad:2017:PCI,
  author =       "Maryam Mehrnezhad and Abbas Ghaemi Bafghi and Ahad
                 Harati and Ehsan Toreini",
  title =        "{PiSHi}: click the images and {I} tell if you are a
                 human",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "2",
  pages =        "133--149",
  month =        apr,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0311-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:47 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0311-z;
                 http://link.springer.com/content/pdf/10.1007/s10207-015-0311-z.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Boyd:2017:AAK,
  author =       "Colin Boyd and Cas Cremers and Mich{\`e}le Feltz and
                 Kenneth G. Paterson and Bertram Poettering and Douglas
                 Stebila",
  title =        "{ASICS}: authenticated key exchange security
                 incorporating certification systems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "2",
  pages =        "151--171",
  month =        apr,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-015-0312-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:47 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-015-0312-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Tiloca:2017:IRD,
  author =       "Marco Tiloca and Christian Gehrmann and Ludwig Seitz",
  title =        "On improving resistance to {Denial of Service} and key
                 provisioning scalability of the {DTLS} handshake",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "2",
  pages =        "173--193",
  month =        apr,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0326-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:47 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0326-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Singh:2017:RUA,
  author =       "Ankit Singh and Hervais C. Simo Fhom",
  title =        "Restricted usage of anonymous credentials in vehicular
                 ad hoc networks for misbehavior detection",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "2",
  pages =        "195--211",
  month =        apr,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0328-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:47 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0328-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Mann:2017:TFA,
  author =       "Christopher Mann and Daniel Loebenberger",
  title =        "Two-factor authentication for the {Bitcoin} protocol",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "2",
  pages =        "213--226",
  month =        apr,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0325-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Thu Nov 30 16:02:10 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0325-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bat-Erdene:2017:EAC,
  author =       "Munkhbayar Bat-Erdene and Hyundo Park and Hongzhe Li
                 and Heejo Lee and Mahn-Soo Choi",
  title =        "Entropy analysis to classify unknown packing
                 algorithms for malware detection",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "3",
  pages =        "227--248",
  month =        jun,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0330-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:47 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0330-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bernardini:2017:MRP,
  author =       "Riccardo Bernardini and Roberto Rinaldo",
  title =        "Making random permutations from physically unclonable
                 constants",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "3",
  pages =        "249--261",
  month =        jun,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0324-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:47 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0324-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
  keywords =     "Physically unclonable functions; Privacy and security;
                 Random permutations",
}

@Article{Kim:2017:MES,
  author =       "Minchul Kim and Younghoon Jung and Junghwan Song",
  title =        "A modified exhaustive search on a password system
                 using {SHA-1}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "3",
  pages =        "263--269",
  month =        jun,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0332-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:47 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib;
                 https://www.math.utah.edu/pub/tex/bib/string-matching.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0332-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
  keywords =     "Exhaustive search; Microsoft Office; Password
                 cracking; Security evaluation; SHA-1",
}

@Article{Ragab-Hassen:2017:KMS,
  author =       "Hani Ragab-Hassen and Esma Lounes",
  title =        "A key management scheme evaluation using {Markov}
                 processes",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "3",
  pages =        "271--280",
  month =        jun,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0323-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:47 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0323-3;
                 http://link.springer.com/content/pdf/10.1007/s10207-016-0323-3.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Gunther:2017:LMT,
  author =       "Felix G{\"u}nther and Bertram Poettering",
  title =        "Linkable message tagging: solving the key distribution
                 problem of signature schemes",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "3",
  pages =        "281--297",
  month =        jun,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0327-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:47 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0327-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Lai:2017:EIB,
  author =       "Jianchang Lai and Yi Mu and Fuchun Guo",
  title =        "Efficient identity-based online\slash offline
                 encryption and signcryption with short ciphertext",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "3",
  pages =        "299--311",
  month =        jun,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0320-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:47 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0320-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kotzanikolaou:2017:BAR,
  author =       "Panayiotis Kotzanikolaou and George Chatzisofroniou
                 and Mike Burmester",
  title =        "Broadcast anonymous routing ({BAR}): scalable
                 real-time anonymous communication",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "3",
  pages =        "313--326",
  month =        jun,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0318-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:47 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0318-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Catalano:2017:CAO,
  author =       "Dario Catalano and Dario Fiore and Rosario Gennaro",
  title =        "A certificateless approach to onion routing",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "3",
  pages =        "327--343",
  month =        jun,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0337-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:47 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0337-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Lazouski:2017:SDU,
  author =       "Aliaksandr Lazouski and Fabio Martinelli and Paolo
                 Mori and Andrea Saracino",
  title =        "Stateful Data Usage Control for {Android} Mobile
                 Devices",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "4",
  pages =        "345--369",
  month =        aug,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0336-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:48 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0336-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Ruiz-Heras:2017:AAB,
  author =       "A. Ruiz-Heras and P. Garc{\'\i}a-Teodoro and L.
                 S{\'a}nchez-Casado",
  title =        "{ADroid}: anomaly-based detection of malicious events
                 in {Android} platforms",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "4",
  pages =        "371--384",
  month =        aug,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0333-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:48 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0333-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Garg:2017:NBD,
  author =       "Shree Garg and Sateesh K. Peddoju and Anil K. Sarje",
  title =        "Network-based detection of {Android} malicious apps",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "4",
  pages =        "385--400",
  month =        aug,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0343-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:48 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0343-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kolias:2017:TDS,
  author =       "Constantinos Kolias and Vasilis Kolias and Georgios
                 Kambourakis",
  title =        "{TermID}: a distributed swarm intelligence-based
                 approach for wireless intrusion detection",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "4",
  pages =        "401--416",
  month =        aug,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0335-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:48 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0335-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Sampangi:2017:HSR,
  author =       "Raghav V. Sampangi and Srinivas Sampalli",
  title =        "{HiveSec}: security in resource-constrained wireless
                 networks inspired by beehives and bee swarms",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "4",
  pages =        "417--433",
  month =        aug,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0341-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:48 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0341-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Antunes:2017:DVT,
  author =       "Nuno Antunes and Marco Vieira",
  title =        "Designing vulnerability testing tools for web
                 services: approach, components, and tools",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "4",
  pages =        "435--457",
  month =        aug,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0334-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:48 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0334-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Sisaat:2017:STM,
  author =       "Khamphao Sisaat and Surin Kittitornkun and Hiroaki
                 Kikuchi and Chaxiong Yukonhiatou and Masato Terada and
                 Hiroshi Ishii",
  title =        "A spatio-temporal malware and country clustering
                 algorithm: {2012 IIJ MITF} case study",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "5",
  pages =        "459--473",
  month =        oct,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0342-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:48 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0342-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Duessel:2017:DZD,
  author =       "Patrick Duessel and Christian Gehl and Ulrich Flegel
                 and Sven Dietrich and Michael Meier",
  title =        "Detecting zero-day attacks using context-aware anomaly
                 detection at the application-layer",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "5",
  pages =        "475--490",
  month =        oct,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0344-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:48 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0344-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Arapinis:2017:APM,
  author =       "Myrto Arapinis and Loretta Ilaria Mancini and Eike
                 Ritter and Mark Dermot Ryan",
  title =        "Analysis of privacy in mobile telephony systems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "5",
  pages =        "491--523",
  month =        oct,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0338-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:48 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0338-9;
                 http://link.springer.com/content/pdf/10.1007/s10207-016-0338-9.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Huang:2017:MAP,
  author =       "Cheng-Ta Huang and Yu-Hong Zhang and Li-Chiun Lin and
                 Wei-Jen Wang and Shiuh-Jeng Wang",
  title =        "Mutual authentications to parties with {QR}-code
                 applications in mobile systems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "5",
  pages =        "525--540",
  month =        oct,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0349-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:48 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0349-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Alawatugoda:2017:GCM,
  author =       "Janaka Alawatugoda",
  title =        "Generic construction of an {eCK}-secure key exchange
                 protocol in the standard model",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "5",
  pages =        "541--557",
  month =        oct,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0346-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:48 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0346-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Zhang:2017:CIB,
  author =       "Lei Zhang and Qianhong Wu and Bo Qin and Hua Deng and
                 Jiangtao Li and Jianwei Liu and Wenchang Shi",
  title =        "Certificateless and identity-based authenticated
                 asymmetric group key agreement",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "5",
  pages =        "559--576",
  month =        oct,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0339-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:48 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0339-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Aliasgari:2017:SCH,
  author =       "Mehrdad Aliasgari and Marina Blanton and Fattaneh
                 Bayatbabolghani",
  title =        "Secure computation of hidden {Markov} models and
                 secure floating-point arithmetic in the malicious
                 model",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "6",
  pages =        "577--601",
  month =        nov,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0350-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:49 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/fparith.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0350-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
  keywords =     "Floating point; Gaussian mixture models; Hidden Markov
                 models; Secure computation",
}

@Article{Li:2017:RRS,
  author =       "Lichun Li and Michael Militzer and Anwitaman Datta",
  title =        "{rPIR}: ramp secret sharing-based
                 communication-efficient private information retrieval",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "6",
  pages =        "603--625",
  month =        nov,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0347-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:49 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0347-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Esfahani:2017:EHM,
  author =       "Alireza Esfahani and Georgios Mantas and Jonathan
                 Rodriguez and Jos{\'e} Carlos Neves",
  title =        "An efficient homomorphic {MAC}-based scheme against
                 data and tag pollution attacks in network
                 coding-enabled wireless networks",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "6",
  pages =        "627--639",
  month =        nov,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0351-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:49 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0351-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kananizadeh:2017:DDP,
  author =       "Shahrzad Kananizadeh and Kirill Kononenko",
  title =        "Development of dynamic protection against timing
                 channels",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "6",
  pages =        "641--651",
  month =        nov,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0356-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:49 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0356-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Malatras:2017:EUI,
  author =       "Apostolos Malatras and Dimitris Geneiatakis and
                 Ioannis Vakalis",
  title =        "On the efficiency of user identification: a
                 system-based approach",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "6",
  pages =        "653--671",
  month =        nov,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0340-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:49 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0340-2;
                 http://link.springer.com/content/pdf/10.1007/s10207-016-0340-2.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Joh:2017:PSV,
  author =       "HyunChul Joh and Yashwant K. Malaiya",
  title =        "Periodicity in software vulnerability discovery,
                 patching and exploitation",
  journal =      j-INT-J-INFO-SEC,
  volume =       "16",
  number =       "6",
  pages =        "673--690",
  month =        nov,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0345-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:49 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0345-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Rial:2018:PPS,
  author =       "Alfredo Rial and George Danezis and Markulf
                 Kohlweiss",
  title =        "Privacy-preserving smart metering revisited",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "1",
  pages =        "1--31",
  month =        feb,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0355-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:49 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0355-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Deng:2018:SPT,
  author =       "Hua Deng and Yunya Zhou and Qianhong Wu and Bo Qin and
                 Jianwei Liu",
  title =        "Secure {pay-TV} for chained hotels",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "1",
  pages =        "33--42",
  month =        feb,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0354-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:49 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0354-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Yoneyama:2018:FMR,
  author =       "Kazuki Yoneyama",
  title =        "Formal modeling of random oracle programmability and
                 verification of signature unforgeability using
                 task-{PIOAs}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "1",
  pages =        "43--66",
  month =        feb,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0352-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:49 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0352-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bernardini:2018:GES,
  author =       "Riccardo Bernardini and Roberto Rinaldo",
  title =        "Generalized {Elias} schemes for efficient harvesting
                 of truly random bits",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "1",
  pages =        "67--81",
  month =        feb,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0358-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:49 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0358-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
  keywords =     "Gaussian random variables; Geometric random variables;
                 Random number conditioning; Random number generation;
                 Vector quantization",
}

@Article{Ayed:2018:ADS,
  author =       "Samiha Ayed and Muhammad Sabir Idrees and Nora Cuppens
                 and Frederic Cuppens",
  title =        "Achieving dynamicity in security policies enforcement
                 using aspects",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "1",
  pages =        "83--103",
  month =        feb,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0357-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:49 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0357-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Deepa:2018:BBD,
  author =       "G. Deepa and P. Santhi Thilagam and Furqan Ahmed Khan
                 and Amit Praseed and Alwyn R. Pais and Nushafreen
                 Palsetia",
  title =        "Black-box detection of {XQuery} injection and
                 parameter tampering vulnerabilities in web
                 applications",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "1",
  pages =        "105--120",
  month =        feb,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-016-0359-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 23 16:01:49 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-016-0359-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Shah:2018:MMM,
  author =       "Ankit Shah and Rajesh Ganesan and Sushil Jajodia and
                 Hasan Cam",
  title =        "A methodology to measure and monitor level of
                 operational effectiveness of a {CSOC}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "2",
  pages =        "121--134",
  month =        apr,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0365-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Mar 3 09:41:24 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0365-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Akiyama:2018:HDC,
  author =       "Mitsuaki Akiyama and Takeshi Yagi and Takeo Hariu and
                 Youki Kadobayashi",
  title =        "{HoneyCirculator}: distributing credential honeytoken
                 for introspection of web-based attack cycle",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "2",
  pages =        "135--151",
  month =        apr,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0361-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Mar 3 09:41:24 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0361-5;
                 http://link.springer.com/content/pdf/10.1007/s10207-017-0361-5.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kirubavathi:2018:SAD,
  author =       "G. Kirubavathi and R. Anitha",
  title =        "Structural analysis and detection of {Android} botnets
                 using machine learning techniques",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "2",
  pages =        "153--167",
  month =        apr,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0363-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Mar 3 09:41:24 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0363-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Gruber:2018:UTB,
  author =       "A. Gruber and I. Ben-Gal",
  title =        "Using targeted {Bayesian} network learning for suspect
                 identification in communication networks",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "2",
  pages =        "169--181",
  month =        apr,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0362-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Mar 3 09:41:24 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0362-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kuo:2018:DRA,
  author =       "Tsung-Min Kuo and Sung-Ming Yen and Meng-Che Han",
  title =        "Dynamic reversed accumulator",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "2",
  pages =        "183--191",
  month =        apr,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0360-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Mar 3 09:41:24 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0360-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
  keywords =     "Dynamic accumulator; Revocation; Zero-knowledge
                 proof",
}

@Article{Seo:2018:AOF,
  author =       "Jae Hong Seo and Keita Emura and Keita Xagawa and
                 Kazuki Yoneyama",
  title =        "Accumulable optimistic fair exchange from verifiably
                 encrypted homomorphic signatures",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "2",
  pages =        "193--220",
  month =        apr,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0367-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Mar 3 09:41:24 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0367-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Laszka:2018:GTA,
  author =       "Aron Laszka and Yevgeniy Vorobeychik and Xenofon
                 Koutsoukos",
  title =        "A game-theoretic approach for integrity assurance in
                 resource-bounded systems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "2",
  pages =        "221--242",
  month =        apr,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0364-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Mar 3 09:41:24 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0364-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Domingo-Ferrer:2018:DGS,
  author =       "Josep Domingo-Ferrer and Alberto Blanco-Justicia and
                 Carla R{\`a}fols",
  title =        "Dynamic group size accreditation and group discounts
                 preserving anonymity",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "3",
  pages =        "243--260",
  month =        jun,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0368-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Mon Apr 16 12:27:34 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0368-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Luo:2018:ASI,
  author =       "Ying Luo and Sen-ching S. Cheung and Riccardo
                 Lazzeretti and Tommaso Pignata and Mauro Barni",
  title =        "Anonymous subject identification and privacy
                 information management in video surveillance",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "3",
  pages =        "261--278",
  month =        jun,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0380-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Mon Apr 16 12:27:34 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0380-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Martinez-Balleste:2018:DIS,
  author =       "Antoni Mart{\'\i}nez-Ballest{\'e} and Hatem Rashwan
                 and Domenec Puig and Agusti Solanas",
  title =        "Design and implementation of a secure and trustworthy
                 platform for privacy-aware video surveillance",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "3",
  pages =        "279--290",
  month =        jun,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0370-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Mon Apr 16 12:27:34 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0370-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Mehrnezhad:2018:SPM,
  author =       "Maryam Mehrnezhad and Ehsan Toreini and Siamak F.
                 Shahandashti and Feng Hao",
  title =        "Stealing {PINs} via mobile sensors: actual risk versus
                 user perception",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "3",
  pages =        "291--313",
  month =        jun,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0369-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Mon Apr 16 12:27:34 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0369-x;
                 http://link.springer.com/content/pdf/10.1007/s10207-017-0369-x.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Roy:2018:DSC,
  author =       "Sangita Roy and Ashok Singh Sairam",
  title =        "Distributed star coloring of network for {IP}
                 traceback",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "3",
  pages =        "315--326",
  month =        jun,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0366-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Mon Apr 16 12:27:34 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0366-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Faust:2018:OPM,
  author =       "Sebastian Faust and Carmit Hazay and Daniele Venturi",
  title =        "Outsourced pattern matching",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "3",
  pages =        "327--346",
  month =        jun,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0374-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Mon Apr 16 12:27:34 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib;
                 https://www.math.utah.edu/pub/tex/bib/string-matching.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0374-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Wang:2018:VEC,
  author =       "Yujue Wang and HweeHwa Pang and Robert H. Deng",
  title =        "Verifiably encrypted cascade-instantiable blank
                 signatures to secure progressive decision management",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "3",
  pages =        "347--363",
  month =        jun,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0372-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Mon Apr 16 12:27:34 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0372-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Gonzalez-Serrano:2018:SML,
  author =       "Francisco-Javier Gonz{\'a}lez-Serrano and Adri{\'a}n
                 Amor-Mart{\'\i}n and Jorge Casamay{\'o}n-Ant{\'o}n",
  title =        "Supervised machine learning using encrypted training
                 data",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "4",
  pages =        "365--377",
  month =        aug,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0381-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Jul 25 08:53:56 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0381-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Ham:2018:IYP,
  author =       "HyoungMin Ham and JongHyup Lee and JooSeok Song",
  title =        "Improved yoking proof protocols for preserving
                 anonymity",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "4",
  pages =        "379--393",
  month =        aug,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0383-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Jul 25 08:53:56 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0383-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Lanet:2018:WTM,
  author =       "Jean-Louis Lanet and H{\'e}l{\`e}ne {Le Bouder} and
                 Mohammed Benattou and Axel Legay",
  title =        "When time meets test",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "4",
  pages =        "395--409",
  month =        aug,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0371-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Jul 25 08:53:56 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0371-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Ali:2018:ZMN,
  author =       "Syed Taha Ali and Patrick McCorry and Peter Hyun-Jeen
                 Lee and Feng Hao",
  title =        "{ZombieCoin 2.0}: managing next-generation botnets
                 using {Bitcoin}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "4",
  pages =        "411--422",
  month =        aug,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0379-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Jul 25 08:53:56 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0379-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Yang:2018:NSS,
  author =       "Zheng Yang and Chao Liu and Wanping Liu and Daigu
                 Zhang and Song Luo",
  title =        "A new strong security model for stateful authenticated
                 group key exchange",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "4",
  pages =        "423--440",
  month =        aug,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0373-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Jul 25 08:53:56 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0373-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Morales-Sandoval:2018:PBC,
  author =       "Miguel Morales-Sandoval and Jose Luis Gonzalez-Compean
                 and Arturo Diaz-Perez and Victor J. Sosa-Sosa",
  title =        "A pairing-based cryptographic approach for data
                 security in the cloud",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "4",
  pages =        "441--461",
  month =        aug,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0375-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Jul 25 08:53:56 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0375-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Jiang:2018:FCP,
  author =       "Yinhao Jiang and Willy Susilo and Yi Mu and Fuchun
                 Guo",
  title =        "Flexible ciphertext-policy attribute-based encryption
                 supporting {AND}-gate and threshold with short
                 ciphertexts",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "4",
  pages =        "463--475",
  month =        aug,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0376-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Jul 25 08:53:56 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0376-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Jia:2018:ERH,
  author =       "Hongyong Jia and Yue Chen and Julong Lan and Kaixiang
                 Huang and Jun Wang",
  title =        "Efficient revocable hierarchical identity-based
                 encryption using cryptographic accumulators",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "4",
  pages =        "477--490",
  month =        aug,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0387-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Jul 25 08:53:56 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0387-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Chen:2018:MGE,
  author =       "Liqun Chen and Jinguang Han and Chris Mitchell",
  title =        "Message from the {Guest Editors}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "5",
  pages =        "491--492",
  month =        oct,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-018-0416-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Sep 25 06:07:03 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-018-0416-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Imamura:2018:IAA,
  author =       "Kazuya Imamura and Kazuhiko Minematsu and Tetsu
                 Iwata",
  title =        "Integrity analysis of authenticated encryption based
                 on stream ciphers",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "5",
  pages =        "493--511",
  month =        oct,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0378-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Sep 25 06:07:03 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0378-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Yoneyama:2018:MCK,
  author =       "Kazuki Yoneyama and Reo Yoshida and Yuto Kawahara and
                 Tetsutaro Kobayashi and Hitoshi Fuji and Tomohide
                 Yamamoto",
  title =        "Multi-cast key distribution: scalable, dynamic and
                 provably secure construction",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "5",
  pages =        "513--532",
  month =        oct,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0389-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Sep 25 06:07:03 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0389-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Jiang:2018:CPA,
  author =       "Yinhao Jiang and Willy Susilo and Yi Mu and Fuchun
                 Guo",
  title =        "Ciphertext-policy attribute-based encryption
                 supporting access policy update and its extension with
                 preserved attributes",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "5",
  pages =        "533--548",
  month =        oct,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0388-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Sep 25 06:07:03 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0388-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Li:2018:IVC,
  author =       "Yuxi Li and Fucai Zhou and Yuhai Qin and Muqing Lin
                 and Zifeng Xu",
  title =        "Integrity-verifiable conjunctive keyword searchable
                 encryption in cloud storage",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "5",
  pages =        "549--568",
  month =        oct,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0394-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Sep 25 06:07:03 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0394-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Ribeiro:2018:SRH,
  author =       "Carlos Ribeiro and Herbert Leitold and Simon Esposito
                 and David Mitzam",
  title =        "{STORK}: a real, heterogeneous, large-scale {eID}
                 management system",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "5",
  pages =        "569--585",
  month =        oct,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0385-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Sep 25 06:07:03 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0385-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Frattolillo:2018:WPE,
  author =       "Franco Frattolillo",
  title =        "Watermarking protocols: an excursus to motivate a new
                 approach",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "5",
  pages =        "587--601",
  month =        oct,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0386-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Sep 25 06:07:03 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0386-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Lopriore:2018:ARM,
  author =       "Lanfranco Lopriore",
  title =        "Access right management by extended password
                 capabilities",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "5",
  pages =        "603--612",
  month =        oct,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0390-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Sep 25 06:07:03 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0390-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{ElSalamouny:2018:ONF,
  author =       "Ehab ElSalamouny and S{\'e}bastien Gambs",
  title =        "Optimal noise functions for location privacy on
                 continuous regions",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "6",
  pages =        "613--630",
  month =        nov,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0384-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Sep 25 06:07:04 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0384-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Murakami:2018:OAA,
  author =       "Keisuke Murakami and Takeaki Uno",
  title =        "Optimization algorithm for $k$-anonymization of
                 datasets with low information loss",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "6",
  pages =        "631--644",
  month =        nov,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0392-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Sep 25 06:07:04 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0392-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Scaife:2018:OSR,
  author =       "Nolen Scaife and Henry Carter and Lyrissa Lidsky and
                 Rachael L. Jones and Patrick Traynor",
  title =        "{OnionDNS}: a seizure-resistant top-level domain",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "6",
  pages =        "645--660",
  month =        nov,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0391-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Sep 25 06:07:04 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0391-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Chiba:2018:DTA,
  author =       "Daiki Chiba and Takeshi Yagi and Mitsuaki Akiyama and
                 Toshiki Shibahara and Tatsuya Mori and Shigeki Goto",
  title =        "{DomainProfiler}: toward accurate and early discovery
                 of domain names abused in future",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "6",
  pages =        "661--680",
  month =        nov,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0396-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Sep 25 06:07:04 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0396-7;
                 http://link.springer.com/content/pdf/10.1007/s10207-017-0396-7.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Wangen:2018:FEI,
  author =       "Gaute Wangen and Christoffer Hallstensen and Einar
                 Snekkenes",
  title =        "A framework for estimating information security risk
                 assessment method completeness",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "6",
  pages =        "681--699",
  month =        nov,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0382-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Sep 25 06:07:04 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0382-0;
                 http://link.springer.com/content/pdf/10.1007/s10207-017-0382-0.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bindel:2018:CAA,
  author =       "Nina Bindel and Johannes Buchmann and Susanne
                 Rie{\ss}",
  title =        "Comparing apples with apples: performance analysis of
                 lattice-based authenticated key exchange protocols",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "6",
  pages =        "701--718",
  month =        nov,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0397-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Sep 25 06:07:04 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0397-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Cimitile:2018:TNM,
  author =       "Aniello Cimitile and Francesco Mercaldo and Vittoria
                 Nardone and Antonella Santone and Corrado Aaron
                 Visaggio",
  title =        "{Talos}: no more ransomware victims with formal
                 methods",
  journal =      j-INT-J-INFO-SEC,
  volume =       "17",
  number =       "6",
  pages =        "719--738",
  month =        nov,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0398-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Sep 25 06:07:04 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0398-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Das:2019:DSI,
  author =       "Debasish Das and Utpal Sharma and D. K.
                 Bhattacharyya",
  title =        "Defeating {SQL} injection attack in authentication
                 security: an experimental study",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "1",
  pages =        "1--22",
  month =        feb,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0393-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 22 17:04:47 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0393-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Dasgupta:2019:DIN,
  author =       "Dipankar Dasgupta and Abhijit Kumar Nag and Denise
                 Ferebee and Sanjib Kumar Saha and Kul Prasad Subedi and
                 Arunava Roy and Alvaro Madero and Abel Sanchez and John
                 R. Williams",
  title =        "Design and implementation of {Negative Authentication
                 System}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "1",
  pages =        "23--48",
  month =        feb,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-017-0395-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 22 17:04:47 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-017-0395-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Stasinopoulos:2019:CAE,
  author =       "Anastasios Stasinopoulos and Christoforos Ntantogian
                 and Christos Xenakis",
  title =        "{Commix}: automating evaluation and exploitation of
                 command injection vulnerabilities in {Web}
                 applications",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "1",
  pages =        "49--72",
  month =        feb,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-018-0399-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 22 17:04:47 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-018-0399-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Faria:2019:DAA,
  author =       "Gerson de Souza Faria and Hae Yong Kim",
  title =        "Differential audio analysis: a new side-channel attack
                 on {PIN} pads",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "1",
  pages =        "73--84",
  month =        feb,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-018-0403-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 22 17:04:47 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-018-0403-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Mesbah:2019:REJ,
  author =       "Abdelhak Mesbah and Jean-Louis Lanet and Mohamed
                 Mezghiche",
  title =        "Reverse engineering {Java Card} and vulnerability
                 exploitation: a shortcut to {ROM}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "1",
  pages =        "85--100",
  month =        feb,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-018-0401-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 22 17:04:47 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib;
                 https://www.math.utah.edu/pub/tex/bib/java2010.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-018-0401-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Hinarejos:2019:DPE,
  author =       "M. Francisca Hinarejos and Andreu-Pere Isern-Dey{\`a}
                 and Josep-Llu{\'\i}s Ferrer-Gomila and Lloren{\c{c}}
                 Huguet-Rotger",
  title =        "Deployment and performance evaluation of mobile
                 multicoupon solutions",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "1",
  pages =        "101--124",
  month =        feb,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-018-0404-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 22 17:04:47 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-018-0404-6;
                 http://link.springer.com/content/pdf/10.1007/s10207-018-0404-6.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Gulyas:2019:HIA,
  author =       "G{\'a}bor Gy{\"o}rgy Guly{\'a}s and S{\'a}ndor Imre",
  title =        "Hiding information against structural
                 re-identification",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "2",
  pages =        "125--139",
  month =        apr,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-018-0400-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Mon Mar 18 14:19:02 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-018-0400-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Zheng:2019:IDR,
  author =       "Jian-Wu Zheng and Jing Zhao and Xin-Ping Guan",
  title =        "Identifier discrimination: realizing selective-{ID}
                 {HIBE} with authorized delegation and dedicated
                 encryption privacy",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "2",
  pages =        "141--162",
  month =        apr,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-018-0402-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Mon Mar 18 14:19:02 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-018-0402-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Chang:2019:CTM,
  author =       "Donghoon Chang and Arpan Jati and Sweta Mishra and
                 Somitra Kumar Sanadhya",
  title =        "Cryptanalytic time-memory trade-off for password
                 hashing schemes",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "2",
  pages =        "163--180",
  month =        apr,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-018-0405-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Mon Mar 18 14:19:02 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-018-0405-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kluczniak:2019:MDA,
  author =       "Kamil Kluczniak and Jianfeng Wang and Xiaofeng Chen
                 and Miroslaw Kutylowski",
  title =        "Multi-device anonymous authentication",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "2",
  pages =        "181--197",
  month =        apr,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-018-0406-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Mon Mar 18 14:19:02 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-018-0406-4;
                 http://link.springer.com/content/pdf/10.1007/s10207-018-0406-4.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Shah:2019:MEF,
  author =       "Ankit Shah and Rajesh Ganesan and Sushil Jajodia",
  title =        "A methodology for ensuring fair allocation of {CSOC}
                 effort for alert investigation",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "2",
  pages =        "199--218",
  month =        apr,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-018-0407-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Mon Mar 18 14:19:02 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-018-0407-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Ros-Martin:2019:SND,
  author =       "Miguel Ros-Mart{\'\i}n and Juli{\'a}n Salas and Jordi
                 Casas-Roma",
  title =        "Scalable non-deterministic clustering-based
                 $k$-anonymization for rich networks",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "2",
  pages =        "219--238",
  month =        apr,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-018-0409-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Mon Mar 18 14:19:02 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-018-0409-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Joudaki:2019:ETS,
  author =       "Zeinab Joudaki and Julie Thorpe and Miguel {Vargas
                 Martin}",
  title =        "{Enhanced Tacit Secrets}: System-assigned passwords
                 you can't write down, but don't need to",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "2",
  pages =        "239--255",
  month =        apr,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-018-0408-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Mon Mar 18 14:19:02 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-018-0408-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bernardi:2019:DMD,
  author =       "Mario Luca Bernardi and Marta Cimitile Damiano
                 Distante and Fabio Martinelli and Francesco Mercaldo",
  title =        "Dynamic malware detection and phylogeny analysis using
                 process mining",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "3",
  pages =        "257--284",
  month =        jun,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-018-0415-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Thu May 23 17:57:24 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-018-0415-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Grining:2019:PPP,
  author =       "Krzysztof Grining and Marek Klonowski and Piotr Syga",
  title =        "On practical privacy-preserving fault-tolerant data
                 aggregation",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "3",
  pages =        "285--304",
  month =        jun,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-018-0413-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Thu May 23 17:57:24 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-018-0413-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Vora:2019:KBP,
  author =       "Aishwarya Vipul Vora and Saumya Hegde",
  title =        "Keyword-based private searching on cloud data along
                 with keyword association and dissociation using cuckoo
                 filter",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "3",
  pages =        "305--319",
  month =        jun,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-018-0418-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Thu May 23 17:57:24 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-018-0418-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Wu:2019:TPP,
  author =       "Ge Wu and Yi Mu and Willy Susilo and Fuchun Guo and
                 Futai Zhang",
  title =        "Threshold privacy-preserving cloud auditing with
                 multiple uploaders",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "3",
  pages =        "321--331",
  month =        jun,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-018-0420-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Thu May 23 17:57:24 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-018-0420-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Hiemenz:2019:DSS,
  author =       "Benedikt Hiemenz and Michel Kr{\"a}mer",
  title =        "Dynamic searchable symmetric encryption for storing
                 geospatial data in the cloud",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "3",
  pages =        "333--354",
  month =        jun,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-018-0414-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Thu May 23 17:57:24 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-018-0414-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Gao:2019:LBD,
  author =       "Wen Gao and Liqun Chen and Yupu Hu and Christopher J.
                 P. Newton and Baocang Wang and Jiangshan Chen",
  title =        "Lattice-based deniable ring signatures",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "3",
  pages =        "355--370",
  month =        jun,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-018-0417-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Thu May 23 17:57:24 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-018-0417-1;
                 http://link.springer.com/content/pdf/10.1007/s10207-018-0417-1.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Samadani:2019:SPM,
  author =       "Mohammad Hasan Samadani and Mehdi Berenjkoob and
                 Marina Blanton",
  title =        "Secure pattern matching based on bit parallelism",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "3",
  pages =        "371--391",
  month =        jun,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-018-0410-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Thu May 23 17:57:24 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib;
                 https://www.math.utah.edu/pub/tex/bib/string-matching.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-018-0410-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kulah:2019:SAD,
  author =       "Yusuf Kulah and Berkay Dincer and Cemal Yilmaz and
                 Erkay Savas",
  title =        "{SpyDetector}: an approach for detecting side-channel
                 attacks at runtime",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "4",
  pages =        "393--422",
  month =        aug,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-018-0411-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Jul 13 14:23:17 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-018-0411-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Faghani:2019:MBM,
  author =       "Mohammad R. Faghani and Uyen T. Nguyen",
  title =        "Mobile botnets meet social networks: design and
                 analysis of a new type of botnet",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "4",
  pages =        "423--449",
  month =        aug,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-018-0412-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Jul 13 14:23:17 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-018-0412-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Perez-Sola:2019:DSP,
  author =       "Cristina P{\'e}rez-Sol{\`a} and Sergi Delgado-Segura
                 and Guillermo Navarro-Arribas and Jordi
                 Herrera-Joancomart{\'\i}",
  title =        "Double-spending prevention for {Bitcoin}
                 zero-confirmation transactions",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "4",
  pages =        "451--463",
  month =        aug,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-018-0422-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Jul 13 14:23:17 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-018-0422-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Rezvani:2019:AXP,
  author =       "Mohsen Rezvani and David Rajaratnam and Aleksandar
                 Ignjatovic and Maurice Pagnucco and Sanjay Jha",
  title =        "Analyzing {XACML} policies using answer set
                 programming",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "4",
  pages =        "465--479",
  month =        aug,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-018-0421-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Jul 13 14:23:17 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-018-0421-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Saini:2019:YCS,
  author =       "Anil Saini and Manoj Singh Gaur and Vijay Laxmi and
                 Mauro Conti",
  title =        "You click, {I} steal: analyzing and detecting click
                 hijacking attacks in web pages",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "4",
  pages =        "481--504",
  month =        aug,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-018-0423-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Jul 13 14:23:17 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-018-0423-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Resende:2019:BMI,
  author =       "Jo{\~a}o S. Resende and Patr{\'\i}cia R. Sousa and
                 Rolando Martins and Lu{\'\i}s Antunes",
  title =        "Breaking {MPC} implementations through compression",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "4",
  pages =        "505--518",
  month =        aug,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-018-0424-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Jul 13 14:23:17 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/datacompression.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-018-0424-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
  keywords =     "multiparty computation (MPC) [a sub-field of
                 cryptography with the goal of creating methods for
                 parties to jointly compute a function over their inputs
                 while keeping those inputs private]",
}

@Article{Marco-Gisbert:2019:SES,
  author =       "H{\'e}ctor Marco-Gisbert and Ismael Ripoll-Ripoll",
  title =        "{SSPFA}: effective stack smashing protection for
                 {Android OS}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "4",
  pages =        "519--532",
  month =        aug,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-018-00425-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Jul 13 14:23:17 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-018-00425-8;
                 http://link.springer.com/content/pdf/10.1007/s10207-018-00425-8.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Farras:2019:PSP,
  author =       "Oriol Farr{\`a}s and Jordi Ribes-Gonz{\'a}lez",
  title =        "Provably secure public-key encryption with conjunctive
                 and subset keyword search",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "5",
  pages =        "533--548",
  month =        oct,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-018-00426-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Sep 11 11:59:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-018-00426-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Dyer:2019:PHE,
  author =       "James Dyer and Martin Dyer and Jie Xu",
  title =        "Practical homomorphic encryption over the integers for
                 secure computation in the cloud",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "5",
  pages =        "549--579",
  month =        oct,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00427-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Sep 11 11:59:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00427-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Takahashi:2019:SSF,
  author =       "Kenta Takahashi and Takahiro Matsuda and Takao
                 Murakami and Goichiro Hanaoka and Masakatsu Nishigaki",
  title =        "Signature schemes with a fuzzy private key",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "5",
  pages =        "581--617",
  month =        oct,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00428-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Sep 11 11:59:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00428-z;
                 http://link.springer.com/content/pdf/10.1007/s10207-019-00428-z.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Rastegari:2019:CDV,
  author =       "Parvin Rastegari and Willy Susilo and Mohammad
                 Dakhilalian",
  title =        "Certificateless designated verifier signature
                 revisited: achieving a concrete scheme in the standard
                 model",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "5",
  pages =        "619--635",
  month =        oct,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00430-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Sep 11 11:59:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00430-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Garra:2019:RAB,
  author =       "Ricard Garra and Dominik Leibenger and Josep M. Miret
                 and Francesc Seb{\'e}",
  title =        "Repairing an aggregation-based smart metering system",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "5",
  pages =        "637--646",
  month =        oct,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00435-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Sep 11 11:59:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00435-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Yu:2019:UUP,
  author =       "Xiaoying Yu and Qi Liao",
  title =        "Understanding user passwords through password prefix
                 and postfix ({P3}) graph analysis and visualization",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "5",
  pages =        "647--663",
  month =        oct,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00432-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Sep 11 11:59:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00432-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Makhlouf:2019:SAS,
  author =       "Amel Meddeb Makhlouf and Mohsen Guizani",
  title =        "{SE-AOMDV}: secure and efficient {AOMDV} routing
                 protocol for vehicular communications",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "5",
  pages =        "665--676",
  month =        oct,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00436-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Sep 11 11:59:37 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00436-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Cai:2019:STP,
  author =       "Yixian Cai and George Karakostas and Alan Wassyng",
  title =        "Secure and trusted partial grey-box verification",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "6",
  pages =        "677--700",
  month =        dec,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00431-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Mon Sep 23 07:53:38 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00431-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Zhang:2019:FGA,
  author =       "Tao Zhang and Wang Hao Lee and Mingyuan Gao and
                 Jianying Zhou",
  title =        "{File Guard}: automatic format-based media file
                 sanitization",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "6",
  pages =        "701--713",
  month =        dec,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00440-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Mon Sep 23 07:53:38 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00440-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Riesco:2019:LCT,
  author =       "R. Riesco and V. A. Villagr{\'a}",
  title =        "Leveraging cyber threat intelligence for a dynamic
                 risk framework",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "6",
  pages =        "715--739",
  month =        dec,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00433-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Mon Sep 23 07:53:38 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00433-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Yildirim:2019:EUI,
  author =       "M. Yildirim and I. Mackie",
  title =        "Encouraging users to improve password security and
                 memorability",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "6",
  pages =        "741--759",
  month =        dec,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00429-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Mon Sep 23 07:53:38 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00429-y;
                 http://link.springer.com/content/pdf/10.1007/s10207-019-00429-y.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Aamir:2019:DAD,
  author =       "Muhammad Aamir and Syed Mustafa Ali Zaidi",
  title =        "{DDoS} attack detection with feature engineering and
                 machine learning: the framework and performance
                 evaluation",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "6",
  pages =        "761--785",
  month =        dec,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00434-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Mon Sep 23 07:53:38 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00434-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Patsakis:2019:HID,
  author =       "Constantinos Patsakis and Fran Casino",
  title =        "{Hydras} and {IPFS}: a decentralised playground for
                 malware",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "6",
  pages =        "787--799",
  month =        dec,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00443-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Mon Sep 23 07:53:38 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00443-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Toreini:2019:DEW,
  author =       "Ehsan Toreini and Siamak F. Shahandashti and Maryam
                 Mehrnezhad and Feng Hao",
  title =        "{DOMtegrity}: ensuring web page integrity against
                 malicious browser extensions",
  journal =      j-INT-J-INFO-SEC,
  volume =       "18",
  number =       "6",
  pages =        "801--814",
  month =        dec,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00442-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Mon Sep 23 07:53:38 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00442-1;
                 http://link.springer.com/content/pdf/10.1007/s10207-019-00442-1.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Takahashi:2020:MGE,
  author =       "Takeshi Takahashi and Rodrigo Roman Castro and
                 Bilhanan Silverajan and Ryan K. L. Ko and Said Tabet",
  title =        "Message from the guest editors",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "1",
  pages =        "1--2",
  month =        feb,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00472-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Feb 1 14:23:11 MST 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00472-9;
                 http://link.springer.com/content/pdf/10.1007/s10207-019-00472-9.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Aufner:2020:ISG,
  author =       "Peter Aufner",
  title =        "The {IoT} security gap: a look down into the valley
                 between threat models and their implementation",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "1",
  pages =        "3--14",
  month =        feb,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00445-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Feb 1 14:23:11 MST 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00445-y;
                 http://link.springer.com/content/pdf/10.1007/s10207-019-00445-y.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Anada:2020:KUP,
  author =       "Hiroaki Anada and Akira Kanaoka and Natsume Matsuzaki
                 and Yohei Watanabe",
  title =        "Key-updatable public-key encryption with keyword
                 search (Or: How to realize {PEKS} with efficient key
                 updates for {IoT} environments)",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "1",
  pages =        "15--38",
  month =        feb,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00441-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Feb 1 14:23:11 MST 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00441-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Yehuda:2020:PAR,
  author =       "Raz {Ben Yehuda} and Nezer Jacob Zaidenberg",
  title =        "Protection against reverse engineering in {ARM}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "1",
  pages =        "39--51",
  month =        feb,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00450-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Feb 1 14:23:11 MST 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00450-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Ko:2020:FDD,
  author =       "Ili Ko and Desmond Chambers and Enda Barrett",
  title =        "Feature dynamic deep learning approach for {DDoS}
                 mitigation within the {ISP} domain",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "1",
  pages =        "53--70",
  month =        feb,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00453-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Feb 1 14:23:11 MST 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00453-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Takase:2020:PIE,
  author =       "Hayate Takase and Ryotaro Kobayashi and Masahiko Kato
                 and Ren Ohmura",
  title =        "A prototype implementation and evaluation of the
                 malware detection mechanism for {IoT} devices using the
                 processor information",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "1",
  pages =        "71--81",
  month =        feb,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00437-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Feb 1 14:23:11 MST 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00437-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Ozawa:2020:SIM,
  author =       "Seiichi Ozawa and Tao Ban and Naoki Hashimoto and
                 Junji Nakazato and Jumpei Shimamura",
  title =        "A study of {IoT} malware activities using association
                 rule learning for darknet sensor data",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "1",
  pages =        "83--92",
  month =        feb,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00439-w",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Feb 1 14:23:11 MST 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00439-w",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Shayesteh:2020:TMS,
  author =       "Behshid Shayesteh and Vesal Hakami and Ahmad Akbari",
  title =        "A trust management scheme for {IoT-enabled}
                 environmental health\slash accessibility monitoring
                 services",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "1",
  pages =        "93--110",
  month =        feb,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00446-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Feb 1 14:23:11 MST 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00446-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Ferraris:2020:TTR,
  author =       "Davide Ferraris and Carmen Fernandez-Gago",
  title =        "{TrUStAPIS}: a trust requirements elicitation method
                 for {IoT}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "1",
  pages =        "111--127",
  month =        feb,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00438-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Feb 1 14:23:11 MST 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00438-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Sowjanya:2020:ECC,
  author =       "K. Sowjanya and Mou Dasgupta and Sangram Ray",
  title =        "An elliptic curve cryptography based enhanced
                 anonymous authentication protocol for wearable health
                 monitoring systems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "1",
  pages =        "129--146",
  month =        feb,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00464-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Feb 1 14:23:11 MST 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00464-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Patil:2020:DVA,
  author =       "Rajendra Patil and Harsha Dudeja and Chirag Modi",
  title =        "Designing in-{VM}-assisted lightweight agent-based
                 malware detection framework for securing virtual
                 machines in cloud computing",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "2",
  pages =        "147--162",
  month =        apr,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00447-w",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 18 12:04:16 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00447-w",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{BenAttia:2020:UHT,
  author =       "Hasiba {Ben Attia} and Laid Kahloul Saber Benharzallah
                 and Samir Bourekkache",
  title =        "Using Hierarchical Timed Coloured {Petri} Nets in the
                 formal study of {TRBAC} security policies",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "2",
  pages =        "163--187",
  month =        apr,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00448-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 18 12:04:16 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  note =         "See author name correction \cite{BenAttia:2020:CUH}.",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00448-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Adepu:2020:ASG,
  author =       "Sridhar Adepu and Nandha Kumar Kandasamy and Jianying
                 Zhou and Aditya Mathur",
  title =        "Attacks on smart grid: power supply interruption and
                 malicious power generation",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "2",
  pages =        "189--211",
  month =        apr,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00452-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 18 12:04:16 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00452-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Cheng:2020:SAA,
  author =       "Peng Cheng and Ibrahim Ethem Bagci and Utz Roedig and
                 Jeff Yan",
  title =        "{SonarSnoop}: active acoustic side-channel attacks",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "2",
  pages =        "213--228",
  month =        apr,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00449-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 18 12:04:16 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00449-8;
                 http://link.springer.com/content/pdf/10.1007/s10207-019-00449-8.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Nayak:2020:SSE,
  author =       "Sanjeet Kumar Nayak and Somanath Tripathy",
  title =        "{SEDS}: secure and efficient server-aided data
                 deduplication scheme for cloud storage",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "2",
  pages =        "229--240",
  month =        apr,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00455-w",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 18 12:04:16 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00455-w",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{BenAttia:2020:CUH,
  author =       "Hasiba {Ben Attia} and Laid Kahloul and Saber
                 Benharzallah and Samir Bourekkache",
  title =        "Correction to: {Using Hierarchical Timed Coloured
                 Petri Nets in the formal study of TRBAC security
                 policies}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "2",
  pages =        "241--241",
  month =        apr,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00454-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Mar 18 12:04:16 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  note =         "See \cite{BenAttia:2020:UHT}.",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00454-x;
                 http://link.springer.com/content/pdf/10.1007/s10207-019-00454-x.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
  remark =       "In the original publication of this article, the third
                 author's name was incorrectly published. The correct
                 name of the third author should read as ``Saber
                 Benharzallah''.",
}

@Article{Yeh:2020:SIS,
  author =       "Kuo-Hui Yeh and Chunhua Su and Robert H. Deng and Moti
                 Yung and Miroslaw Kutylowski",
  title =        "Special issue on security and privacy of blockchain
                 technologies",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "3",
  pages =        "243--244",
  month =        jun,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00496-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue May 19 08:49:45 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00496-6;
                 http://link.springer.com/content/pdf/10.1007/s10207-020-00496-6.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Fan:2020:SHB,
  author =       "Chun-I Fan and Yi-Fan Tseng and Hui-Po Su and Ruei-Hau
                 Hsu and Hiroaki Kikuchi",
  title =        "Secure hierarchical {Bitcoin} wallet scheme against
                 privilege escalation attacks",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "3",
  pages =        "245--255",
  month =        jun,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00476-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue May 19 08:49:45 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00476-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Yohan:2020:FSB,
  author =       "Alexander Yohan and Nai-Wei Lo",
  title =        "{FOTB}: a secure blockchain-based firmware update
                 framework for {IoT} environment",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "3",
  pages =        "257--278",
  month =        jun,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00467-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue May 19 08:49:45 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00467-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Meng:2020:ECB,
  author =       "Weizhi Meng and Wenjuan Li and Laurence T. Yang and
                 Peng Li",
  title =        "Enhancing challenge-based collaborative intrusion
                 detection networks against insider attacks using
                 blockchain",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "3",
  pages =        "279--290",
  month =        jun,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00462-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue May 19 08:49:45 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00462-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Sattath:2020:IQB,
  author =       "Or Sattath",
  title =        "On the insecurity of quantum {Bitcoin} mining",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "3",
  pages =        "291--302",
  month =        jun,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00493-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue May 19 08:49:45 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00493-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Zhou:2020:IFV,
  author =       "Yuanjian Zhou and Yining Liu and Chengshun Jiang and
                 Shulan Wang",
  title =        "An improved {FOO} voting scheme using blockchain",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "3",
  pages =        "303--310",
  month =        jun,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00457-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue May 19 08:49:45 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00457-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bao:2020:LSP,
  author =       "Zijian Bao and Wenbo Shi and Saru Kumari and Zhi-yin
                 Kong and Chien-Ming Chen",
  title =        "{Lockmix}: a secure and privacy-preserving mix service
                 for {Bitcoin} anonymity",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "3",
  pages =        "311--321",
  month =        jun,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00459-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue May 19 08:49:45 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00459-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Zhang:2020:CBE,
  author =       "Shufan Zhang and Lili Wang and Hu Xiong",
  title =        "{Chaintegrity}: blockchain-enabled large-scale
                 e-voting system with robustness and universal
                 verifiability",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "3",
  pages =        "323--341",
  month =        jun,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00465-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue May 19 08:49:45 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00465-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Tiloca:2020:GRB,
  author =       "Marco Tiloca and Gianluca Dini and Kiki Rizki and
                 Shahid Raza",
  title =        "Group rekeying based on member join history",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "4",
  pages =        "343--381",
  month =        aug,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00451-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jul 21 07:55:30 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00451-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Seo:2020:ERL,
  author =       "Minhye Seo and Suhri Kim and Dong Hoon Lee and Jong
                 Hwan Park",
  title =        "{EMBLEM}: {(R)LWE}-based key encapsulation with a new
                 multi-bit encoding method",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "4",
  pages =        "383--399",
  month =        aug,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00456-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jul 21 07:55:30 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00456-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Holzl:2020:DDA,
  author =       "Michael H{\"o}lzl and Michael Roland and Omid Mir and
                 Ren{\'e} Mayrhofer",
  title =        "Disposable dynamic accumulators: toward practical
                 privacy-preserving mobile {eIDs} with scalable
                 revocation",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "4",
  pages =        "401--417",
  month =        aug,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00458-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jul 21 07:55:30 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00458-7;
                 http://link.springer.com/content/pdf/10.1007/s10207-019-00458-7.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Ogata:2020:SAS,
  author =       "Wakaha Ogata and Takaaki Otemori",
  title =        "Security analysis of secure {kNN} and ranked keyword
                 search over encrypted data",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "4",
  pages =        "419--425",
  month =        aug,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00461-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jul 21 07:55:30 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00461-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Pilz:2020:SAS,
  author =       "M. Pilz and F. Baghaei Naeini and K. Grammont and C.
                 Smagghe and M. Davis and J.-C. Nebel and L. Al-Fagih
                 and E. Pfluegel",
  title =        "Security attacks on smart grid scheduling and their
                 defences: a game-theoretic approach",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "4",
  pages =        "427--443",
  month =        aug,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00460-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jul 21 07:55:30 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00460-z;
                 http://link.springer.com/content/pdf/10.1007/s10207-019-00460-z.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Ueda:2020:SIR,
  author =       "Itaru Ueda and Daiki Miyahara and Akihiro Nishimura
                 and Yu-ichi Hayashi and Takaaki Mizuki and Hideaki
                 Sone",
  title =        "Secure implementations of a random bisection cut",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "4",
  pages =        "445--452",
  month =        aug,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00463-w",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jul 21 07:55:30 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00463-w",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Wu:2020:CIB,
  author =       "Chunhui Wu and Xiaofeng Chen and Willy Susilo",
  title =        "Concise {ID}-based mercurial functional commitments
                 and applications to zero-knowledge sets",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "4",
  pages =        "453--464",
  month =        aug,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00466-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jul 21 07:55:30 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00466-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Casas-Roma:2020:DGD,
  author =       "Jordi Casas-Roma",
  title =        "{DUEF-GA}: data utility and privacy evaluation
                 framework for graph anonymization",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "4",
  pages =        "465--478",
  month =        aug,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00469-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jul 21 07:55:30 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00469-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Mitropoulos:2020:PAC,
  author =       "Dimitris Mitropoulos and Thodoris Sotiropoulos and
                 Nikos Koutsovasilis and Diomidis Spinellis",
  title =        "{PDGuard}: an architecture for the control and secure
                 processing of personal data",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "4",
  pages =        "479--498",
  month =        aug,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00468-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jul 21 07:55:30 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00468-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Sheikhalishahi:2020:DWD,
  author =       "Mina Sheikhalishahi and Andrea Saracino and Fabio
                 Martinelli and Antonio {La Marra} and Mohammed Mejri
                 and Nadia Tawbi",
  title =        "Digital Waste Disposal: an automated framework for
                 analysis of spam emails",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "5",
  pages =        "499--522",
  month =        oct,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00470-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Aug 15 07:08:49 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00470-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Alzaidi:2020:DHP,
  author =       "Areej Alzaidi and Suhair Alshehri and Seyed M.
                 Buhari",
  title =        "{DroidRista}: a highly precise static data flow
                 analysis framework for {Android} applications",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "5",
  pages =        "523--536",
  month =        oct,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00471-w",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Aug 15 07:08:49 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00471-w",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Torra:2020:RDP,
  author =       "Vicen{\c{c}} Torra",
  title =        "Random dictatorship for privacy-preserving social
                 choice",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "5",
  pages =        "537--545",
  month =        oct,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00474-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Aug 15 07:08:49 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00474-7;
                 http://link.springer.com/content/pdf/10.1007/s10207-019-00474-7.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bernardini:2020:ASS,
  author =       "Riccardo Bernardini and Roberto Rinaldo",
  title =        "Analysis of some simple stabilizers for physically
                 obfuscated keys",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "5",
  pages =        "547--565",
  month =        oct,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00473-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Aug 15 07:08:49 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00473-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Nguyen:2020:NGB,
  author =       "Huy-Trung Nguyen and Quoc-Dung Ngo and Van-Hoang Le",
  title =        "A novel graph-based approach for {IoT} botnet
                 detection",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "5",
  pages =        "567--577",
  month =        oct,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00475-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Aug 15 07:08:49 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00475-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Manasrah:2020:KPD,
  author =       "Ahmed M. Manasrah and Areej R. AL-Rabadi and Najib A.
                 Kofahi",
  title =        "Key pre-distribution approach using block {$ L U $}
                 decomposition in wireless sensor network",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "5",
  pages =        "579--596",
  month =        oct,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00477-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Aug 15 07:08:49 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00477-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Taheri:2020:CTU,
  author =       "Sona Taheri and Adil M. Bagirov and Iqbal Gondal and
                 Simon Brown",
  title =        "Cyberattack triage using incremental clustering for
                 intrusion detection systems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "5",
  pages =        "597--607",
  month =        oct,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00478-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Aug 15 07:08:49 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00478-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Hale:2020:UMA,
  author =       "Britta Hale",
  title =        "User-mediated authentication protocols and
                 unforgeability in key collision",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "6",
  pages =        "609--621",
  month =        dec,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00479-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 19 07:03:34 MST 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00479-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Picazo-Sanchez:2020:AYP,
  author =       "Pablo Picazo-Sanchez and Juan Tapiador and Gerardo
                 Schneider",
  title =        "After you, please: browser extensions order attacks
                 and countermeasures",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "6",
  pages =        "623--638",
  month =        dec,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00481-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 19 07:03:34 MST 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00481-8;
                 http://link.springer.com/content/pdf/10.1007/s10207-019-00481-8.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Zhang:2020:FAB,
  author =       "Yanting Zhang and Jianwei Liu and Zongyang Zhang and
                 Weiran Liu",
  title =        "{FDCO}: attribute-based fast data cloud-outsourcing
                 scheme for mobile devices",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "6",
  pages =        "639--656",
  month =        dec,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00480-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 19 07:03:34 MST 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00480-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Sethi:2020:CAR,
  author =       "Kamalakanta Sethi and E. Sai Rupesh and Rahul Kumar
                 and Padmalochan Bera and Y. Venu Madhav",
  title =        "A context-aware robust intrusion detection system: a
                 reinforcement learning-based approach",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "6",
  pages =        "657--678",
  month =        dec,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00482-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 19 07:03:34 MST 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00482-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Melki:2020:LMF,
  author =       "Reem Melki and Hassan N. Noura and Ali Chehab",
  title =        "Lightweight multi-factor mutual authentication
                 protocol for {IoT} devices",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "6",
  pages =        "679--694",
  month =        dec,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00484-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 19 07:03:34 MST 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00484-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Tavizi:2020:LPS,
  author =       "Tina Tavizi and Mehdi Shajari",
  title =        "A language and a pattern system for temporal property
                 specification: advanced metering infrastructure case
                 study",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "6",
  pages =        "695--710",
  month =        dec,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00483-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 19 07:03:34 MST 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00483-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Sun:2020:PDI,
  author =       "Lixue Sun and Chunxiang Xu and Yuan Zhang and Kefei
                 Chen",
  title =        "Public data integrity auditing without homomorphic
                 authenticators from indistinguishability obfuscation",
  journal =      j-INT-J-INFO-SEC,
  volume =       "19",
  number =       "6",
  pages =        "711--720",
  month =        dec,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00486-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 19 07:03:34 MST 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00486-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Leontiadis:2021:SCR,
  author =       "Iraklis Leontiadis and Ming Li",
  title =        "Secure and collusion-resistant data aggregation from
                 convertible tags",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "1",
  pages =        "1--20",
  month =        feb,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-019-00485-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 19 07:03:35 MST 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-019-00485-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Schlette:2021:MVC,
  author =       "Daniel Schlette and Fabian B{\"o}hm and Marco Caselli
                 and G{\"u}nther Pernul",
  title =        "Measuring and visualizing cyber threat intelligence
                 quality",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "1",
  pages =        "21--38",
  month =        feb,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00490-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 19 07:03:35 MST 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00490-y;
                 http://link.springer.com/content/pdf/10.1007/s10207-020-00490-y.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{El-Zawawy:2021:DLN,
  author =       "Mohamed A. El-Zawawy and Eleonora Losiouk and Mauro
                 Conti",
  title =        "Do not let {Next-Intent Vulnerability} be your next
                 nightmare: type system-based approach to detect it in
                 {Android} apps",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "1",
  pages =        "39--58",
  month =        feb,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00491-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 19 07:03:35 MST 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00491-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Liu:2021:NEM,
  author =       "Pengfei Liu and Weiping Wang and Xi Luo and Haodong
                 Wang and Chushu Liu",
  title =        "{NSDroid}: efficient multi-classification of {Android}
                 malware using neighborhood signature in local function
                 call graphs",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "1",
  pages =        "59--71",
  month =        feb,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00489-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 19 07:03:35 MST 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00489-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{VandenBroeck:2021:OIS,
  author =       "Jens {Van den Broeck} and Bart Coppens and Bjorn {De
                 Sutter}",
  title =        "Obfuscated integration of software protections",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "1",
  pages =        "73--101",
  month =        feb,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00494-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 19 07:03:35 MST 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00494-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Jia:2021:CNI,
  author =       "Huiwen Jia and Chunming Tang",
  title =        "Cryptanalysis of a non-interactive deniable ring
                 signature scheme",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "1",
  pages =        "103--112",
  month =        feb,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00497-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 19 07:03:35 MST 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00497-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Ibnugraha:2021:RMD,
  author =       "Prajna Deshanta Ibnugraha and Lukito Edi Nugroho and
                 Paulus Insap Santosa",
  title =        "Risk model development for information security in
                 organization environment based on business
                 perspectives",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "1",
  pages =        "113--126",
  month =        feb,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00495-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Jan 19 07:03:35 MST 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00495-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Li:2021:TBB,
  author =       "Wenjuan Li and Yu Wang and Man Ho Au",
  title =        "Toward a blockchain-based framework for
                 challenge-based collaborative intrusion detection",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "2",
  pages =        "127--139",
  month =        apr,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00488-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Mar 23 08:25:39 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-020-00488-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
  online-date =  "Published: 11 February 2020 Pages: 127 - 139",
}

@Article{Xu:2021:SLR,
  author =       "Jia Xu and Jianying Zhou",
  title =        "Strong leakage-resilient encryption: enhancing data
                 confidentiality by hiding partial ciphertext",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "2",
  pages =        "141--159",
  month =        apr,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00487-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Mar 23 08:25:39 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-020-00487-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
  online-date =  "Published: 12 February 2020 Pages: 141 - 159",
}

@Article{Faisal:2021:SAT,
  author =       "Abu Faisal and Mohammad Zulkernine",
  title =        "A secure architecture for {TCP\slash UDP}-based cloud
                 communications",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "2",
  pages =        "161--179",
  month =        apr,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00511-w",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Mar 23 08:25:39 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-020-00511-w",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
  online-date =  "Published: 07 July 2020 Pages: 161 - 179",
}

@Article{Solano:2021:CBB,
  author =       "Jesus Solano and Luis Camacho and Mart{\'\i}n Ochoa",
  title =        "Combining behavioral biometrics and session context
                 analytics to enhance risk-based static authentication
                 in web applications",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "2",
  pages =        "181--197",
  month =        apr,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00510-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Mar 23 08:25:39 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-020-00510-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
  online-date =  "Published: 16 June 2020 Pages: 181 - 197",
}

@Article{Chatterjee:2021:SEW,
  author =       "Sanjit Chatterjee and Manish Kesarwani and Akash
                 Shah",
  title =        "Secure and efficient wildcard search over encrypted
                 data",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "2",
  pages =        "199--244",
  month =        apr,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00492-w",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Mar 23 08:25:39 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-020-00492-w",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
  online-date =  "Published: 30 March 2020 Pages: 199 - 244",
}

@Article{Medina-Lopez:2021:SAD,
  author =       "Crist{\'o}bal Medina-L{\'o}pez and L. G. Casado and
                 Yuansong Qiao",
  title =        "An {SDN} approach to detect targeted attacks in {P2P}
                 fully connected overlays",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "2",
  pages =        "245--255",
  month =        apr,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00499-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Mar 23 08:25:39 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-020-00499-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
  online-date =  "Published: 02 May 2020 Pages: 245 - 255",
}

@Article{Wang:2021:SLR,
  author =       "Yuntao Wang and Tsuyoshi Takagi",
  title =        "Studying lattice reduction algorithms improved by
                 quick reordering technique",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "2",
  pages =        "257--268",
  month =        apr,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00501-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Mar 23 08:25:39 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-020-00501-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
  online-date =  "Published: 13 May 2020 Pages: 257 - 268",
}

@Article{Benarfa:2021:CED,
  author =       "Abdelmadjid Benarfa and Muhammad Hassan and Eleonora
                 Losiouk and Alberto Compagno and Mohamed Bachir Yagoubi
                 and Mauro Conti",
  title =        "{ChoKIFA+}: an early detection and mitigation approach
                 against interest flooding attacks in {NDN}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "3",
  pages =        "269--285",
  month =        jun,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00500-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat May 29 07:09:27 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00500-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Manulis:2021:CSN,
  author =       "M. Manulis and C. P. Bridges and R. Harrison and V.
                 Sekar and A. Davis",
  title =        "Cyber security in New Space",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "3",
  pages =        "287--311",
  month =        jun,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00503-w",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat May 29 07:09:27 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00503-w;
                 http://link.springer.com/content/pdf/10.1007/s10207-020-00503-w.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Berger:2021:WTC,
  author =       "Harel Berger and Amit Z. Dvir and Moti Geva",
  title =        "A wrinkle in time: a case study in {DNS} poisoning",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "3",
  pages =        "313--329",
  month =        jun,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00502-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat May 29 07:09:27 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00502-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Ji:2021:EVA,
  author =       "Soo-Yeon Ji and Bong-Keun Jeong and Dong Hyun Jeong",
  title =        "Evaluating visualization approaches to detect abnormal
                 activities in network traffic data",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "3",
  pages =        "331--345",
  month =        jun,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00504-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat May 29 07:09:27 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00504-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Spathoulas:2021:UHE,
  author =       "Georgios Spathoulas and Georgios Theodoridis and
                 Georgios-Paraskevas Damiris",
  title =        "Using homomorphic encryption for privacy-preserving
                 clustering of intrusion detection alerts",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "3",
  pages =        "347--370",
  month =        jun,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00506-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat May 29 07:09:27 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00506-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Pitolli:2021:MAF,
  author =       "Gregorio Pitolli and Giuseppe Laurenza and Leonardo
                 Aniello and Leonardo Querzoni and Roberto Baldoni",
  title =        "{MalFamAware}: automatic family identification and
                 malware classification through online clustering",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "3",
  pages =        "371--386",
  month =        jun,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00509-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat May 29 07:09:27 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00509-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Mighan:2021:NSI,
  author =       "Soosan Naderi Mighan and Mohsen Kahani",
  title =        "A novel scalable intrusion detection system based on
                 deep learning",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "3",
  pages =        "387--403",
  month =        jun,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00508-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat May 29 07:09:27 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00508-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Mandal:2021:ATC,
  author =       "Mriganka Mandal",
  title =        "Anonymity in traceable cloud data broadcast system
                 with simultaneous individual messaging",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "3",
  pages =        "405--430",
  month =        jun,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00512-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat May 29 07:09:27 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00512-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Khan:2021:EAB,
  author =       "Fawad Khan and Hui Li and Yinghui Zhang and Haider
                 Abbas and Tahreem Yaqoob",
  title =        "Efficient attribute-based encryption with repeated
                 attributes optimization",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "3",
  pages =        "431--444",
  month =        jun,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00505-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat May 29 07:09:27 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00505-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Aniello:2021:ABT,
  author =       "Leonardo Aniello and Basel Halak and Peter Chai and
                 Riddhi Dhall and Mircea Mihalea and Adrian Wilczynski",
  title =        "{Anti-BlUFf}: towards counterfeit mitigation in {IC}
                 supply chains using blockchain and {PUF}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "3",
  pages =        "445--460",
  month =        jun,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00513-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat May 29 07:09:27 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00513-8;
                 http://link.springer.com/content/pdf/10.1007/s10207-020-00513-8.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Yamauchi:2021:AKO,
  author =       "Toshihiro Yamauchi and Yohei Akao and Ryota Yoshitani
                 and Yuichi Nakamura and Masaki Hashimoto",
  title =        "Additional kernel observer: privilege escalation
                 attack prevention mechanism focusing on system call
                 privilege changes",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "4",
  pages =        "461--473",
  month =        aug,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00514-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Jul 28 09:12:45 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00514-7;
                 http://link.springer.com/content/pdf/10.1007/s10207-020-00514-7.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kim:2021:ISD,
  author =       "Hyoseung Kim and Kwangsu Lee and Jong Hwan Park and
                 Dong Hoon Lee",
  title =        "Improving the security of direct anonymous attestation
                 under host corruptions",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "4",
  pages =        "475--492",
  month =        aug,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00507-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Jul 28 09:12:45 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00507-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Jouini:2021:QAS,
  author =       "Mouna Jouini and Latifa {Ben Arfa Rabai} and Ridha
                 Khedri",
  title =        "A quantitative assessment of security risks based on a
                 multifaceted classification approach",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "4",
  pages =        "493--510",
  month =        aug,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00515-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Jul 28 09:12:45 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00515-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Deldar:2021:EST,
  author =       "Fatemeh Deldar and Mahdi Abadi",
  title =        "Enhancing spatial and temporal utilities in
                 differentially private moving objects database
                 release",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "4",
  pages =        "511--533",
  month =        aug,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00516-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Jul 28 09:12:45 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00516-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bi:2021:MPA,
  author =       "Kun Bi and Dezhi Han and Guichen Zhang and Kuan-Ching
                 Li and Aniello Castiglione",
  title =        "{$K$} maximum probability attack paths generation
                 algorithm for target nodes in networked systems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "4",
  pages =        "535--551",
  month =        aug,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00517-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Jul 28 09:12:45 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00517-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Sermpinis:2021:DDT,
  author =       "Thomas Sermpinis and George Vlahavas and Konstantinos
                 Karasavvas and Athena Vakali",
  title =        "{DeTRACT}: a decentralized, transparent, immutable and
                 open {PKI} certificate framework",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "4",
  pages =        "553--570",
  month =        aug,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00518-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Jul 28 09:12:45 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00518-3",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Ferraris:2021:TMP,
  author =       "Davide Ferraris and Daniel Bastos and Carmen
                 Fernandez-Gago and Fadi El-Moussa",
  title =        "A trust model for popular smart home devices",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "4",
  pages =        "571--587",
  month =        aug,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00519-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Jul 28 09:12:45 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00519-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Lee:2021:BBM,
  author =       "Tian-Fu Lee and Hong-Ze Li and Yi-Pei Hsieh",
  title =        "A blockchain-based medical data preservation scheme
                 for telecare medical information systems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "4",
  pages =        "589--601",
  month =        aug,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00521-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Jul 28 09:12:45 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00521-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Parida:2021:PMC,
  author =       "Trushna Parida and Suvrojit Das",
  title =        "{PageDumper}: a mechanism to collect page table
                 manipulation information at run-time",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "4",
  pages =        "603--619",
  month =        aug,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00520-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Jul 28 09:12:45 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00520-9",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Ngamboe:2021:RAC,
  author =       "Mika{\"e}la Ngambo{\'e} and Paul Berthier and Nader
                 Ammari and Katia Dyrda and Jos{\'e} M. Fernandez",
  title =        "Risk assessment of cyber-attacks on telemetry-enabled
                 cardiac implantable electronic devices ({CIED})",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "4",
  pages =        "621--645",
  month =        aug,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00522-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Wed Jul 28 09:12:45 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00522-7;
                 http://link.springer.com/content/pdf/10.1007/s10207-020-00522-7.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Gomez:2021:CCM,
  author =       "Juan Manuel Castelo G{\'o}mez and Javier Carrillo
                 Mond{\'e}jar and Jos{\'e} Rold{\'a}n G{\'o}mez and
                 Jos{\'e} Luis Mart{\'\i}nez Mart{\'\i}nez",
  title =        "A context-centered methodology for {IoT} forensic
                 investigations",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "5",
  pages =        "647--673",
  month =        oct,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00523-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Aug 14 05:33:52 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00523-6",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Chen:2021:PAS,
  author =       "Liqun Chen and Kaibin Huang and Mark Manulis and
                 Venkkatesh Sekar",
  title =        "Password-authenticated searchable encryption",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "5",
  pages =        "675--693",
  month =        oct,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00524-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Aug 14 05:33:52 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00524-5;
                 http://link.springer.com/content/pdf/10.1007/s10207-020-00524-5.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Sicari:2021:ABE,
  author =       "Sabrina Sicari and Alessandra Rizzardi and Gianluca
                 Dini and Pericle Perazzo and Michele {La Manna} and
                 Alberto Coen-Porisini",
  title =        "Attribute-based encryption and sticky policies for
                 data access control in a smart home scenario: a
                 comparison on networked smart object middleware",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "5",
  pages =        "695--713",
  month =        oct,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00526-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Aug 14 05:33:52 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00526-3;
                 http://link.springer.com/content/pdf/10.1007/s10207-020-00526-3.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Borges:2021:EPP,
  author =       "Ricard Borges and Francesc Seb{\'e}",
  title =        "An efficient privacy-preserving pay-by-phone system
                 for regulated parking areas",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "5",
  pages =        "715--727",
  month =        oct,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00527-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Aug 14 05:33:52 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00527-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Miyahara:2021:ECB,
  author =       "Daiki Miyahara and Itaru Ueda and Yu-ichi Hayashi and
                 Takaaki Mizuki and Hideaki Sone",
  title =        "Evaluating card-based protocols in terms of execution
                 time",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "5",
  pages =        "729--740",
  month =        oct,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00525-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Aug 14 05:33:52 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00525-4;
                 http://link.springer.com/content/pdf/10.1007/s10207-020-00525-4.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Menges:2021:DDI,
  author =       "Florian Menges and Benedikt Putz and G{\"u}nther
                 Pernul",
  title =        "{DEALER}: decentralized incentives for threat
                 intelligence reporting and exchange",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "5",
  pages =        "741--761",
  month =        oct,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00528-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Aug 14 05:33:52 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00528-1;
                 http://link.springer.com/content/pdf/10.1007/s10207-020-00528-1.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Granese:2021:EMP,
  author =       "Federica Granese and Daniele Gorla and Catuscia
                 Palamidessi",
  title =        "Enhanced models for privacy and utility in
                 continuous-time diffusion networks",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "5",
  pages =        "763--782",
  month =        oct,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00530-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Aug 14 05:33:52 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00530-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Josephlal:2021:EIR,
  author =       "Edwin Franco Myloth Josephlal and Sridhar Adepu and
                 Zheng Yang and Jianying Zhou",
  title =        "Enabling isolation and recovery in {PLC} redundancy
                 framework of metro train systems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "6",
  pages =        "783--795",
  month =        dec,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00529-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Oct 19 09:44:52 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00529-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Alecakir:2021:ATI,
  author =       "Huseyin Alecakir and Burcu Can and Sevil Sen",
  title =        "Attention: there is an inconsistency between {Android}
                 permissions and application metadata!",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "6",
  pages =        "797--815",
  month =        dec,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00536-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Oct 19 09:44:52 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00536-1",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Murvay:2021:SCA,
  author =       "Pal-Stefan Murvay and Lucian Popa and Bogdan Groza",
  title =        "Securing the controller area network with covert
                 voltage channels",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "6",
  pages =        "817--831",
  month =        dec,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00532-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Oct 19 09:44:52 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00532-5",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Imamura:2021:WAM,
  author =       "Yuta Imamura and Rintaro Orito and Hiroyuki Uekawa and
                 Kritsana Chaikaew and Pattara Leelaprute and Masaya
                 Sato and Toshihiro Yamauchi",
  title =        "{Web} access monitoring mechanism via {Android
                 WebView} for threat analysis",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "6",
  pages =        "833--847",
  month =        dec,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00534-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Oct 19 09:44:52 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00534-3;
                 http://link.springer.com/content/pdf/10.1007/s10207-020-00534-3.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Yankson:2021:CIP,
  author =       "Benjamin Yankson",
  title =        "Continuous improvement process ({CIP})-based
                 privacy-preserving framework for smart connected toys",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "6",
  pages =        "849--869",
  month =        dec,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00535-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Oct 19 09:44:52 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-020-00535-2",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Cianciullo:2021:OCD,
  author =       "Louis Cianciullo and Hossein Ghodosi",
  title =        "Outsourced cheating detection for secret sharing",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "6",
  pages =        "871--878",
  month =        dec,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-021-00538-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Oct 19 09:44:52 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-021-00538-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bonte:2021:THM,
  author =       "Charlotte Bonte and Nigel P. Smart and Titouan
                 Tanguy",
  title =        "Thresholdizing {HashEdDSA}: {MPC} to the Rescue",
  journal =      j-INT-J-INFO-SEC,
  volume =       "20",
  number =       "6",
  pages =        "879--894",
  month =        dec,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-021-00539-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Tue Oct 19 09:44:52 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "http://link.springer.com/article/10.1007/s10207-021-00539-6",
  abstract =     "Following recent comments in a NIST document related
                 to threshold cryptographic standards, we examine the
                 case of thresholdizing the HashEdDSA signature scheme.
                 This is a deterministic signature scheme based on
                 Edwards elliptic curves. Unlike DSA, it has a
                 Schnorr-like signature equation, which is an advantage
                 for threshold implementations, but it has the
                 disadvantage of having the ephemeral secret obtained by
                 hashing the secret key and the message. We show that
                 one can obtain relatively efficient implementations of
                 threshold HashEdDSA with no modifications to the
                 behaviour of the signing algorithm; we achieve this
                 using a doubly authenticated bit (daBit) generation
                 protocol tailored for $ Q_2 $ access structures that is
                 more efficient than prior work. However, if one was to
                 modify the standard algorithm to use an MPC-friendly
                 hash function, such as Rescue, the performance becomes
                 very fast indeed.",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kim:2022:DAD,
  author =       "Hee Yeon Kim and Ji Hoon Kim and Kyounggon Kim",
  title =        "{DAPP}: automatic detection and analysis of prototype
                 pollution vulnerability in \pkg{Node.js} modules",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "1",
  pages =        "1--23",
  month =        feb,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00537-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Mon Feb 14 11:57:44 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-020-00537-0",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Shin:2022:NSS,
  author =       "Hansub Shin and Sungyong Sim and Younho Lee",
  title =        "A new smart smudge attack using {CNN}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "1",
  pages =        "25--36",
  month =        feb,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-021-00540-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Mon Feb 14 11:57:44 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-021-00540-z",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Stergiopoulos:2022:AAA,
  author =       "George Stergiopoulos and Panagiotis Dedousis and
                 Dimitris Gritzalis",
  title =        "Automatic analysis of attack graphs for risk
                 mitigation and prioritization on large-scale and
                 complex networks in {Industry 4.0}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "1",
  pages =        "37--59",
  month =        feb,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00533-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Mon Feb 14 11:57:44 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-020-00533-4",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Lyvas:2022:MME,
  author =       "Christos Lyvas and Christoforos Ntantogian and
                 Christos Xenakis",
  title =        "\pkg{[m]allotROPism}: a metamorphic engine for
                 malicious software variation development",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "1",
  pages =        "61--78",
  month =        feb,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-021-00541-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Mon Feb 14 11:57:44 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-021-00541-y",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Sheikhalishahi:2022:PPD,
  author =       "Mina Sheikhalishahi and Andrea Saracino and Antonio
                 {La Marra}",
  title =        "Privacy preserving data sharing and analysis for
                 edge-based architectures",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "1",
  pages =        "79--101",
  month =        feb,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-021-00542-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Mon Feb 14 11:57:44 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-021-00542-x",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Braeken:2022:PKV,
  author =       "An Braeken",
  title =        "Public key versus symmetric key cryptography in
                 client--server authentication protocols",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "1",
  pages =        "103--114",
  month =        feb,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-021-00543-w",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Mon Feb 14 11:57:44 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-021-00543-w",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Yaacoub:2022:RCS,
  author =       "Jean-Paul A. Yaacoub and Hassan N. Noura and Ali
                 Chehab",
  title =        "Robotics cyber security: vulnerabilities, attacks,
                 countermeasures, and recommendations",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "1",
  pages =        "115--158",
  month =        feb,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-021-00545-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Mon Feb 14 11:57:44 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-021-00545-8",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Anonymous:2022:TS,
  author =       "Anonymous",
  title =        "Track for surveys",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "1",
  pages =        "159--159",
  month =        feb,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-021-00546-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Mon Feb 14 11:57:44 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-021-00546-7",
  acknowledgement = ack-nhfb,
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Yichiet:2022:SAL,
  author =       "Aun Yichiet and Yen-Min Jasmina Khaw and Vasaki
                 Ponnusamy",
  title =        "A semantic-aware log generation method for network
                 activities",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "2",
  pages =        "161--177",
  month =        apr,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-021-00547-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Thu Mar 24 07:43:45 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-021-00547-6",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Tommasi:2022:BMB,
  author =       "Franco Tommasi and Christian Catalano and Ivan
                 Taurino",
  title =        "{Browser-in-the-Middle (BitM)} attack",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "2",
  pages =        "179--189",
  month =        apr,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-021-00548-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Thu Mar 24 07:43:45 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-021-00548-5",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Melo:2022:IAI,
  author =       "Roberto Vasconcelos Melo and Douglas D. J. de Macedo
                 and Mauricio Martinuzzi Fiorenza",
  title =        "{ISM-AC}: an immune security model based on alert
                 correlation and software-defined networking",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "2",
  pages =        "191--205",
  month =        apr,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-021-00550-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Thu Mar 24 07:43:45 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-021-00550-x",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Hougaard:2022:ALO,
  author =       "Hector B. Hougaard and Atsuko Miyaji",
  title =        "Authenticated logarithmic-order supersingular isogeny
                 group key exchange",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "2",
  pages =        "207--221",
  month =        apr,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-021-00549-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Thu Mar 24 07:43:45 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-021-00549-4",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Munonye:2022:MLA,
  author =       "Kindson Munonye and Martinek P{\'e}ter",
  title =        "Machine learning approach to vulnerability detection
                 in {OAuth 2.0} authentication and authorization flow",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "2",
  pages =        "223--237",
  month =        apr,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-021-00551-w",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Thu Mar 24 07:43:45 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-021-00551-w",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Yildirim:2022:MIT,
  author =       "Metehan Yildirim and Emin Anarim",
  title =        "Mitigating insider threat by profiling users based on
                 mouse usage pattern: ensemble learning and frequency
                 domain analysis",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "2",
  pages =        "239--251",
  month =        apr,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-021-00544-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Thu Mar 24 07:43:45 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-021-00544-9",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bajic:2022:ABN,
  author =       "Alexander Bajic and Georg T. Becker",
  title =        "Automated benchmark network diversification for
                 realistic attack simulation with application to moving
                 target defense",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "2",
  pages =        "253--278",
  month =        apr,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-021-00552-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Thu Mar 24 07:43:45 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-021-00552-9",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Mimura:2022:ANT,
  author =       "Mamoru Mimura and Ryo Ito",
  title =        "Applying {NLP} techniques to malware detection in a
                 practical environment",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "2",
  pages =        "279--291",
  month =        apr,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-021-00553-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Thu Mar 24 07:43:45 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-021-00553-8",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Erdodi:2022:AWM,
  author =       "L{\'a}szl{\'o} Erd{\H{o}}di and Fabio Massimo
                 Zennaro",
  title =        "The {Agent Web Model}: modeling web hacking for
                 reinforcement learning",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "2",
  pages =        "293--309",
  month =        apr,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-021-00554-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Thu Mar 24 07:43:45 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-021-00554-7",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Lee:2022:SPM,
  author =       "Junwon Lee and Heejo Lee",
  title =        "An {SSH} predictive model using machine learning with
                 web proxy session logs",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "2",
  pages =        "311--322",
  month =        apr,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-021-00555-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Thu Mar 24 07:43:45 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-021-00555-6",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Hadjadj:2022:OPF,
  author =       "Taha Elamine Hadjadj and Adel Bouhoula and Riadh
                 Ksantini",
  title =        "Optimization of parallel firewalls filtering rules",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "2",
  pages =        "323--340",
  month =        apr,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-021-00557-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Thu Mar 24 07:43:45 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-021-00557-4",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Zhang:2022:THG,
  author =       "Zheng Zhang and Shaohao Xie and Fangguo Zhang",
  title =        "Topology-hiding garbled circuits without universal
                 circuits",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "2",
  pages =        "341--356",
  month =        apr,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-021-00556-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Thu Mar 24 07:43:45 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-021-00556-5",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kazoleas:2022:NMR,
  author =       "Ioannis Kazoleas and Panagiotis Karampelas",
  title =        "A novel malicious remote administration tool using
                 stealth and self-defense techniques",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "2",
  pages =        "357--378",
  month =        apr,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-021-00559-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Thu Mar 24 07:43:45 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-021-00559-2",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Ahmad:2022:EAC,
  author =       "Tahir Ahmad and Umberto Morelli and Nicola Zannone",
  title =        "Extending access control in {AWS} {IoT} through
                 event-driven functions: an experimental evaluation
                 using a smart lock system",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "2",
  pages =        "379--408",
  month =        apr,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-021-00558-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Thu Mar 24 07:43:45 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-021-00558-3",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Parish:2022:PGU,
  author =       "Zach Parish and Connor Cushing and Julie Thorpe",
  title =        "Password guessers under a microscope: an in-depth
                 analysis to inform deployments",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "2",
  pages =        "409--425",
  month =        apr,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-021-00560-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Thu Mar 24 07:43:45 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-021-00560-9",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Bhattacharjya:2022:EVS,
  author =       "Sairath Bhattacharjya and Hossein Saiedian",
  title =        "Establishing and validating secured keys for {IoT}
                 devices: using {P3} connection model on a cloud-based
                 architecture",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "3",
  pages =        "427--436",
  month =        jun,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-021-00562-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat May 28 06:50:21 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-021-00562-7",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Spence:2022:SBC,
  author =       "Aaron Spence and Shaun Bangay",
  title =        "Security beyond cybersecurity: side-channel attacks
                 against non-cyber systems and their countermeasures",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "3",
  pages =        "437--453",
  month =        jun,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-021-00563-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat May 28 06:50:21 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-021-00563-6",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Park:2022:EDP,
  author =       "Cheolhee Park and Dowon Hong and Changho Seo",
  title =        "Evaluating differentially private decision tree model
                 over model inversion attack",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "3",
  pages =        "1--14",
  month =        jun,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-021-00564-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat May 28 06:50:21 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-021-00564-5",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Alghamdi:2022:NTA,
  author =       "Saleh A. Alghamdi",
  title =        "Novel trust-aware intrusion detection and prevention
                 system for {5G} {MANET-Cloud}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "3",
  pages =        "469--488",
  month =        jun,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-020-00531-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat May 28 06:50:21 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-020-00531-6",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Ghorbel:2022:APP,
  author =       "Amal Ghorbel and Mahmoud Ghorbel and Mohamed Jmaiel",
  title =        "Accountable privacy preserving attribute-based access
                 control for cloud services enforced using blockchain",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "3",
  pages =        "489--508",
  month =        jun,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-021-00565-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat May 28 06:50:21 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-021-00565-4",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Zhang:2022:RLA,
  author =       "Lu Zhang and Arie Taal and Paola Grosso",
  title =        "A risk-level assessment system based on the
                 {STRIDE\slash DREAD} model for digital data
                 marketplaces",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "3",
  pages =        "509--525",
  month =        jun,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-021-00566-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat May 28 06:50:21 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-021-00566-3",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Singh:2022:IAM,
  author =       "Jaya Singh and Ayush Sinha and Om Prakash Vyas",
  title =        "Insider attack mitigation in a smart metering
                 infrastructure using reputation score and blockchain
                 technology",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "3",
  pages =        "527--546",
  month =        jun,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-021-00561-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat May 28 06:50:21 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-021-00561-8",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Soltani:2022:CBD,
  author =       "Mahdi Soltani and Mahdi Jafari Siavoshani and Amir
                 Hossein Jahangir",
  title =        "A content-based deep intrusion detection system",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "3",
  pages =        "547--562",
  month =        jun,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-021-00567-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat May 28 06:50:21 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-021-00567-2",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Tiplea:2022:NPD,
  author =       "Ferucio Laurentiu Tiplea",
  title =        "Narrow privacy and desynchronization in {Vaudenay}'s
                 {RFID} model",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "3",
  pages =        "563--575",
  month =        jun,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-021-00569-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat May 28 06:50:21 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-021-00569-0",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Khan:2022:PAK,
  author =       "Haibat Khan and Benjamin Dowling and Keith M. Martin",
  title =        "Pragmatic authenticated key agreement for {IEEE Std
                 802.15.6}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "3",
  pages =        "577--595",
  month =        jun,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-021-00570-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat May 28 06:50:21 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-021-00570-7",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Potteiger:2022:DSR,
  author =       "Bradley Potteiger and Feiyang Cai and Xenofon
                 Koutsoukos",
  title =        "Data space randomization for securing cyber-physical
                 systems",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "3",
  pages =        "597--610",
  month =        jun,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-021-00568-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat May 28 06:50:21 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-021-00568-1",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Amraoui:2022:ABD,
  author =       "Noureddine Amraoui and Belhassen Zouari",
  title =        "Anomalous behavior detection-based approach for
                 authenticating smart home system users",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "3",
  pages =        "611--636",
  month =        jun,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-021-00571-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat May 28 06:50:21 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-021-00571-6",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Shah:2022:MLO,
  author =       "Ankit Shah and Rajesh Ganesan and Hasan Cam",
  title =        "Maintaining the level of operational effectiveness of
                 a {CSOC} under adverse conditions",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "3",
  pages =        "637--651",
  month =        jun,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-021-00573-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat May 28 06:50:21 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-021-00573-4",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Zulfiqar:2022:TAR,
  author =       "Maryam Zulfiqar and Muhammad Umar Janjua and Jack W.
                 Stokes",
  title =        "Tracking adoption of revocation and cryptographic
                 features in {X.509} certificates",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "3",
  pages =        "653--668",
  month =        jun,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-021-00572-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat May 28 06:50:21 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-021-00572-5",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{DArco:2022:GWP,
  author =       "P. D'Arco and R. {De Prisco} and R. Zaccagnino",
  title =        "{Gossamer}: weaknesses and performance",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "3",
  pages =        "669--687",
  month =        jun,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-021-00575-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat May 28 06:50:21 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-021-00575-2",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Zhang:2022:DTA,
  author =       "Xiaokuan Zhang and Jihun Hamm and Yinqian Zhang",
  title =        "Defeating traffic analysis via differential privacy: a
                 case study on streaming traffic",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "3",
  pages =        "689--706",
  month =        jun,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-021-00574-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat May 28 06:50:21 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-021-00574-3",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Huszti:2022:SPB,
  author =       "Andrea Huszti and Szabolcs Kov{\'a}cs and Norbert
                 Ol{\'a}h",
  title =        "Scalable, password-based and threshold authentication
                 for smart homes",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "4",
  pages =        "707--723",
  month =        aug,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00578-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Fri Jul 29 14:41:26 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00578-7",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kim:2022:MPD,
  author =       "Jinsung Kim and Younghoon Ban and Jeong Hyun Yi",
  title =        "{MAPAS}: a practical deep learning-based {Android}
                 malware detection system",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "4",
  pages =        "725--738",
  month =        aug,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00579-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Fri Jul 29 14:41:26 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00579-6",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Zabihimayvan:2022:FLR,
  author =       "Mahdieh Zabihimayvan and Derek Doran",
  title =        "A first look at references from the dark to the
                 surface web world: a case study in {Tor}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "4",
  pages =        "739--755",
  month =        aug,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00580-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Fri Jul 29 14:41:26 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00580-z",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Koike:2022:IOH,
  author =       "Kazuki Koike and Ryotaro Kobayashi and Masahiko
                 Katoh",
  title =        "{IoT}-oriented high-efficient anti-malware hardware
                 focusing on time series metadata extractable from
                 inside a processor core",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "4",
  pages =        "1--19",
  month =        aug,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-021-00577-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Fri Jul 29 14:41:26 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-021-00577-0",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Karl:2022:DNI,
  author =       "Ryan Karl and Hannah Burchfield and Taeho Jung",
  title =        "Developing non-interactive {MPC} with trusted hardware
                 for enhanced security",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "4",
  pages =        "777--797",
  month =        aug,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00583-w",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Fri Jul 29 14:41:26 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00583-w",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Gong:2022:TDR,
  author =       "Qian Gong and Phil DeMar and Mine Altunay",
  title =        "{ThunderSecure}: deploying real-time intrusion
                 detection for {100G} research networks by leveraging
                 stream-based features and one-class classification
                 network",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "4",
  pages =        "799--812",
  month =        aug,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00584-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Fri Jul 29 14:41:26 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00584-9",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Zenitani:2022:MOC,
  author =       "Kengo Zenitani",
  title =        "A multi-objective cost-benefit optimization algorithm
                 for network hardening",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "4",
  pages =        "813--832",
  month =        aug,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00586-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Fri Jul 29 14:41:26 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00586-7",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Komano:2022:CBS,
  author =       "Yuichi Komano and Takaaki Mizuki",
  title =        "Coin-based Secure Computations",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "4",
  pages =        "833--846",
  month =        aug,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00585-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Fri Jul 29 14:41:26 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00585-8",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Saifuzzaman:2022:SLR,
  author =       "Munshi Saifuzzaman and Tajkia Nuri Ananna and Farida
                 Chowdhury",
  title =        "A systematic literature review on wearable health data
                 publishing under differential privacy",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "4",
  pages =        "847--872",
  month =        aug,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-021-00576-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Fri Jul 29 14:41:26 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-021-00576-1",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Agrawal:2022:SAE,
  author =       "Ankit Agrawal and Ashutosh Bhatia and Rekha Kaushik",
  title =        "A survey on analyzing encrypted network traffic of
                 mobile devices",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "4",
  pages =        "873--915",
  month =        aug,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00581-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Fri Jul 29 14:41:26 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00581-y",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Zia:2022:SIE,
  author =       "Unsub Zia and Mark McCartney and Ali Sajjad",
  title =        "Survey on image encryption techniques using chaotic
                 maps in spatial, transform and spatiotemporal domains",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "4",
  pages =        "917--935",
  month =        aug,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00588-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Fri Jul 29 14:41:26 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00588-5",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Tan:2022:CPQ,
  author =       "Teik Guan Tan and Pawel Szalachowski and Jianying
                 Zhou",
  title =        "Challenges of post-quantum digital signing in
                 real-world applications: a survey",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "4",
  pages =        "937--952",
  month =        aug,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00587-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Fri Jul 29 14:41:26 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00587-6",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Park:2022:EVC,
  author =       "Jai Hyun Park and Jung Hee Cheon and Dongwoo Kim",
  title =        "Efficient verifiable computation over quotient
                 polynomial rings",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "5",
  pages =        "953--971",
  month =        oct,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00590-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Sep 24 10:44:14 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00590-x",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Lyvas:2022:EIS,
  author =       "Christos Lyvas and Costas Lambrinoudakis and Dimitris
                 Geneiatakis",
  title =        "\pkg{IntentAuth}: Securing {Android}'s intent-based
                 inter-process communication",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "5",
  pages =        "973--982",
  month =        oct,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00592-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Sep 24 10:44:14 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00592-9",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Singh:2022:DAI,
  author =       "Ram Govind Singh and Ananya Shrivastava and Sushmita
                 Ruj",
  title =        "A Digital Asset Inheritance Model to Convey Online
                 Persona Posthumously",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "5",
  pages =        "983--1003",
  month =        oct,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00593-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Sep 24 10:44:14 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00593-8",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Agostini:2022:BBM,
  author =       "E. Agostini and M. Bernaschi",
  title =        "{BitCracker}: {BitLocker} meets {GPUs}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "5",
  pages =        "1005--1018",
  month =        oct,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00589-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Sep 24 10:44:14 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00589-4",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Ahmim:2022:SAT,
  author =       "Ilyes Ahmim and Nacira Ghoualmi-Zine and Marwa Ahmim",
  title =        "Security analysis on ``{Three}-factor authentication
                 protocol using physical unclonable function for
                 {IoV}''",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "5",
  pages =        "1019--1026",
  month =        oct,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00595-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Sep 24 10:44:14 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00595-6",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Armour:2022:ASA,
  author =       "Marcel Armour and Bertram Poettering",
  title =        "Algorithm substitution attacks against receivers",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "5",
  pages =        "1027--1050",
  month =        oct,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00596-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Sep 24 10:44:14 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00596-5",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Camtepe:2022:ABC,
  author =       "Seyit Camtepe and Jarek Duda and Josef Pieprzyk",
  title =        "{ANS}-based compression and encryption with 128-bit
                 security",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "5",
  pages =        "1051--1067",
  month =        oct,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00597-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Sep 24 10:44:14 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00597-4",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Pericas-Gornals:2022:HPB,
  author =       "Rosa Peric{\`a}s-Gornals and Maci{\`a} Mut-Puigserver
                 and M. Magdalena Payeras-Capell{\`a}",
  title =        "Highly private blockchain-based management system for
                 digital {COVID-19} certificates",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "5",
  pages =        "1069--1090",
  month =        oct,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00598-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Sep 24 10:44:14 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00598-3",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Vlachos:2022:SOS,
  author =       "Vasileios Vlachos and Yannis C. Stamatiou and Sotiris
                 Nikoletseas",
  title =        "The {SAINT} observatory subsystem: an open-source
                 intelligence tool for uncovering cybersecurity
                 threats",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "5",
  pages =        "1091--1106",
  month =        oct,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00599-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Sep 24 10:44:14 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00599-2",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Cevik:2022:LAG,
  author =       "Beyza Cevik and Nur Altiparmak and Sevil Sen",
  title =        "{Lib2Desc}: automatic generation of security-centric
                 {Android} app descriptions using third-party
                 libraries",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "5",
  pages =        "1107--1125",
  month =        oct,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00601-x",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Sep 24 10:44:14 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00601-x",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Inayoshi:2022:VUT,
  author =       "Hiroki Inayoshi and Shohei Kakei and Shoichi Saito",
  title =        "Value-utilized taint propagation: toward precise
                 detection of apps' information flows across {Android}
                 {API} calls",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "5",
  pages =        "1127--1149",
  month =        oct,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00603-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Sep 24 10:44:14 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00603-9",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Borges:2022:AUE,
  author =       "Ricard Borges and Francesc Seb{\'e} and Magda Valls",
  title =        "An anonymous and unlinkable electronic toll collection
                 system",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "5",
  pages =        "1151--1162",
  month =        oct,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00604-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Sep 24 10:44:14 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00604-8",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Jeet:2022:SIP,
  author =       "Rabari Jeet and P. Arun Raj Kumar",
  title =        "A survey on interest packet flooding attacks and its
                 countermeasures in named data networking",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "5",
  pages =        "1163--1187",
  month =        oct,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00591-w",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Sep 24 10:44:14 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00591-w",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Syrmakesis:2022:CRA,
  author =       "Andrew D. Syrmakesis and Cristina Alcaraz and Nikos D.
                 Hatziargyriou",
  title =        "Classifying resilience approaches for protecting smart
                 grids against cyber threats",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "5",
  pages =        "1189--1210",
  month =        oct,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00594-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Sep 24 10:44:14 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00594-7",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Lygerou:2022:DHI,
  author =       "Irini Lygerou and Shreyas Srinivasa and Dimitris
                 Gritzalis",
  title =        "A decentralized honeypot for {IoT} Protocols based on
                 {Android} devices",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "6",
  pages =        "1211--1222",
  month =        dec,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00605-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Oct 15 16:48:15 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  note =         "See correction \cite{Lygerou:2023:CDH}.",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00605-7",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Fu:2022:CGP,
  author =       "Bingxue Fu and Xing Yu and Tao Feng",
  title =        "{CT-GCN}: a phishing identification model for
                 blockchain cryptocurrency transactions",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "6",
  pages =        "1223--1232",
  month =        dec,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00606-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Oct 15 16:48:15 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00606-6",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Templ:2022:SOM,
  author =       "Matthias Templ and Murat Sariyar",
  title =        "A systematic overview on methods to protect sensitive
                 data provided for various analyses",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "6",
  pages =        "1233--1246",
  month =        dec,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00607-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Oct 15 16:48:15 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00607-5",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kifouche:2022:DIN,
  author =       "Abdenour Kifouche and Mohamed Salah Azzaz and Remy
                 Kocik",
  title =        "Design and implementation of a new lightweight
                 chaos-based cryptosystem to secure {IoT}
                 communications",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "6",
  pages =        "1247--1262",
  month =        dec,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00609-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Oct 15 16:48:15 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00609-3",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Prajisha:2022:EID,
  author =       "C. Prajisha and A. R. Vasudevan",
  title =        "An efficient intrusion detection system for {MQTT-IoT}
                 using enhanced chaotic salp swarm algorithm and
                 {LightGBM}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "6",
  pages =        "1263--1282",
  month =        dec,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00611-9",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Oct 15 16:48:15 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00611-9",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Picazo-Sanchez:2022:CEC,
  author =       "Pablo Picazo-Sanchez and Lara Ortiz-Martin and Andrei
                 Sabelfeld",
  title =        "Are chrome extensions compliant with the spirit of
                 least privilege?",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "6",
  pages =        "1283--1297",
  month =        dec,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00610-w",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Oct 15 16:48:15 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00610-w",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Adewole:2022:DDL,
  author =       "Kayode S. Adewole and Vicen{\c{c}} Torra",
  title =        "{DFTMicroagg}: a dual-level anonymization algorithm
                 for smart grid data",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "6",
  pages =        "1299--1321",
  month =        dec,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00612-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Oct 15 16:48:15 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00612-8",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Skopik:2022:SDA,
  author =       "Florian Skopik and Arndt Bonitz and G{\"u}nter
                 G{\"o}hler",
  title =        "From scattered data to actionable knowledge: flexible
                 cyber security reporting in the military domain",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "6",
  pages =        "1323--1347",
  month =        dec,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00613-7",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Oct 15 16:48:15 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00613-7",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Torra:2022:PFP,
  author =       "Vicen{\c{c}} Torra and Edgar Galv{\'a}n and Guillermo
                 Navarro-Arribas",
  title =        "{PSO + FL = PAASO}: particle swarm optimization +
                 federated learning = privacy-aware agent swarm
                 optimization",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "6",
  pages =        "1349--1359",
  month =        dec,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00614-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Oct 15 16:48:15 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00614-6",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Yang:2022:SAI,
  author =       "Xiaodong Yang and Wenjia Wang and Caifen Wang",
  title =        "Security analysis and improvement of a
                 privacy-preserving authentication scheme in {VANET}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "6",
  pages =        "1361--1371",
  month =        dec,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00617-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Oct 15 16:48:15 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00617-3",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Abdussami:2022:LLA,
  author =       "Mohammad Abdussami and Ruhul Amin and Satyanarayana
                 Vollala",
  title =        "{LASSI}: a lightweight authenticated key agreement
                 protocol for fog-enabled {IoT} deployment",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "6",
  pages =        "1373--1387",
  month =        dec,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00619-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Oct 15 16:48:15 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00619-1",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kishore:2022:SPD,
  author =       "R. Kishore and I. Ioannou and A. Pitsillides",
  title =        "A security protocol for {D2D} communications in {5G}
                 networks using elliptic curve cryptography",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "6",
  pages =        "1389--1408",
  month =        dec,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00620-8",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Oct 15 16:48:15 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00620-8",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kumar:2022:SML,
  author =       "Raju Kumar and Aruna Bhat",
  title =        "A study of machine learning-based models for
                 detection, control, and mitigation of cyberbullying in
                 online social media",
  journal =      j-INT-J-INFO-SEC,
  volume =       "21",
  number =       "6",
  pages =        "1409--1431",
  month =        dec,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00600-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Sat Oct 15 16:48:15 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00600-y",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Sah:2023:IDS,
  author =       "Gulab Sah and Subhasish Banerjee and Sweety Singh",
  title =        "Intrusion detection system over real-time data traffic
                 using machine learning methods with feature selection
                 approaches",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "1",
  pages =        "1--27",
  month =        feb,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00616-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Fri Mar 17 09:48:22 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00616-4",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Picazo-Sanchez:2023:GIP,
  author =       "Pablo Picazo-Sanchez and Magnus Almgren",
  title =        "{Gridchain}: an investigation of privacy for the
                 future local distribution grid",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "1",
  pages =        "29--46",
  month =        feb,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00622-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Fri Mar 17 09:48:22 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00622-6",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Hannousse:2023:DLM,
  author =       "Abdelhakim Hannousse and Mohamed Cherif Nait-Hamoud
                 and Salima Yahiouche",
  title =        "A deep learner model for multi-language webshell
                 detection",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "1",
  pages =        "47--61",
  month =        feb,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00615-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Fri Mar 17 09:48:22 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00615-5",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Sangari:2023:MRD,
  author =       "Seema Sangari and Eric Dallal and Michael Whitman",
  title =        "Modeling reporting delays in cyber incidents: an
                 industry-level comparison",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "1",
  pages =        "63--76",
  month =        feb,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00623-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Fri Mar 17 09:48:22 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00623-5",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Rajic:2023:EWA,
  author =       "Branislav Raji{\'c} and Zarko Stanisavljevi{\'c} and
                 Pavle Vuleti{\'c}",
  title =        "Early web application attack detection using network
                 traffic analysis",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "1",
  pages =        "77--91",
  month =        feb,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00627-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Fri Mar 17 09:48:22 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00627-1",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Rathore:2023:RDL,
  author =       "Nemi Chandra Rathore and Somanath Tripathy",
  title =        "Restricting data-leakage using fine-grained access
                 control on {OSN} objects",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "1",
  pages =        "93--106",
  month =        feb,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00629-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Fri Mar 17 09:48:22 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00629-z",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Balikcioglu:2023:MCD,
  author =       "Pinar G. Balikcioglu and Melih Sirlanci and Ozge A.
                 Kucuk and Bulut Ulukapi and Ramazan K. Turkmen and
                 Cengiz Acarturk",
  title =        "Malicious code detection in {Android}: the role of
                 sequence characteristics and disassembling methods",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "1",
  pages =        "107--118",
  month =        feb,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00626-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Fri Mar 17 09:48:22 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00626-2",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Sharma:2023:NAD,
  author =       "Amit Sharma and Brij B. Gupta and Awadhesh Kumar Singh
                 and V. K. Saraswat",
  title =        "A novel approach for detection of {APT} malware using
                 multi-dimensional hybrid {Bayesian} belief network",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "1",
  pages =        "119--135",
  month =        feb,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00631-5",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Fri Mar 17 09:48:22 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00631-5",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Hamzenejadi:2023:MBD,
  author =       "Sajad Hamzenejadi and Mahdieh Ghazvini and
                 Seyedamiryousef Hosseini",
  title =        "Mobile botnet detection: a comprehensive survey",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "1",
  pages =        "137--175",
  month =        feb,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00624-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Fri Mar 17 09:48:22 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00624-4",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Rastogi:2023:RFN,
  author =       "Shubhangi Rastogi and Divya Bansal",
  title =        "A review on fake news detection {3T's}: typology, time
                 of detection, taxonomies",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "1",
  pages =        "177--212",
  month =        feb,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00625-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Fri Mar 17 09:48:22 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00625-3",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Suren:2023:PPA,
  author =       "Emre S{\"u}ren and Fredrik Heiding and Johannes
                 Oleg{\aa}rd and Robert Lagerstr{\"o}m",
  title =        "{PatrIoT}: practical and agile threat research for
                 {IoT}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "1",
  pages =        "213--233",
  month =        feb,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00633-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Fri Mar 17 09:48:22 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00633-3",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Mohamed:2023:DSB,
  author =       "Safa Mohamed and Ridha Ejbali",
  title =        "Deep {SARSA}-based reinforcement learning approach for
                 anomaly network intrusion detection system",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "1",
  pages =        "235--247",
  month =        feb,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00634-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Fri Mar 17 09:48:22 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00634-2",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Amro:2023:CRM,
  author =       "Ahmed Amro and Vasileios Gkioulos",
  title =        "Cyber risk management for autonomous passenger ships
                 using threat-informed defense-in-depth",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "1",
  pages =        "249--288",
  month =        feb,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00638-y",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Fri Mar 17 09:48:22 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00638-y",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Alawneh:2023:UIU,
  author =       "Luay Alawneh and Mohammad Al-Zinati and Mahmoud
                 Al-Ayyoub",
  title =        "User identification using deep learning and human
                 activity mobile sensor data",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "1",
  pages =        "289--301",
  month =        feb,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00640-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Fri Mar 17 09:48:22 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00640-4",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Lygerou:2023:CDH,
  author =       "Irini Lygerou and Shreyas Srinivasa and Emmanouil
                 Vasilomanolakis and George Stergiopoulos and Dimitris
                 Gritzalis",
  title =        "Correction to: {A decentralized honeypot for IoT
                 Protocols based on Android devices}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "1",
  pages =        "303--303",
  month =        feb,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00628-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Fri Mar 17 09:48:22 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  note =         "See \cite{Lygerou:2022:DHI}.",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00628-0",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{An:2023:HEL,
  author =       "Qin An and Wilson Cheong Hin Hong and XiaoShu Xu and
                 Yunfeng Zhang and Kimberly Kolletar-Zhu",
  title =        "How education level influences {Internet} security
                 knowledge, behaviour, and attitude: a comparison among
                 undergraduates, postgraduates and working graduates",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "2",
  pages =        "305--317",
  month =        apr,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00637-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Fri Mar 17 09:48:23 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00637-z",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Kuzlu:2023:ASM,
  author =       "Murat Kuzlu and Ferhat Ozgur Catak and Umit Cali and
                 Evren Catak and Ozgur Guler",
  title =        "Adversarial security mitigations of {mmWave}
                 beamforming prediction models using defensive
                 distillation and adversarial retraining",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "2",
  pages =        "319--332",
  month =        apr,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00644-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Fri Mar 17 09:48:23 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00644-0",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Swati:2023:DAD,
  author =       "Swati and Sangita Roy and Jawar Singh and Jimson
                 Mathew",
  title =        "Design and analysis of {DDoS} mitigating network
                 architecture",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "2",
  pages =        "333--345",
  month =        apr,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00635-1",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Fri Mar 17 09:48:23 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00635-1",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Chatzoglou:2023:RQA,
  author =       "Efstratios Chatzoglou and Vasileios Kouliaridis and
                 Georgios Karopoulos and Georgios Kambourakis",
  title =        "Revisiting {QUIC} attacks: a comprehensive review on
                 {QUIC} security and a hands-on study",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "2",
  pages =        "347--365",
  month =        apr,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00630-6",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Fri Mar 17 09:48:23 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00630-6",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Mohammadi:2023:HML,
  author =       "Reza Mohammadi and Chhagan Lal and Mauro Conti",
  title =        "{HTTPScout}: a Machine Learning based Countermeasure
                 for {HTTP} Flood Attacks in {SDN}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "2",
  pages =        "367--379",
  month =        apr,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00641-3",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Fri Mar 17 09:48:23 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00641-3",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Andriotis:2023:BDU,
  author =       "Panagiotis Andriotis and Myles Kirby and Atsuhiro
                 Takasu",
  title =        "\pkg{Bu-Dash}: a universal and dynamic graphical
                 password scheme (extended version)",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "2",
  pages =        "381--401",
  month =        apr,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00642-2",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Fri Mar 17 09:48:23 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00642-2",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Mishra:2023:SSU,
  author =       "Kailash Chandra Mishra and Subrata Dutta",
  title =        "A simple and secure user authentication scheme using
                 {Map Street View} with usability analysis based on
                 {ISO\slash IEC 25022}",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "2",
  pages =        "403--415",
  month =        apr,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00636-0",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Fri Mar 17 09:48:23 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00636-0",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Gandhi:2023:TUS,
  author =       "Kapilan Kulayan Arumugam Gandhi and Chamundeswari
                 Arumugam",
  title =        "Toward a unified and secure approach for extraction of
                 forensic digital evidence from an {IoT} device",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "2",
  pages =        "417--431",
  month =        apr,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00645-z",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Fri Mar 17 09:48:23 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
  URL =          "https://link.springer.com/article/10.1007/s10207-022-00645-z",
  acknowledgement = ack-nhfb,
  ajournal =     "Int. J. Info. Sci.",
  fjournal =     "International Journal of Information Security",
  journal-URL =  "https://link.springer.com/journal/10207",
}

@Article{Zhou:2023:IDA,
  author =       "Hanxun Zhou and Longyu Kang and Hong Pan and Guo Wei
                 and Yong Feng",
  title =        "An intrusion detection approach based on incremental
                 long short-term memory",
  journal =      j-INT-J-INFO-SEC,
  volume =       "22",
  number =       "2",
  pages =        "433--446",
  month =        apr,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s10207-022-00632-4",
  ISSN =         "1615-5262 (print), 1615-5270 (electronic)",
  ISSN-L =       "1615-5262",
  bibdate =      "Fri Mar 17 09:48:23 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib