@Preamble{
"\ifx \undefined \booktitle \def \booktitle#1{{{\em #1}}} \fi" #
"\ifx \undefined \pkg \def \pkg #1{{{\tt #1}}} \fi"
}
@String{ack-nhfb = "Nelson H. F. Beebe,
University of Utah,
Department of Mathematics, 110 LCB,
155 S 1400 E RM 233,
Salt Lake City, UT 84112-0090, USA,
Tel: +1 801 581 5254,
FAX: +1 801 581 4148,
e-mail: \path|beebe@math.utah.edu|,
\path|beebe@acm.org|,
\path|beebe@computer.org| (Internet),
URL: \path|https://www.math.utah.edu/~beebe/|"}
@String{j-INT-J-INFO-SEC = "International Journal of Information
Security"}
@Article{Gollman:2001:E,
author = "Dieter Gollman and Catherine A. Meadows and Eiji
Okamoto",
title = "Editorial",
journal = j-INT-J-INFO-SEC,
volume = "1",
number = "1",
pages = "1--2",
month = aug,
year = "2001",
CODEN = "????",
DOI = "https://doi.org/10.1007/s102070100004",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:21 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s102070100004",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Landwehr:2001:CS,
author = "Carl E. Landwehr",
title = "Computer security",
journal = j-INT-J-INFO-SEC,
volume = "1",
number = "1",
pages = "3--13",
month = aug,
year = "2001",
CODEN = "????",
DOI = "https://doi.org/10.1007/s102070100003",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:21 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s102070100003",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{McHugh:2001:IID,
author = "John McHugh",
title = "Intrusion and intrusion detection",
journal = j-INT-J-INFO-SEC,
volume = "1",
number = "1",
pages = "14--35",
month = aug,
year = "2001",
CODEN = "????",
DOI = "https://doi.org/10.1007/s102070100001",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:21 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s102070100001",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Johnson:2001:ECD,
author = "Don Johnson and Alfred Menezes and Scott Vanstone",
title = "The {Elliptic Curve Digital Signature Algorithm
(ECDSA)}",
journal = j-INT-J-INFO-SEC,
volume = "1",
number = "1",
pages = "36--63",
month = aug,
year = "2001",
CODEN = "????",
DOI = "https://doi.org/10.1007/s102070100002",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:21 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s102070100002",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Blundo:2001:PDI,
author = "Carlo Blundo and Paolo D'Arco and Alfredo {De
Santis}",
title = "A $t$-private $k$-database information retrieval
scheme",
journal = j-INT-J-INFO-SEC,
volume = "1",
number = "1",
pages = "64--68",
month = aug,
year = "2001",
CODEN = "????",
DOI = "https://doi.org/10.1007/s102070100005",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:21 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s102070100005",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Monrose:2002:PHB,
author = "Fabian Monrose and Michael K. Reiter and Susanne
Wetzel",
title = "Password hardening based on keystroke dynamics",
journal = j-INT-J-INFO-SEC,
volume = "1",
number = "2",
pages = "69--83",
month = feb,
year = "2002",
CODEN = "????",
DOI = "https://doi.org/10.1007/s102070100006",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:21 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s102070100006",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Rodeh:2002:UAT,
author = "Ohad Rodeh and Kenneth P. Birman and Danny Dolev",
title = "Using {AVL} trees for fault-tolerant group key
management",
journal = j-INT-J-INFO-SEC,
volume = "1",
number = "2",
pages = "84--99",
month = feb,
year = "2002",
CODEN = "????",
DOI = "https://doi.org/10.1007/s102070100008",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:21 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s102070100008",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Damiani:2002:SSS,
author = "E. Damiani and S. {De Capitani di Vimercati} and S.
Paraboschi and P. Samarati",
title = "Securing {SOAP} e-services",
journal = j-INT-J-INFO-SEC,
volume = "1",
number = "2",
pages = "100--115",
month = feb,
year = "2002",
CODEN = "????",
DOI = "https://doi.org/10.1007/s102070100009",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:21 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s102070100009",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Kudo:2002:PPB,
author = "Michiharu Kudo",
title = "{PBAC}: Provision-based access control model",
journal = j-INT-J-INFO-SEC,
volume = "1",
number = "2",
pages = "116--130",
month = feb,
year = "2002",
CODEN = "????",
DOI = "https://doi.org/10.1007/s102070100010",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:21 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s102070100010",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Mizuki:2002:CCF,
author = "Takaaki Mizuki and Hiroki Shizuya and Takao
Nishizeki",
title = "A complete characterization of a family of key
exchange protocols",
journal = j-INT-J-INFO-SEC,
volume = "1",
number = "2",
pages = "131--142",
month = feb,
year = "2002",
CODEN = "????",
DOI = "https://doi.org/10.1007/s102070100011",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:21 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s102070100011",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Steinwandt:2002:APB,
author = "Rainer Steinwandt and Willi Geiselmann and Regine
Endsuleit",
title = "Attacking a polynomial-based cryptosystem: {Polly}
Cracker",
journal = j-INT-J-INFO-SEC,
volume = "1",
number = "3",
pages = "143--148",
month = nov,
year = "2002",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-002-0012-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:21 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-002-0012-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Itakura:2002:PPI,
author = "Yukio Itakura and Masaki Hashiyada and Toshio
Nagashima and Shigeo Tsujii",
title = "Proposal on personal identifiers generated from the
{STR} information of {DNA}",
journal = j-INT-J-INFO-SEC,
volume = "1",
number = "3",
pages = "149--160",
month = nov,
year = "2002",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-002-0013-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:21 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-002-0013-1",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Nieto:2002:KRC,
author = "J. M. Gonz{\'a}les Nieto and K. Viswanathan and C.
Boyd and A. Clark and E. Dawson",
title = "Key recovery for the commercial environment",
journal = j-INT-J-INFO-SEC,
volume = "1",
number = "3",
pages = "161--174",
month = nov,
year = "2002",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-002-0014-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:21 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-002-0014-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Kim:2002:NEC,
author = "S. Kim and H. Oh",
title = "A new electronic check system with reusable refunds",
journal = j-INT-J-INFO-SEC,
volume = "1",
number = "3",
pages = "175--188",
month = nov,
year = "2002",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-002-0015-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:21 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-002-0015-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Dawson:2002:CCP,
author = "Ed Dawson and Kapali Viswanathan and Colin Boyd",
title = "Compliant cryptologic protocols",
journal = j-INT-J-INFO-SEC,
volume = "1",
number = "3",
pages = "189--202",
month = nov,
year = "2002",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-002-0016-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:21 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-002-0016-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Korzhik:2003:HAB,
author = "Valery Korzhik and Guillermo Morales-Luna",
title = "Hybrid authentication based on noisy channels",
journal = j-INT-J-INFO-SEC,
volume = "1",
number = "4",
pages = "203--210",
month = jul,
year = "2003",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-002-0017-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:22 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-002-0017-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Ruan:2003:FGB,
author = "Chun Ruan and Vijay Varadharajan",
title = "A formal graph based framework for supporting
authorization delegations and conflict resolutions",
journal = j-INT-J-INFO-SEC,
volume = "1",
number = "4",
pages = "211--222",
month = jul,
year = "2003",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-003-0018-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:22 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-003-0018-4",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Kremer:2003:FMP,
author = "Steve Kremer and Olivier Markowitch",
title = "Fair multi-party non-repudiation protocols",
journal = j-INT-J-INFO-SEC,
volume = "1",
number = "4",
pages = "223--235",
month = jul,
year = "2003",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-003-0019-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:22 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-003-0019-3",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Carminati:2003:MAC,
author = "Barbara Carminati and Elena Ferrari",
title = "Management of access control policies for {XML}
document sources",
journal = j-INT-J-INFO-SEC,
volume = "1",
number = "4",
pages = "236--260",
month = jul,
year = "2003",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-003-0020-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:22 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-003-0020-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{MacKenzie:2003:NCD,
author = "Philip MacKenzie and Michael K. Reiter",
title = "Networked cryptographic devices resilient to capture",
journal = j-INT-J-INFO-SEC,
volume = "2",
number = "1",
pages = "1--20",
month = nov,
year = "2003",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-003-0022-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:22 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-003-0022-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Gurgens:2003:ACP,
author = "Sigrid G{\"u}rgens and Javier Lopez and Ren{\'e}
Peralta",
title = "Analysis of e-commerce protocols: Adapting a
traditional technique",
journal = j-INT-J-INFO-SEC,
volume = "2",
number = "1",
pages = "21--36",
month = nov,
year = "2003",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-003-0021-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:22 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-003-0021-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Baek:2003:ZSP,
author = "Joonsang Baek and Yuliang Zheng",
title = "{Zheng} and {Seberry}'s public key encryption scheme
revisited",
journal = j-INT-J-INFO-SEC,
volume = "2",
number = "1",
pages = "37--44",
month = nov,
year = "2003",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-003-0023-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:22 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-003-0023-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Bertino:2003:CBF,
author = "Elisa Bertino and Elena Ferrari and Andrea Perego",
title = "Content-based filtering of {Web} documents: the {MaX}
system and the {EUFORBIA} project",
journal = j-INT-J-INFO-SEC,
volume = "2",
number = "1",
pages = "45--58",
month = nov,
year = "2003",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-003-0024-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:22 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-003-0024-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Geiselmann:2003:AIP,
author = "Willi Geiselmann and Willi Meier and Rainer
Steinwandt",
title = "An attack on the isomorphisms of polynomials problem
with one secret",
journal = j-INT-J-INFO-SEC,
volume = "2",
number = "1",
pages = "59--64",
month = nov,
year = "2003",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-003-0025-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:22 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-003-0025-5",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Dawson:2004:PSI,
author = "E. Dawson",
title = "Preface to the special issue on {PKI}",
journal = j-INT-J-INFO-SEC,
volume = "2",
number = "2",
pages = "65--65",
month = jan,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-003-0031-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:22 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-003-0031-7;
http://link.springer.com/content/pdf/10.1007/s10207-003-0031-7.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Blakley:2004:ASN,
author = "B. Blakley and G. R. Blakley",
title = "All sail, no anchor {II}: Acceptable high-end {PKI}",
journal = j-INT-J-INFO-SEC,
volume = "2",
number = "2",
pages = "66--77",
month = jan,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-003-0029-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:22 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-003-0029-1",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Russell:2004:TBR,
author = "Selwyn Russell",
title = "Theory and benefits of recursive certificate
structures",
journal = j-INT-J-INFO-SEC,
volume = "2",
number = "2",
pages = "78--90",
month = jan,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-003-0028-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:22 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-003-0028-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Lopez:2004:PDB,
author = "Javier Lopez and Antonio Ma{\~n}a and Jose A.
Montenegro and Juan J. Ortega",
title = "{PKI} design based on the use of on-line certification
authorities",
journal = j-INT-J-INFO-SEC,
volume = "2",
number = "2",
pages = "91--102",
month = jan,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-003-0027-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:22 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-003-0027-3",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Laih:2004:GVR,
author = "C. S. Laih and K. Y. Chen",
title = "Generating visible {RSA} public keys for {PKI}",
journal = j-INT-J-INFO-SEC,
volume = "2",
number = "2",
pages = "103--109",
month = jan,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-003-0030-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:22 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-003-0030-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Munoz:2004:CRS,
author = "Jose L. Mu{\~n}oz and Jordi Forne and Oscar Esparza
and Miguel Soriano",
title = "Certificate revocation system implementation based on
the {Merkle} hash tree",
journal = j-INT-J-INFO-SEC,
volume = "2",
number = "2",
pages = "110--124",
month = jan,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-003-0026-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:22 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/hash.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-003-0026-4",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Priami:2004:PSI,
author = "Corrado Priami",
title = "Preface to the special issue on {Security in Global
Computing}",
journal = j-INT-J-INFO-SEC,
volume = "2",
number = "3--4",
pages = "125--125",
month = aug,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-004-0034-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:23 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-004-0034-z;
http://link.springer.com/content/pdf/10.1007/s10207-004-0034-z.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Teller:2004:UAC,
author = "David Teller and Pascal Zimmer and Daniel Hirschkoff",
title = "Using ambients to control resources",
journal = j-INT-J-INFO-SEC,
volume = "2",
number = "3--4",
pages = "126--144",
month = aug,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-004-0035-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:23 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-004-0035-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Buchholtz:2004:CCF,
author = "Mikael Buchholtz and Hanne Riis Nielson and Flemming
Nielson",
title = "A calculus for control flow analysis of security
protocols",
journal = j-INT-J-INFO-SEC,
volume = "2",
number = "3--4",
pages = "145--167",
month = aug,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-004-0036-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:23 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-004-0036-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Gorrieri:2004:AAT,
author = "Roberto Gorrieri and Ruggero Lanotte and Andrea
Maggiolo-Schettini and Fabio Martinelli and Simone Tini
and Enrico Tronci",
title = "Automated analysis of timed security: a case study on
web privacy",
journal = j-INT-J-INFO-SEC,
volume = "2",
number = "3--4",
pages = "168--186",
month = aug,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-004-0037-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:23 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-004-0037-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Bartoletti:2004:SIS,
author = "Massimo Bartoletti and Pierpaolo Degano and Gian Luigi
Ferrari",
title = "Stack inspection and secure program transformations",
journal = j-INT-J-INFO-SEC,
volume = "2",
number = "3--4",
pages = "187--217",
month = aug,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-004-0038-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:23 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-004-0038-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{MacKenzie:2004:TPG,
author = "Philip MacKenzie and Michael K. Reiter",
title = "Two-party generation of {DSA} signatures",
journal = j-INT-J-INFO-SEC,
volume = "2",
number = "3--4",
pages = "218--239",
month = aug,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-004-0041-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:23 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-004-0041-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Waidner:2004:P,
author = "Michael Waidner",
title = "Preface",
journal = j-INT-J-INFO-SEC,
volume = "3",
number = "1",
pages = "1--1",
month = oct,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-004-0051-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:23 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-004-0051-y;
http://link.springer.com/content/pdf/10.1007/s10207-004-0051-y.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Hopcroft:2004:ASA,
author = "Philippa Hopcroft and Gavin Lowe",
title = "Analysing a stream authentication protocol using model
checking",
journal = j-INT-J-INFO-SEC,
volume = "3",
number = "1",
pages = "2--13",
month = oct,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-004-0040-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:23 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-004-0040-1",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Biskup:2004:CQE,
author = "Joachim Biskup and Piero Bonatti",
title = "Controlled query evaluation for enforcing
confidentiality in complete information systems",
journal = j-INT-J-INFO-SEC,
volume = "3",
number = "1",
pages = "14--27",
month = oct,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-004-0032-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:23 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-004-0032-1",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Smith:2004:OAP,
author = "Sean W. Smith",
title = "Outbound authentication for programmable secure
coprocessors",
journal = j-INT-J-INFO-SEC,
volume = "3",
number = "1",
pages = "28--41",
month = oct,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-004-0033-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:23 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-004-0033-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Backes:2004:CPN,
author = "Michael Backes and Birgit Pfitzmann",
title = "Computational probabilistic noninterference",
journal = j-INT-J-INFO-SEC,
volume = "3",
number = "1",
pages = "42--60",
month = oct,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-004-0039-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:23 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-004-0039-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Daza:2004:PUI,
author = "Vanesa Daza and Javier Herranz and Germ{\'a}n
S{\'a}ez",
title = "Protocols useful on the {Internet} from distributed
signature schemes",
journal = j-INT-J-INFO-SEC,
volume = "3",
number = "2",
pages = "61--69",
month = nov,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-004-0043-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:23 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-004-0043-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Burgess:2004:GTM,
author = "Mark Burgess and Geoffrey Canright and Kenth
Eng{\o}-Monsen",
title = "A graph-theoretical model of computer security",
journal = j-INT-J-INFO-SEC,
volume = "3",
number = "2",
pages = "70--85",
month = nov,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-004-0044-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:23 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-004-0044-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Hitchcock:2004:ESM,
author = "Yvonne Hitchcock and Paul Montague and Gary Carter and
Ed Dawson",
title = "The efficiency of solving multiple discrete logarithm
problems and the implications for the security of fixed
elliptic curves",
journal = j-INT-J-INFO-SEC,
volume = "3",
number = "2",
pages = "86--98",
month = nov,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-004-0045-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:23 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-004-0045-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Mana:2004:FSE,
author = "Antonio Ma{\~n}a and Javier Lopez and Juan J. Ortega
and Ernesto Pimentel and Jose M. Troya",
title = "A framework for secure execution of software",
journal = j-INT-J-INFO-SEC,
volume = "3",
number = "2",
pages = "99--112",
month = nov,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-004-0048-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:23 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-004-0048-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Abie:2004:DDR,
author = "Habtamu Abie and P{\aa}l Spilling and Bent Foyn",
title = "A distributed digital rights management model for
secure information-distribution systems",
journal = j-INT-J-INFO-SEC,
volume = "3",
number = "2",
pages = "113--128",
month = nov,
year = "2004",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-004-0058-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:23 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-004-0058-4",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Autexier:2005:PSI,
author = "Serge Autexier and Iliano Cervesato and Heiko Mantel",
title = "Preface to the special issue of selected papers from
{FCS\slash VERIFY 2002}",
journal = j-INT-J-INFO-SEC,
volume = "4",
number = "1--2",
pages = "1--1",
month = feb,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-004-0053-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:24 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-004-0053-9;
http://link.springer.com/content/pdf/10.1007/s10207-004-0053-9.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Ligatti:2005:EAE,
author = "Jay Ligatti and Lujo Bauer and David Walker",
title = "Edit automata: enforcement mechanisms for run-time
security policies",
journal = j-INT-J-INFO-SEC,
volume = "4",
number = "1--2",
pages = "2--16",
month = feb,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-004-0046-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:24 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-004-0046-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Bella:2005:OVS,
author = "Giampaolo Bella and Fabio Massacci and Lawrence C.
Paulson",
title = "An overview of the verification of {SET}",
journal = j-INT-J-INFO-SEC,
volume = "4",
number = "1--2",
pages = "17--28",
month = feb,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-004-0047-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:24 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-004-0047-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Guttman:2005:RAN,
author = "Joshua D. Guttman and Amy L. Herzog",
title = "Rigorous automated network security management",
journal = j-INT-J-INFO-SEC,
volume = "4",
number = "1--2",
pages = "29--48",
month = feb,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-004-0052-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:24 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-004-0052-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Kusters:2005:DCP,
author = "Ralf K{\"u}sters",
title = "On the decidability of cryptographic protocols with
open-ended data structures",
journal = j-INT-J-INFO-SEC,
volume = "4",
number = "1--2",
pages = "49--70",
month = feb,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-004-0050-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:24 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-004-0050-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Lye:2005:GSN,
author = "Kong-wei Lye and Jeannette M. Wing",
title = "Game strategies in network security",
journal = j-INT-J-INFO-SEC,
volume = "4",
number = "1--2",
pages = "71--86",
month = feb,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-004-0060-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:24 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-004-0060-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Skalka:2005:SUB,
author = "Christian Skalka and Scott Smith",
title = "Static use-based object confinement",
journal = j-INT-J-INFO-SEC,
volume = "4",
number = "1--2",
pages = "87--104",
month = feb,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-004-0049-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:24 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-004-0049-5",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Lhee:2005:DFB,
author = "Kyung-suk Lhee and Steve J. Chapin",
title = "Detection of file-based race conditions",
journal = j-INT-J-INFO-SEC,
volume = "4",
number = "1--2",
pages = "105--119",
month = feb,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-004-0068-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:24 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-004-0068-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Bai:2005:SAP,
author = "Yun Bai and Yan Zhang and Vijay Varadharajan",
title = "On the sequence of authorization policy
transformations",
journal = j-INT-J-INFO-SEC,
volume = "4",
number = "1--2",
pages = "120--131",
month = feb,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-004-0069-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:24 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-004-0069-1",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Snekkenes:2005:PSI,
author = "Einar Snekkenes",
title = "Preface to the special issue on {ESORICS 2003}",
journal = j-INT-J-INFO-SEC,
volume = "4",
number = "3",
pages = "133--134",
month = jun,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-004-0054-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:24 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-004-0054-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Backes:2005:SAS,
author = "Michael Backes and Birgit Pfitzmann and Michael
Waidner",
title = "Symmetric authentication in a simulatable
{Dolev--Yao}-style cryptographic library",
journal = j-INT-J-INFO-SEC,
volume = "4",
number = "3",
pages = "135--154",
month = jun,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-004-0056-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:24 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-004-0056-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{vonOheimb:2005:ASM,
author = "David von Oheimb and Volkmar Lotz and Georg Walter",
title = "Analyzing {SLE 88} memory management security using
{Interacting State Machines}",
journal = j-INT-J-INFO-SEC,
volume = "4",
number = "3",
pages = "155--171",
month = jun,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-004-0057-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:24 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-004-0057-5",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Serjantov:2005:PAA,
author = "Andrei Serjantov and Peter Sewell",
title = "Passive-attack analysis for connection-based anonymity
systems",
journal = j-INT-J-INFO-SEC,
volume = "4",
number = "3",
pages = "172--180",
month = jun,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-004-0059-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:24 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-004-0059-3",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Basin:2005:OSM,
author = "David Basin and Sebastian M{\"o}dersheim and Luca
Vigan{\`o}",
title = "{OFMC}: a symbolic model checker for security
protocols",
journal = j-INT-J-INFO-SEC,
volume = "4",
number = "3",
pages = "181--208",
month = jun,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-004-0055-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:24 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-004-0055-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Trostle:2005:TIS,
author = "Jonathan Trostle and Bill Gossman",
title = "Techniques for improving the security and
manageability of {IPsec} policy",
journal = j-INT-J-INFO-SEC,
volume = "4",
number = "3",
pages = "209--226",
month = jun,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-004-0064-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:24 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-004-0064-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Boyd:2005:PSI,
author = "Colin Boyd and Wenbo Mao",
title = "Preface to the special issue on {ISC 2003}",
journal = j-INT-J-INFO-SEC,
volume = "4",
number = "4",
pages = "227--227",
month = oct,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-004-0066-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:25 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-004-0066-4",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Galindo:2005:FOH,
author = "David Galindo and Sebasti{\`a} Mart{\'\i}n and Paz
Morillo and Jorge L. Villar",
title = "{Fujisaki--Okamoto} hybrid encryption revisited",
journal = j-INT-J-INFO-SEC,
volume = "4",
number = "4",
pages = "228--241",
month = oct,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-004-0042-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:25 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-004-0042-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Backes:2005:RSS,
author = "Michael Backes and Birgit Pfitzmann and Michael
Waidner",
title = "Reactively secure signature schemes",
journal = j-INT-J-INFO-SEC,
volume = "4",
number = "4",
pages = "242--252",
month = oct,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-004-0062-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:25 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-004-0062-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Gurgens:2005:SFN,
author = "Sigrid G{\"u}rgens and Carsten Rudolph and Holger
Vogt",
title = "On the security of fair non-repudiation protocols",
journal = j-INT-J-INFO-SEC,
volume = "4",
number = "4",
pages = "253--262",
month = oct,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-004-0063-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:25 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-004-0063-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Baldwin:2005:ESA,
author = "Adrian Baldwin and Simon Shiu",
title = "Enabling shared audit data",
journal = j-INT-J-INFO-SEC,
volume = "4",
number = "4",
pages = "263--276",
month = oct,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-004-0061-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:25 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-004-0061-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Atallah:2005:SOS,
author = "Mikhail J. Atallah and Jiangtao Li",
title = "Secure outsourcing of sequence comparisons",
journal = j-INT-J-INFO-SEC,
volume = "4",
number = "4",
pages = "277--287",
month = oct,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-005-0070-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:25 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-005-0070-3",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Itakura:2005:PMB,
author = "Yukio Itakura and Shigeo Tsujii",
title = "Proposal on a multifactor biometric authentication
method based on cryptosystem keys containing biometric
signatures",
journal = j-INT-J-INFO-SEC,
volume = "4",
number = "4",
pages = "288--296",
month = oct,
year = "2005",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-004-0065-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:25 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-004-0065-5",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Gritzalis:2006:PKI,
author = "Stefanos Gritzalis",
title = "{Public Key Infrastructure}: Research and
Applications",
journal = j-INT-J-INFO-SEC,
volume = "5",
number = "1",
pages = "1--2",
month = jan,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-005-0075-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:25 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-005-0075-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Vanrenen:2006:DSM,
author = "Gabriel Vanrenen and Sean Smith and John Marchesini",
title = "Distributing security-mediated {PKI}",
journal = j-INT-J-INFO-SEC,
volume = "5",
number = "1",
pages = "3--17",
month = jan,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-005-0076-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:25 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-005-0076-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Lioy:2006:PPP,
author = "Antonio Lioy and Marius Marian and Natalia Moltchanova
and Massimiliano Pala",
title = "{PKI} past, present and future",
journal = j-INT-J-INFO-SEC,
volume = "5",
number = "1",
pages = "18--29",
month = jan,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-005-0077-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:25 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-005-0077-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Bohli:2006:KSA,
author = "Jens-Matthias Bohli and Stefan R{\"o}hrich and Rainer
Steinwandt",
title = "Key substitution attacks revisited: Taking into
account malicious signers",
journal = j-INT-J-INFO-SEC,
volume = "5",
number = "1",
pages = "30--36",
month = jan,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-005-0071-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:25 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-005-0071-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Zhou:2006:MTI,
author = "Jianying Zhou and Feng Bao and Robert Deng",
title = "Minimizing {TTP}'s involvement in signature
validation",
journal = j-INT-J-INFO-SEC,
volume = "5",
number = "1",
pages = "37--47",
month = jan,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-005-0072-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:25 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-005-0072-1",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Li:2006:USS,
author = "Ninghui Li and John C. Mitchell",
title = "Understanding {SPKI\slash SDSI} using first-order
logic",
journal = j-INT-J-INFO-SEC,
volume = "5",
number = "1",
pages = "48--64",
month = jan,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-005-0073-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:25 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-005-0073-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Zhou:2006:P,
author = "Jianying Zhou and Javier Lopez",
title = "Preface",
journal = j-INT-J-INFO-SEC,
volume = "5",
number = "2",
pages = "65--66",
month = apr,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-006-0087-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:25 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-006-0087-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Young:2006:CEU,
author = "Adam L. Young",
title = "Cryptoviral extortion using {Microsoft}'s Crypto
{API}",
journal = j-INT-J-INFO-SEC,
volume = "5",
number = "2",
pages = "67--76",
month = apr,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-006-0082-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:25 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-006-0082-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Sidiroglou:2006:ETD,
author = "Stelios Sidiroglou and Angelos D. Keromytis",
title = "Execution transactions for defending against software
failures: use and evaluation",
journal = j-INT-J-INFO-SEC,
volume = "5",
number = "2",
pages = "77--91",
month = apr,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-006-0083-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:25 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-006-0083-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Nali:2006:HTB,
author = "Deholo Nali and Carlisle Adams and Ali Miri",
title = "Hierarchical time-based information release",
journal = j-INT-J-INFO-SEC,
volume = "5",
number = "2",
pages = "92--104",
month = apr,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-006-0084-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:25 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-006-0084-5",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Chakrabarti:2006:KPD,
author = "Dibyendu Chakrabarti and Subhamoy Maitra and Bimal
Roy",
title = "A key pre-distribution scheme for wireless sensor
networks: merging blocks in combinatorial design",
journal = j-INT-J-INFO-SEC,
volume = "5",
number = "2",
pages = "105--114",
month = apr,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-006-0085-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:25 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-006-0085-4",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Yeo:2006:SWE,
author = "Gary S.-W. Yeo and Raphael C.-W. Phan",
title = "On the security of the {WinRAR} encryption feature",
journal = j-INT-J-INFO-SEC,
volume = "5",
number = "2",
pages = "115--123",
month = apr,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-006-0086-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:25 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-006-0086-3",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Mayer:2006:OFA,
author = "Alain Mayer and Avishai Wool and Elisha Ziskind",
title = "Offline firewall analysis",
journal = j-INT-J-INFO-SEC,
volume = "5",
number = "3",
pages = "125--144",
month = jul,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-005-0074-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:26 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-005-0074-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Crescini:2006:PSD,
author = "Vino Fernando Crescini and Yan Zhang",
title = "{PolicyUpdater}: a system for dynamic access control",
journal = j-INT-J-INFO-SEC,
volume = "5",
number = "3",
pages = "145--165",
month = jul,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-005-0078-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:26 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-005-0078-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Tsunoo:2006:ICA,
author = "Yukiyasu Tsunoo and Etsuko Tsujihara and Maki Shigeri
and Hiroyasu Kubo and Kazuhiko Minematsu",
title = "Improving cache attacks by considering cipher
structure",
journal = j-INT-J-INFO-SEC,
volume = "5",
number = "3",
pages = "166--176",
month = jul,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-005-0079-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:26 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-005-0079-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Okeya:2006:SAC,
author = "Katsuyuki Okeya and Tsuyoshi Takagi",
title = "Security analysis of {CRT}-based cryptosystems",
journal = j-INT-J-INFO-SEC,
volume = "5",
number = "3",
pages = "177--185",
month = jul,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-005-0080-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:26 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-005-0080-1",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{vanOorschot:2006:MSD,
author = "Paul C. van Oorschot and Jean-Marc Robert and Miguel
Vargas Martin",
title = "A monitoring system for detecting repeated packets
with applications to computer worms",
journal = j-INT-J-INFO-SEC,
volume = "5",
number = "3",
pages = "186--199",
month = jul,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-006-0081-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:26 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-006-0081-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Brandt:2006:HOF,
author = "Felix Brandt",
title = "How to obtain full privacy in auctions",
journal = j-INT-J-INFO-SEC,
volume = "5",
number = "4",
pages = "201--216",
month = oct,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-006-0001-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:26 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-006-0001-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Al-Riyami:2006:EFE,
author = "S. S. Al-Riyami and J. Malone-Lee and N. P. Smart",
title = "Escrow-free encryption supporting cryptographic
workflow",
journal = j-INT-J-INFO-SEC,
volume = "5",
number = "4",
pages = "217--229",
month = oct,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-006-0002-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:26 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-006-0002-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Ding:2006:CNT,
author = "Jintai Ding and Dieter Schmidt and Zhijun Yin",
title = "Cryptanalysis of the new {TTS} scheme in {CHES 2004}",
journal = j-INT-J-INFO-SEC,
volume = "5",
number = "4",
pages = "231--240",
month = oct,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-006-0003-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:26 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-006-0003-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Nguyen:2006:VSF,
author = "Lan Nguyen and Rei Safavi-Naini and Kaoru Kurosawa",
title = "Verifiable shuffles: a formal model and a
Paillier-based three-round construction with provable
security",
journal = j-INT-J-INFO-SEC,
volume = "5",
number = "4",
pages = "241--255",
month = oct,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-006-0004-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:26 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-006-0004-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Giorgini:2006:RET,
author = "Paolo Giorgini and Fabio Massacci and John Mylopoulos
and Nicola Zannone",
title = "Requirements engineering for trust management: model,
methodology, and reasoning",
journal = j-INT-J-INFO-SEC,
volume = "5",
number = "4",
pages = "257--274",
month = oct,
year = "2006",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-006-0005-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:26 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-006-0005-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Clarke:2007:AMP,
author = "N. L. Clarke and S. M. Furnell",
title = "Authenticating mobile phone users using keystroke
analysis",
journal = j-INT-J-INFO-SEC,
volume = "6",
number = "1",
pages = "1--14",
month = jan,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-006-0006-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:26 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-006-0006-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Blundo:2007:LRC,
author = "Carlo Blundo and Clemente Galdi and Giuseppe
Persiano",
title = "Low-randomness constant-round private {XOR}
computations",
journal = j-INT-J-INFO-SEC,
volume = "6",
number = "1",
pages = "15--26",
month = jan,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-006-0007-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:26 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-006-0007-5",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Wang:2007:HDA,
author = "Shujing Wang and Yan Zhang",
title = "Handling distributed authorization with delegation
through answer set programming",
journal = j-INT-J-INFO-SEC,
volume = "6",
number = "1",
pages = "27--46",
month = jan,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-006-0008-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:26 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-006-0008-4",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Konstantinou:2007:EGS,
author = "Elisavet Konstantinou and Yannis C. Stamatiou and
Christos Zaroliagis",
title = "Efficient generation of secure elliptic curves",
journal = j-INT-J-INFO-SEC,
volume = "6",
number = "1",
pages = "47--63",
month = jan,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-006-0009-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:26 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-006-0009-3",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Dimitrakos:2007:GEP,
author = "Theo Dimitrakos and Fabio Martinelli and Peter Y. A.
Ryan and Steve Schneider",
title = "{Guest Editors}' Preface",
journal = j-INT-J-INFO-SEC,
volume = "6",
number = "2--3",
pages = "65--66",
month = mar,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0012-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:27 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0012-3",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Zheng:2007:DSL,
author = "Lantian Zheng and Andrew C. Myers",
title = "Dynamic security labels and static information flow
control",
journal = j-INT-J-INFO-SEC,
volume = "6",
number = "2--3",
pages = "67--84",
month = mar,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0019-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:27 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0019-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{DeFrancesco:2007:ILS,
author = "Nicoletta {De Francesco} and Luca Martini",
title = "Instruction-level security typing by abstract
interpretation",
journal = j-INT-J-INFO-SEC,
volume = "6",
number = "2--3",
pages = "85--106",
month = mar,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0015-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:27 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0015-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Kopf:2007:TTU,
author = "Boris K{\"o}pf and Heiko Mantel",
title = "Transformational typing and unification for
automatically correcting insecure programs",
journal = j-INT-J-INFO-SEC,
volume = "6",
number = "2--3",
pages = "107--131",
month = mar,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0016-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:27 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0016-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Cederquist:2007:ABC,
author = "J. G. Cederquist and R. Corin and M. A. C. Dekker and
S. Etalle and J. I. den Hartog and G. Lenzini",
title = "Audit-based compliance control",
journal = j-INT-J-INFO-SEC,
volume = "6",
number = "2--3",
pages = "133--151",
month = mar,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0017-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:27 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0017-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Krukow:2007:TS,
author = "Karl Krukow and Mogens Nielsen",
title = "Trust structures",
journal = j-INT-J-INFO-SEC,
volume = "6",
number = "2--3",
pages = "153--181",
month = mar,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0014-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:27 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0014-1",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Delicata:2007:AAV,
author = "Rob Delicata and Steve Schneider",
title = "An algebraic approach to the verification of a class
of {Diffie--Hellman} protocols",
journal = j-INT-J-INFO-SEC,
volume = "6",
number = "2--3",
pages = "183--196",
month = mar,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0013-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:27 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0013-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Gritzalis:2007:PMO,
author = "S. Gritzalis and A. N. Yannacopoulos and C.
Lambrinoudakis and P. Hatzopoulos and S. K. Katsikas",
title = "A probabilistic model for optimal insurance contracts
against security risks and privacy violation in {IT}
outsourcing environments",
journal = j-INT-J-INFO-SEC,
volume = "6",
number = "4",
pages = "197--211",
month = jul,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-006-0010-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:27 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-006-0010-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Chen:2007:IBK,
author = "L. Chen and Z. Cheng and N. P. Smart",
title = "Identity-based key agreement protocols from pairings",
journal = j-INT-J-INFO-SEC,
volume = "6",
number = "4",
pages = "213--241",
month = jul,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-006-0011-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:27 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-006-0011-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Bohli:2007:SGK,
author = "Jens-Matthias Bohli and Mar{\'\i}a Isabel Gonz{\'a}lez
Vasco and Rainer Steinwandt",
title = "Secure group key establishment revisited",
journal = j-INT-J-INFO-SEC,
volume = "6",
number = "4",
pages = "243--254",
month = jul,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0018-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:27 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0018-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Bertino:2007:SSP,
author = "Elisa Bertino and Elena Ferrari and Federica Paci and
Loredana Parasiliti Provenza",
title = "A system for securing push-based distribution of {XML}
documents",
journal = j-INT-J-INFO-SEC,
volume = "6",
number = "4",
pages = "255--284",
month = jul,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0020-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:27 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0020-3",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Knight:2007:IJI,
author = "Scott Knight and Scott Buffett and Patrick C. K.
Hung",
title = "The {{\booktitle{International Journal of Information
Security}}} Special Issue on privacy, security and
trust technologies and E-business services",
journal = j-INT-J-INFO-SEC,
volume = "6",
number = "5",
pages = "285--286",
month = sep,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0036-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:27 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0036-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Wu:2007:RFT,
author = "Zhengping Wu and Alfred C. Weaver",
title = "Requirements of federated trust management for
service-oriented architectures",
journal = j-INT-J-INFO-SEC,
volume = "6",
number = "5",
pages = "287--296",
month = sep,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0027-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:27 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0027-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Liu:2007:ICR,
author = "Jinshan Liu and Val{\'e}rie Issarny",
title = "An incentive compatible reputation mechanism for
ubiquitous computing environments",
journal = j-INT-J-INFO-SEC,
volume = "6",
number = "5",
pages = "297--311",
month = sep,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0029-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:27 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0029-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Levin:2007:WSL,
author = "Avner Levin",
title = "Is workplace surveillance legal in {Canada}?",
journal = j-INT-J-INFO-SEC,
volume = "6",
number = "5",
pages = "313--321",
month = sep,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0026-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:27 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0026-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Lauer:2007:BOT,
author = "Thomas W. Lauer and Xiaodong Deng",
title = "Building online trust through privacy practices",
journal = j-INT-J-INFO-SEC,
volume = "6",
number = "5",
pages = "323--331",
month = sep,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0028-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:27 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0028-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Zhang:2007:FBT,
author = "Jie Zhang and Ali A. Ghorbani and Robin Cohen",
title = "A familiarity-based trust model for effective
selection of sellers in multiagent e-commerce systems",
journal = j-INT-J-INFO-SEC,
volume = "6",
number = "5",
pages = "333--344",
month = sep,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0025-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:27 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0025-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Zulkernine:2007:ISS,
author = "Mohammad Zulkernine and Mathews Graves and Muhammad
Umair Ahmed Khan",
title = "Integrating software specifications into intrusion
detection",
journal = j-INT-J-INFO-SEC,
volume = "6",
number = "5",
pages = "345--357",
month = sep,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0023-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:27 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0023-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Backes:2007:P,
author = "Michael Backes and Stefanos Gritzalis and Bart
Preneel",
title = "Preface",
journal = j-INT-J-INFO-SEC,
volume = "6",
number = "6",
pages = "359--360",
month = oct,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0034-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:28 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0034-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Anagnostakis:2007:CDR,
author = "Kostas G. Anagnostakis and Michael B. Greenwald and
Sotiris Ioannidis and Angelos D. Keromytis",
title = "{COVERAGE}: detecting and reacting to worm epidemics
using cooperation and validation",
journal = j-INT-J-INFO-SEC,
volume = "6",
number = "6",
pages = "361--378",
month = oct,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0032-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:28 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0032-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Bononi:2007:IDS,
author = "Luciano Bononi and Carlo Tacconi",
title = "Intrusion detection for secure clustering and routing
in {Mobile Multi-hop Wireless Networks}",
journal = j-INT-J-INFO-SEC,
volume = "6",
number = "6",
pages = "379--392",
month = oct,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0035-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:28 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0035-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Danezis:2007:BFM,
author = "George Danezis",
title = "Breaking four mix-related schemes based on {Universal
Re-encryption}",
journal = j-INT-J-INFO-SEC,
volume = "6",
number = "6",
pages = "393--402",
month = oct,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0033-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:28 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0033-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
keywords = "Anonymous communications; El-Gamal encryption; rWonGoo
anonymous channel; Traffic analysis; Universal
re-encryption",
remark = "From the abstract: ``Universal Re-encryption allows
El-Gamal ciphertexts to be re-encrypted without
knowledge of their corresponding public keys. This has
made it an enticing building block for anonymous
communications protocols. \ldots{} [we] find serious
weaknesses in all of them.''",
}
@Article{Esponda:2007:PDP,
author = "Fernando Esponda and Elena S. Ackley and Paul Helman
and Haixia Jia and Stephanie Forrest",
title = "Protecting data privacy through hard-to-reverse
negative databases",
journal = j-INT-J-INFO-SEC,
volume = "6",
number = "6",
pages = "403--415",
month = oct,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0030-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:28 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0030-1",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Klinkoff:2007:ENS,
author = "Patrick Klinkoff and Engin Kirda and Christopher
Kruegel and Giovanni Vigna",
title = "Extending {.NET} security to unmanaged code",
journal = j-INT-J-INFO-SEC,
volume = "6",
number = "6",
pages = "417--428",
month = oct,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0031-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:28 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0031-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Degano:2008:P,
author = "Pierpaolo Degano and Luca Vigan{\`o}",
title = "Preface",
journal = j-INT-J-INFO-SEC,
volume = "7",
number = "1",
pages = "1--1",
month = jan,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0038-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:28 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0038-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Armando:2008:SBM,
author = "Alessandro Armando and Luca Compagna",
title = "{SAT}-based model-checking for security protocols
analysis",
journal = j-INT-J-INFO-SEC,
volume = "7",
number = "1",
pages = "3--32",
month = jan,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0041-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:28 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0041-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Backes:2008:LBU,
author = "Michael Backes and Birgit Pfitzmann",
title = "Limits of the {BRSIM\slash UC} soundness of
{Dolev--Yao}-style {XOR}",
journal = j-INT-J-INFO-SEC,
volume = "7",
number = "1",
pages = "33--54",
month = jan,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0040-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:28 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0040-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Bracciali:2008:SFM,
author = "Andrea Bracciali and Gianluigi Ferrari and Emilio
Tuosto",
title = "A symbolic framework for multi-faceted security
protocol analysis",
journal = j-INT-J-INFO-SEC,
volume = "7",
number = "1",
pages = "55--84",
month = jan,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0043-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:28 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0043-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Estevez-Tapiador:2008:BRE,
author = "Juan M. Estevez-Tapiador and Almudena Alcaide and
Julio C. Hernandez-Castro and Arturo Ribagorda",
title = "{Bayesian} rational exchange",
journal = j-INT-J-INFO-SEC,
volume = "7",
number = "1",
pages = "85--100",
month = jan,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0039-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:28 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0039-5",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Gollmann:2008:E,
author = "Dieter Gollmann",
title = "Editorial",
journal = j-INT-J-INFO-SEC,
volume = "7",
number = "2",
pages = "101--101",
month = apr,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0052-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:28 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0052-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Alfaro:2008:CAC,
author = "J. G. Alfaro and N. Boulahia-Cuppens and F. Cuppens",
title = "Complete analysis of configuration rules to guarantee
reliable network security policies",
journal = j-INT-J-INFO-SEC,
volume = "7",
number = "2",
pages = "103--122",
month = apr,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0045-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:28 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0045-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Crampton:2008:DRB,
author = "Jason Crampton and Hemanth Khambhammettu",
title = "Delegation in role-based access control",
journal = j-INT-J-INFO-SEC,
volume = "7",
number = "2",
pages = "123--136",
month = apr,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0044-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:28 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0044-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Fong:2008:DCC,
author = "Philip W. L. Fong",
title = "Discretionary capability confinement",
journal = j-INT-J-INFO-SEC,
volume = "7",
number = "2",
pages = "137--154",
month = apr,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0047-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:28 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0047-5",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Backes:2008:CRS,
author = "Michael Backes and Markus D{\"u}rmuth and Dennis
Hofheinz and Ralf K{\"u}sters",
title = "Conditional reactive simulatability",
journal = j-INT-J-INFO-SEC,
volume = "7",
number = "2",
pages = "155--169",
month = apr,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0046-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:28 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0046-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Huang:2008:SUD,
author = "Xinyi Huang and Willy Susilo and Yi Mu and Wei Wu",
title = "Secure universal designated verifier signature without
random oracles",
journal = j-INT-J-INFO-SEC,
volume = "7",
number = "3",
pages = "171--183",
month = jun,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0021-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:29 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0021-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Chen:2008:IID,
author = "Pei-Te Chen and Chi-Sung Laih",
title = "{IDSIC}: an intrusion detection system with
identification capability",
journal = j-INT-J-INFO-SEC,
volume = "7",
number = "3",
pages = "185--197",
month = jun,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0024-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:29 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0024-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Biskup:2008:KSI,
author = "Joachim Biskup and Torben Weibert",
title = "Keeping secrets in incomplete databases",
journal = j-INT-J-INFO-SEC,
volume = "7",
number = "3",
pages = "199--217",
month = jun,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0037-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:29 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0037-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Aldini:2008:EMI,
author = "Alessandro Aldini and Alessandra {Di Pierro}",
title = "Estimating the maximum information leakage",
journal = j-INT-J-INFO-SEC,
volume = "7",
number = "3",
pages = "219--242",
month = jun,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0050-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:29 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0050-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Wang:2008:MLF,
author = "XiaoFeng Wang and Michael K. Reiter",
title = "A multi-layer framework for puzzle-based
denial-of-service defense",
journal = j-INT-J-INFO-SEC,
volume = "7",
number = "4",
pages = "243--263",
month = aug,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0042-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:29 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0042-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Tartary:2008:CAM,
author = "Christophe Tartary and Huaxiong Wang and Josef
Pieprzyk",
title = "A coding approach to the multicast stream
authentication problem",
journal = j-INT-J-INFO-SEC,
volume = "7",
number = "4",
pages = "265--283",
month = aug,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0048-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:29 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0048-4",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Cuppens:2008:MCS,
author = "Fr{\'e}d{\'e}ric Cuppens and Nora Cuppens-Boulahia",
title = "Modeling contextual security policies",
journal = j-INT-J-INFO-SEC,
volume = "7",
number = "4",
pages = "285--305",
month = aug,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0051-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:29 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0051-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Aimeur:2008:LPP,
author = "Esma A{\"\i}meur and Gilles Brassard and Jos{\'e} M.
Fernandez and Flavien Serge Mani Onana",
title = "{{\sc Alambic}}: a privacy-preserving recommender
system for electronic commerce",
journal = j-INT-J-INFO-SEC,
volume = "7",
number = "5",
pages = "307--334",
month = oct,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0049-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:29 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0049-3",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Corbett:2008:PCW,
author = "Cherita L. Corbett and Raheem A. Beyah and John A.
Copeland",
title = "Passive classification of wireless {NICs} during
active scanning",
journal = j-INT-J-INFO-SEC,
volume = "7",
number = "5",
pages = "335--348",
month = oct,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-007-0053-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:29 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-007-0053-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Dent:2008:SCE,
author = "Alexander W. Dent",
title = "A survey of certificateless encryption schemes and
security models",
journal = j-INT-J-INFO-SEC,
volume = "7",
number = "5",
pages = "349--377",
month = oct,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-008-0055-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:29 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-008-0055-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Zhao:2008:NAP,
author = "Chang-An Zhao and Fangguo Zhang and Jiwu Huang",
title = "A note on the {Ate} pairing",
journal = j-INT-J-INFO-SEC,
volume = "7",
number = "6",
pages = "379--382",
month = nov,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-008-0054-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:30 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-008-0054-1",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Imamoto:2008:AEC,
author = "Kenji Imamoto and Jianying Zhou and Kouichi Sakurai",
title = "Achieving evenhandedness in certified email system for
contract signing",
journal = j-INT-J-INFO-SEC,
volume = "7",
number = "6",
pages = "383--394",
month = nov,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-008-0056-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:30 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-008-0056-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Balopoulos:2008:SIP,
author = "Theodoros Balopoulos and Stefanos Gritzalis and
Sokratis K. Katsikas",
title = "Specifying and implementing privacy-preserving
cryptographic protocols",
journal = j-INT-J-INFO-SEC,
volume = "7",
number = "6",
pages = "395--420",
month = nov,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-008-0057-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:30 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-008-0057-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Bryans:2008:OGT,
author = "Jeremy W. Bryans and Maciej Koutny and Laurent
Mazar{\'e} and Peter Y. A. Ryan",
title = "Opacity generalised to transition systems",
journal = j-INT-J-INFO-SEC,
volume = "7",
number = "6",
pages = "421--435",
month = nov,
year = "2008",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-008-0058-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:30 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-008-0058-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Lu:2009:RKR,
author = "Jiqiang Lu",
title = "Related-key rectangle attack on 36 rounds of the
{XTEA} block cipher",
journal = j-INT-J-INFO-SEC,
volume = "8",
number = "1",
pages = "1--11",
month = feb,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-008-0059-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:30 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-008-0059-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Yoshino:2009:BMM,
author = "Masayuki Yoshino and Katsuyuki Okeya and Camille
Vuillaume",
title = "Bipartite modular multiplication with twice the
bit-length of multipliers",
journal = j-INT-J-INFO-SEC,
volume = "8",
number = "1",
pages = "13--23",
month = feb,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-008-0060-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:30 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-008-0060-3",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Tian:2009:LSN,
author = "Daxin Tian and Yanheng Liu and Yang Xiang",
title = "Large-scale network intrusion detection based on
distributed learning algorithm",
journal = j-INT-J-INFO-SEC,
volume = "8",
number = "1",
pages = "25--35",
month = feb,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-008-0061-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:30 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-008-0061-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Cheng:2009:CKA,
author = "Jiin-Chiou Cheng and Chi-Sung Laih",
title = "Conference key agreement protocol with non-interactive
fault-tolerance over broadcast network",
journal = j-INT-J-INFO-SEC,
volume = "8",
number = "1",
pages = "37--48",
month = feb,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-008-0062-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:30 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-008-0062-1",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Mashatan:2009:ITC,
author = "Atefeh Mashatan and Douglas R. Stinson",
title = "Interactive two-channel message authentication based
on {Interactive--Collision Resistant} hash functions",
journal = j-INT-J-INFO-SEC,
volume = "8",
number = "1",
pages = "49--60",
month = feb,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-008-0063-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:30 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/hash.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-008-0063-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
keywords = "Interactive--Collision Resistant (ICR) hash function",
}
@Article{Narasimha:2009:PPR,
author = "M. Narasimha and J. Solis and G. Tsudik",
title = "Privacy-preserving revocation checking",
journal = j-INT-J-INFO-SEC,
volume = "8",
number = "1",
pages = "61--75",
month = feb,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-008-0064-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:30 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-008-0064-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Elmufti:2009:MWS,
author = "Kalid Elmufti and Dasun Weerasinghe and M. Rajarajan
and Veselin Rakocevic and Sanowar Khan and John A.
MacDonald",
title = "Mobile {Web} services authentication using {SAML} and
{3GPP} generic bootstrapping architecture",
journal = j-INT-J-INFO-SEC,
volume = "8",
number = "2",
pages = "77--87",
month = apr,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-008-0065-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:30 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-008-0065-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Li:2009:DSA,
author = "Jiangtao Li and Ninghui Li and XiaoFeng Wang and Ting
Yu",
title = "Denial of service attacks and defenses in
decentralized trust management",
journal = j-INT-J-INFO-SEC,
volume = "8",
number = "2",
pages = "89--101",
month = apr,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-008-0068-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:30 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-008-0068-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Quinn:2009:AAE,
author = "Karl Quinn and David Lewis and Declan O'Sullivan and
Vincent P. Wade",
title = "An analysis of accuracy experiments carried out over
of a multi-faceted model of trust",
journal = j-INT-J-INFO-SEC,
volume = "8",
number = "2",
pages = "103--119",
month = apr,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-008-0069-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:30 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-008-0069-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Vasserman:2009:IKN,
author = "Eugene Y. Vasserman and Nicholas Hopper and James
Tyra",
title = "{{\sc SilentKnock}}: practical, provably undetectable
authentication",
journal = j-INT-J-INFO-SEC,
volume = "8",
number = "2",
pages = "121--135",
month = apr,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-008-0070-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:30 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-008-0070-1",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Chadwick:2009:ASX,
author = "David W. Chadwick and Sassa Otenko and Tuan Anh
Nguyen",
title = "Adding support to {XACML} for multi-domain user to
user dynamic delegation of authority",
journal = j-INT-J-INFO-SEC,
volume = "8",
number = "2",
pages = "137--152",
month = apr,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-008-0073-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:30 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-008-0073-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Wu:2009:IDV,
author = "Yu-Sung Wu and Vinita Apte and Saurabh Bagchi and
Sachin Garg and Navjot Singh",
title = "Intrusion detection in voice over {IP} environments",
journal = j-INT-J-INFO-SEC,
volume = "8",
number = "3",
pages = "153--172",
month = jun,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-008-0071-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:31 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-008-0071-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Kuper:2009:GXS,
author = "Gabriel Kuper and Fabio Massacci and Nataliya
Rassadko",
title = "Generalized {XML} security views",
journal = j-INT-J-INFO-SEC,
volume = "8",
number = "3",
pages = "173--203",
month = jun,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-008-0074-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:31 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-008-0074-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Harn:2009:EIB,
author = "Lein Harn and Jian Ren and Changlu Lin",
title = "Efficient identity-based {GQ} multisignatures",
journal = j-INT-J-INFO-SEC,
volume = "8",
number = "3",
pages = "205--210",
month = jun,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-008-0072-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:31 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-008-0072-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Cook:2009:EBC,
author = "Debra L. Cook and Moti Yung and Angelos D. Keromytis",
title = "Elastic block ciphers: method, security and
instantiations",
journal = j-INT-J-INFO-SEC,
volume = "8",
number = "3",
pages = "211--231",
month = jun,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-008-0075-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:31 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-008-0075-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Sourour:2009:ESD,
author = "Meharouech Sourour and Bouhoula Adel and Abbes Tarek",
title = "Ensuring security in depth based on heterogeneous
network security technologies",
journal = j-INT-J-INFO-SEC,
volume = "8",
number = "4",
pages = "233--246",
month = aug,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-009-0077-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:31 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-009-0077-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Desoky:2009:LLB,
author = "Abdelrahman Desoky",
title = "{Listega}: list-based steganography methodology",
journal = j-INT-J-INFO-SEC,
volume = "8",
number = "4",
pages = "247--261",
month = aug,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-009-0079-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:31 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-009-0079-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
keywords = "List-Based Steganography Methodology (Listega)",
}
@Article{Lee:2009:RTB,
author = "Sangho Lee and Jong Kim and Sung Je Hong",
title = "Redistributing time-based rights between consumer
devices for content sharing in {DRM} system",
journal = j-INT-J-INFO-SEC,
volume = "8",
number = "4",
pages = "263--273",
month = aug,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-009-0082-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:31 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-009-0082-5",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Shay:2009:CST,
author = "Richard Shay and Elisa Bertino",
title = "A comprehensive simulation tool for the analysis of
password policies",
journal = j-INT-J-INFO-SEC,
volume = "8",
number = "4",
pages = "275--289",
month = aug,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-009-0084-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:31 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-009-0084-3",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Koshutanski:2009:EGS,
author = "Hristo Koshutanski and Aliaksandr Lazouski and Fabio
Martinelli and Paolo Mori",
title = "Enhancing grid security by fine-grained behavioral
control and negotiation-based authorization",
journal = j-INT-J-INFO-SEC,
volume = "8",
number = "4",
pages = "291--314",
month = aug,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-009-0083-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:31 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-009-0083-4",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Brickell:2009:SSN,
author = "Ernie Brickell and Liqun Chen and Jiangtao Li",
title = "Simplified security notions of direct anonymous
attestation and a concrete scheme from pairings",
journal = j-INT-J-INFO-SEC,
volume = "8",
number = "5",
pages = "315--330",
month = oct,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-009-0076-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:31 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-009-0076-3",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Esponda:2009:NRI,
author = "Fernando Esponda and Stephanie Forrest and Paul
Helman",
title = "Negative representations of information",
journal = j-INT-J-INFO-SEC,
volume = "8",
number = "5",
pages = "331--345",
month = oct,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-009-0078-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:31 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-009-0078-1",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Hasegawa:2009:PFC,
author = "Shingo Hasegawa and Shuji Isobe and Hiroki Shizuya and
Katsuhiro Tashiro",
title = "On the pseudo-freeness and the {CDH} assumption",
journal = j-INT-J-INFO-SEC,
volume = "8",
number = "5",
pages = "347--355",
month = oct,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-009-0087-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:31 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-009-0087-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Geron:2009:CCR,
author = "Erel Geron and Avishai Wool",
title = "{CRUST}: cryptographic remote untrusted storage
without public keys",
journal = j-INT-J-INFO-SEC,
volume = "8",
number = "5",
pages = "357--377",
month = oct,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-009-0081-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:31 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-009-0081-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Qin:2009:SSS,
author = "Huawang Qin and Yuewei Dai and Zhiquan Wang",
title = "A secret sharing scheme based on $ (t, n) $ threshold
and adversary structure",
journal = j-INT-J-INFO-SEC,
volume = "8",
number = "5",
pages = "379--385",
month = oct,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-009-0085-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:31 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-009-0085-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Chiasson:2009:UID,
author = "Sonia Chiasson and Alain Forget and Robert Biddle and
P. C. van Oorschot",
title = "User interface design affects security: patterns in
click-based graphical passwords",
journal = j-INT-J-INFO-SEC,
volume = "8",
number = "6",
pages = "387--398",
month = dec,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-009-0080-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:32 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-009-0080-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Hammer:2009:FSC,
author = "Christian Hammer and Gregor Snelting",
title = "Flow-sensitive, context-sensitive, and
object-sensitive information flow control based on
program dependence graphs",
journal = j-INT-J-INFO-SEC,
volume = "8",
number = "6",
pages = "399--422",
month = dec,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-009-0086-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:32 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-009-0086-1",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{An:2009:UIC,
author = "Xiangdong An and Dawn Jutla and Nick Cercone and
Charnyote Pluempitiwiriyawej and Hai Wang",
title = "Uncertain inference control in privacy protection",
journal = j-INT-J-INFO-SEC,
volume = "8",
number = "6",
pages = "423--431",
month = dec,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-009-0088-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:32 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-009-0088-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Sajedi:2009:SSB,
author = "Hedieh Sajedi and Mansour Jamzad",
title = "Secure steganography based on embedding capacity",
journal = j-INT-J-INFO-SEC,
volume = "8",
number = "6",
pages = "433--445",
month = dec,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-009-0089-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:32 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-009-0089-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Plaga:2009:BKS,
author = "Rainer Plaga",
title = "Biometric keys: suitable use cases and achievable
information content",
journal = j-INT-J-INFO-SEC,
volume = "8",
number = "6",
pages = "447--454",
month = dec,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-009-0090-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:32 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-009-0090-5",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Kozina:2009:MIW,
author = "Mario Kozina and Marin Golub and Stjepan Gros",
title = "A method for identifying {Web} applications",
journal = j-INT-J-INFO-SEC,
volume = "8",
number = "6",
pages = "455--467",
month = dec,
year = "2009",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-009-0092-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:32 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-009-0092-3",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Zheng:2010:AAB,
author = "Ruijuan Zheng and Mingchuan Zhang and Qingtao Wu and
Shibao Sun and Jiexin Pu",
title = "Analysis and application of {Bio-Inspired Multi-Net
Security Model}",
journal = j-INT-J-INFO-SEC,
volume = "9",
number = "1",
pages = "1--17",
month = feb,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-009-0091-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:32 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-009-0091-4",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Han:2010:CBI,
author = "Shui-Hua Han and Chao-Hsien Chu",
title = "Content-based image authentication: current status,
issues, and challenges",
journal = j-INT-J-INFO-SEC,
volume = "9",
number = "1",
pages = "19--32",
month = feb,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-009-0093-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:32 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-009-0093-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Goldschlag:2010:THB,
author = "David M. Goldschlag and Stuart G. Stubblebine and Paul
F. Syverson",
title = "Temporarily hidden bit commitment and lottery
applications",
journal = j-INT-J-INFO-SEC,
volume = "9",
number = "1",
pages = "33--50",
month = feb,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-009-0094-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:32 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-009-0094-1",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Chakraborty:2010:CDB,
author = "Anindya Chakraborty and Arun K. Majumdar and Shamik
Sural",
title = "A column dependency-based approach for static and
dynamic recovery of databases from malicious
transactions",
journal = j-INT-J-INFO-SEC,
volume = "9",
number = "1",
pages = "51--67",
month = feb,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-009-0095-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:32 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-009-0095-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Bayly:2010:FBS,
author = "Duncan Bayly and Maurice Castro and Arathi Arakala and
Jason Jeffers and Kathy Horadam",
title = "Fractional biometrics: safeguarding privacy in
biometric applications",
journal = j-INT-J-INFO-SEC,
volume = "9",
number = "1",
pages = "69--82",
month = feb,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-009-0096-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:32 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-009-0096-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Bella:2010:PGA,
author = "Giampaolo Bella",
title = "The principle of guarantee availability for security
protocol analysis",
journal = j-INT-J-INFO-SEC,
volume = "9",
number = "2",
pages = "83--97",
month = apr,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-009-0097-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:32 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-009-0097-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{deAlbuquerque:2010:FVA,
author = "Jo{\~a}o Porto de Albuquerque and Heiko Krumm and
Paulo L{\'\i}cio de Geus",
title = "Formal validation of automated policy refinement in
the management of network security systems",
journal = j-INT-J-INFO-SEC,
volume = "9",
number = "2",
pages = "99--125",
month = apr,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-010-0101-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:32 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-010-0101-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Knudsen:2010:CEA,
author = "Lars R. Knudsen and Charlotte V. Miolane",
title = "Counting equations in algebraic attacks on block
ciphers",
journal = j-INT-J-INFO-SEC,
volume = "9",
number = "2",
pages = "127--135",
month = apr,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-009-0099-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:32 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-009-0099-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Gauravaram:2010:HFU,
author = "Praveen Gauravaram and John Kelsey and Lars R. Knudsen
and S{\o}ren S. Thomsen",
title = "On hash functions using checksums",
journal = j-INT-J-INFO-SEC,
volume = "9",
number = "2",
pages = "137--151",
month = apr,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-009-0100-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:32 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/hash.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-009-0100-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
remark = "From the abstract: ``We analyse the security of
iterated hash functions that compute an input dependent
checksum which is processed as part of the hash
computation. We show that a large class of such
schemes, including those using non-linear or even
one-way checksum functions, is not secure against the
second preimage attack of Kelsey and Schneier, the
herding attack of Kelsey and Kohno and the
multicollision attack of Joux. Our attacks also apply
to a large class of cascaded hash functions.''",
}
@Article{Lin:2010:MTE,
author = "Ching Lin and Vijay Varadharajan",
title = "{MobileTrust}: a trust enhanced security architecture
for mobile agent systems",
journal = j-INT-J-INFO-SEC,
volume = "9",
number = "3",
pages = "153--178",
month = jun,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-009-0098-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:33 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-009-0098-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Kundu:2010:DID,
author = "Amlan Kundu and Shamik Sural and A. K. Majumdar",
title = "Database intrusion detection using sequence
alignment",
journal = j-INT-J-INFO-SEC,
volume = "9",
number = "3",
pages = "179--191",
month = jun,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-010-0102-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:33 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-010-0102-5",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Buhan:2010:ERC,
author = "Ileana Buhan and Jeroen Doumen and Pieter Hartel and
Qian Tang and Raymond Veldhuis",
title = "Embedding renewable cryptographic keys into noisy
data",
journal = j-INT-J-INFO-SEC,
volume = "9",
number = "3",
pages = "193--208",
month = jun,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-010-0103-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:33 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-010-0103-4",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Ben-Ghorbel-Talbi:2010:DME,
author = "Meriam Ben-Ghorbel-Talbi and Fr{\'e}d{\'e}ric Cuppens
and Nora Cuppens-Boulahia and Adel Bouhoula",
title = "A delegation model for extended {RBAC}",
journal = j-INT-J-INFO-SEC,
volume = "9",
number = "3",
pages = "209--236",
month = jun,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-010-0104-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:33 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-010-0104-3",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Ding:2010:NHA,
author = "Xuhua Ding and Yanjiang Yang and Robert H. Deng and
Shuhong Wang",
title = "A new hardware-assisted {PIR} with {$ O(n) $} shuffle
cost",
journal = j-INT-J-INFO-SEC,
volume = "9",
number = "4",
pages = "237--252",
month = aug,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-010-0105-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:33 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-010-0105-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
keywords = "private information retrieval (PIR)",
}
@Article{Lin:2010:ECE,
author = "Dan Lin and Prathima Rao and Elisa Bertino and Ninghui
Li and Jorge Lobo",
title = "{EXAM}: a comprehensive environment for the analysis
of access control policies",
journal = j-INT-J-INFO-SEC,
volume = "9",
number = "4",
pages = "253--273",
month = aug,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-010-0106-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:33 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-010-0106-1",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Pais:2010:NPR,
author = "Alwyn R. Pais and Shankar Joshi",
title = "A new probabilistic rekeying method for secure
multicast groups",
journal = j-INT-J-INFO-SEC,
volume = "9",
number = "4",
pages = "275--286",
month = aug,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-010-0108-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:33 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-010-0108-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Liu:2010:EOO,
author = "Joseph K. Liu and Joonsang Baek and Jianying Zhou and
Yanjiang Yang and Jun Wen Wong",
title = "Efficient online\slash offline identity-based
signature for wireless sensor network",
journal = j-INT-J-INFO-SEC,
volume = "9",
number = "4",
pages = "287--296",
month = aug,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-010-0109-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:33 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-010-0109-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Yuen:2010:HCI,
author = "Tsz Hon Yuen and Willy Susilo and Yi Mu",
title = "How to construct identity-based signatures without the
key escrow problem",
journal = j-INT-J-INFO-SEC,
volume = "9",
number = "4",
pages = "297--311",
month = aug,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-010-0110-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:33 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-010-0110-5",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Dupasquier:2010:AIL,
author = "Beno{\^\i}t Dupasquier and Stefan Burschka and Kieran
McLaughlin and Sakir Sezer",
title = "Analysis of information leakage from encrypted {Skype}
conversations",
journal = j-INT-J-INFO-SEC,
volume = "9",
number = "5",
pages = "313--325",
month = oct,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-010-0111-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:33 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-010-0111-4",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Skoric:2010:FDS,
author = "Boris Skori{\'c} and Marc X. Makkes",
title = "Flowchart description of security primitives for
controlled physical unclonable functions",
journal = j-INT-J-INFO-SEC,
volume = "9",
number = "5",
pages = "327--335",
month = oct,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-010-0113-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:33 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-010-0113-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Sajedi:2010:UCT,
author = "Hedieh Sajedi and Mansour Jamzad",
title = "Using contourlet transform and cover selection for
secure steganography",
journal = j-INT-J-INFO-SEC,
volume = "9",
number = "5",
pages = "337--352",
month = oct,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-010-0112-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:33 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-010-0112-3",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Chen:2010:HSS,
author = "Haiyong Chen and Hailiang Chen",
title = "A hybrid scheme for securing fingerprint templates",
journal = j-INT-J-INFO-SEC,
volume = "9",
number = "5",
pages = "353--361",
month = oct,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-010-0114-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:33 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-010-0114-1",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Baek:2010:RAR,
author = "Yoo-Jin Baek",
title = "Regular $ 2^w$-ary right-to-left exponentiation
algorithm with very efficient {DPA} and {FA}
countermeasures",
journal = j-INT-J-INFO-SEC,
volume = "9",
number = "5",
pages = "363--370",
month = oct,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-010-0118-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:33 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-010-0118-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Damgaard:2010:GPP,
author = "Ivan Damg{\aa}rd and Mads Jurik and Jesper Buus
Nielsen",
title = "A generalization of {Paillier}'s public-key system
with applications to electronic voting",
journal = j-INT-J-INFO-SEC,
volume = "9",
number = "6",
pages = "371--385",
month = dec,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-010-0119-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:34 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-010-0119-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{MacKenzie:2010:PAK,
author = "Philip MacKenzie and Sarvar Patel and Ram
Swaminathan",
title = "Password-authenticated key exchange based on {RSA}",
journal = j-INT-J-INFO-SEC,
volume = "9",
number = "6",
pages = "387--410",
month = dec,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-010-0120-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:34 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-010-0120-3",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Naor:2010:ETR,
author = "Moni Naor and Benny Pinkas",
title = "Efficient trace and revoke schemes",
journal = j-INT-J-INFO-SEC,
volume = "9",
number = "6",
pages = "411--424",
month = dec,
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-010-0121-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:34 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-010-0121-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Baumgarten:2011:CSH,
author = "Alex Baumgarten and Michael Steffen and Matthew
Clausman and Joseph Zambreno",
title = "A case study in hardware {Trojan} design and
implementation",
journal = j-INT-J-INFO-SEC,
volume = "10",
number = "1",
pages = "1--14",
month = feb,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-010-0115-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:34 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-010-0115-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Lim:2011:IBC,
author = "Hoon Wei Lim and Kenneth G. Paterson",
title = "Identity-based cryptography for grid security",
journal = j-INT-J-INFO-SEC,
volume = "10",
number = "1",
pages = "15--32",
month = feb,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-010-0116-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:34 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-010-0116-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Peng:2011:MOS,
author = "Kun Peng and Ed Dawson and Feng Bao",
title = "Modification and optimisation of a shuffling scheme:
stronger security, formal analysis and higher
efficiency",
journal = j-INT-J-INFO-SEC,
volume = "10",
number = "1",
pages = "33--47",
month = feb,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-010-0117-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:34 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-010-0117-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Peng:2011:GEC,
author = "Kun Peng",
title = "A general and efficient countermeasure to relation
attacks in mix-based e-voting",
journal = j-INT-J-INFO-SEC,
volume = "10",
number = "1",
pages = "49--60",
month = feb,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-010-0122-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:34 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-010-0122-1",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Anonymous:2011:P,
author = "Anonymous",
title = "Preface",
journal = j-INT-J-INFO-SEC,
volume = "10",
number = "2",
pages = "61--61",
month = jun,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-011-0134-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:35 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-011-0134-5;
http://link.springer.com/content/pdf/10.1007/s10207-011-0134-5.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Coker:2011:PRA,
author = "George Coker and Joshua Guttman and Peter Loscocco and
Amy Herzog and Jonathan Millen and Brian O'Hanlon and
John Ramsdell and Ariel Segall and Justin Sheehy and
Brian Sniffen",
title = "Principles of remote attestation",
journal = j-INT-J-INFO-SEC,
volume = "10",
number = "2",
pages = "63--81",
month = jun,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-011-0124-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:35 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-011-0124-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{DiPierro:2011:PTC,
author = "Alessandra {Di Pierro} and Chris Hankin and Herbert
Wiklicky",
title = "Probabilistic timing covert channels: to close or not
to close?",
journal = j-INT-J-INFO-SEC,
volume = "10",
number = "2",
pages = "83--106",
month = jun,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-010-0107-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:35 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-010-0107-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Backes:2011:CSS,
author = "Michael Backes and Iliano Cervesato and Aaron D.
Jaggard and Andre Scedrov and Joe-Kai Tsay",
title = "Cryptographically sound security proofs for basic and
public-key {Kerberos}",
journal = j-INT-J-INFO-SEC,
volume = "10",
number = "2",
pages = "107--134",
month = jun,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-011-0125-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:35 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-011-0125-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Anonymous:2011:SIS,
author = "Anonymous",
title = "Special issue on ``{SCADA} and control system
security''",
journal = j-INT-J-INFO-SEC,
volume = "10",
number = "2",
pages = "135--136",
month = jun,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-011-0128-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:35 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-011-0128-3",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Crampton:2011:UFC,
author = "Jason Crampton and Hoon Wei Lim and Kenneth G.
Paterson and Geraint Price",
title = "User-friendly and certificate-free grid security
infrastructure",
journal = j-INT-J-INFO-SEC,
volume = "10",
number = "3",
pages = "137--153",
month = jun,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-011-0123-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:35 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-011-0123-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Zhu:2011:SLA,
author = "Wen Tao Zhu and Yang Xiang and Jianying Zhou and
Robert H. Deng and Feng Bao",
title = "Secure localization with attack detection in wireless
sensor networks",
journal = j-INT-J-INFO-SEC,
volume = "10",
number = "3",
pages = "155--171",
month = jun,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-011-0127-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:35 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-011-0127-4",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Roelse:2011:DST,
author = "Peter Roelse",
title = "Dynamic subtree tracing and its application in
pay-{TV} systems",
journal = j-INT-J-INFO-SEC,
volume = "10",
number = "3",
pages = "173--187",
month = jun,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-011-0126-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:35 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
note = "See erratum \cite{Roelse:2011:EDS}.",
URL = "http://link.springer.com/article/10.1007/s10207-011-0126-5",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Kate:2011:GCB,
author = "Aniket Kate and Ian Goldberg",
title = "Generalizing cryptosystems based on the subset sum
problem",
journal = j-INT-J-INFO-SEC,
volume = "10",
number = "3",
pages = "189--199",
month = jun,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-011-0129-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:35 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-011-0129-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Ustaoglu:2011:IIB,
author = "Berkant Ustao{\u{g}}lu",
title = "Integrating identity-based and certificate-based
authenticated key exchange protocols",
journal = j-INT-J-INFO-SEC,
volume = "10",
number = "4",
pages = "201--212",
month = aug,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-011-0136-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:35 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-011-0136-3",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Saxena:2011:DRE,
author = "Nitesh Saxena and Jonathan Voris",
title = "Data remanence effects on memory-based entropy
collection for {RFID} systems",
journal = j-INT-J-INFO-SEC,
volume = "10",
number = "4",
pages = "213--222",
month = aug,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-011-0139-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:35 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-011-0139-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Bouzida:2011:CAB,
author = "Yacine Bouzida and Luigi Logrippo and Serge
Mankovski",
title = "Concrete- and abstract-based access control",
journal = j-INT-J-INFO-SEC,
volume = "10",
number = "4",
pages = "223--238",
month = aug,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-011-0138-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:35 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-011-0138-1",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Bielova:2011:DYR,
author = "Nataliia Bielova and Fabio Massacci",
title = "Do you really mean what you actually enforced?",
journal = j-INT-J-INFO-SEC,
volume = "10",
number = "4",
pages = "239--254",
month = aug,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-011-0137-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:35 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-011-0137-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Hanley:2011:UTD,
author = "Neil Hanley and Michael Tunstall and William P.
Marnane",
title = "Using templates to distinguish multiplications from
squaring operations",
journal = j-INT-J-INFO-SEC,
volume = "10",
number = "4",
pages = "255--266",
month = aug,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-011-0135-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:35 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-011-0135-4",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Jajodia:2011:MGE,
author = "Sushil Jajodia and Jianying Zhou",
title = "Message from the {Guest Editors}",
journal = j-INT-J-INFO-SEC,
volume = "10",
number = "5",
pages = "267--268",
month = oct,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-011-0131-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:36 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-011-0131-8;
http://link.springer.com/content/pdf/10.1007/s10207-011-0131-8.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Kong:2011:SSA,
author = "Deguang Kong and Yoon-Chan Jhi and Tao Gong and Sencun
Zhu and Peng Liu and Hongsheng Xi",
title = "{SAS}: semantics aware signature generation for
polymorphic worm detection",
journal = j-INT-J-INFO-SEC,
volume = "10",
number = "5",
pages = "269--283",
month = oct,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-011-0132-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:36 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-011-0132-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Chang:2011:EHS,
author = "Ee-Chien Chang and Liming Lu and Yongzheng Wu and
Roland H. C. Yap and Jie Yu",
title = "Enhancing host security using external environment
sensors",
journal = j-INT-J-INFO-SEC,
volume = "10",
number = "5",
pages = "285--299",
month = oct,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-011-0130-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:36 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-011-0130-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Marconi:2011:CPE,
author = "Luciana Marconi and Mauro Conti and Roberto {Di
Pietro}",
title = "{CASSANDRA}: a probabilistic, efficient, and
privacy-preserving solution to compute set
intersection",
journal = j-INT-J-INFO-SEC,
volume = "10",
number = "5",
pages = "301--319",
month = oct,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-011-0133-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:36 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-011-0133-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Gyorffy:2011:TBG,
author = "John Charles Gyorffy and Andrew F. Tappenden and James
Miller",
title = "Token-based graphical password authentication",
journal = j-INT-J-INFO-SEC,
volume = "10",
number = "6",
pages = "321--336",
month = nov,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-011-0147-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:36 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-011-0147-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Glisson:2011:ERW,
author = "William Bradley Glisson and Tim Storer and Gavin
Mayall and Iain Moug and George Grispos",
title = "Electronic retention: what does your mobile phone
reveal about you?",
journal = j-INT-J-INFO-SEC,
volume = "10",
number = "6",
pages = "337--349",
month = nov,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-011-0144-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:36 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-011-0144-3",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Garcia:2011:SID,
author = "Sergio S{\'a}nchez Garc{\'\i}a and Ana G{\'o}mez Oliva
and Emilia P{\'e}rez Belleboni and Iv{\'a}n Pau de la
Cruz",
title = "Solving identity delegation problem in the
e-government environment",
journal = j-INT-J-INFO-SEC,
volume = "10",
number = "6",
pages = "351--372",
month = nov,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-011-0140-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:36 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-011-0140-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Huang:2011:ESD,
author = "Qiong Huang and Guomin Yang and Duncan S. Wong and
Willy Susilo",
title = "Efficient strong designated verifier signature schemes
without random oracle or with non-delegatability",
journal = j-INT-J-INFO-SEC,
volume = "10",
number = "6",
pages = "373--385",
month = nov,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-011-0146-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:36 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-011-0146-1",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Miret:2011:CAH,
author = "Josep M. Miret and Francesc Seb{\'e}",
title = "Cryptanalysis of an ad-hoc cryptosystem for mix-based
e-voting robust against relation attacks",
journal = j-INT-J-INFO-SEC,
volume = "10",
number = "6",
pages = "387--389",
month = nov,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-011-0145-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:36 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-011-0145-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Roelse:2011:EDS,
author = "Peter Roelse",
title = "Erratum to: {Dynamic subtree tracing and its
application in pay-TV systems}",
journal = j-INT-J-INFO-SEC,
volume = "10",
number = "6",
pages = "391--391",
month = nov,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-011-0141-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:36 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
note = "See \cite{Roelse:2011:DST}.",
URL = "http://link.springer.com/article/10.1007/s10207-011-0141-6;
http://link.springer.com/content/pdf/10.1007/s10207-011-0141-6.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Fiore:2012:RBS,
author = "D. Fiore and R. Gennaro and N. P. Smart",
title = "Relations between the security models for
certificateless encryption and {ID}-based key
agreement",
journal = j-INT-J-INFO-SEC,
volume = "11",
number = "1",
pages = "1--22",
month = feb,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-011-0149-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:36 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-011-0149-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Peng:2012:TDA,
author = "Kun Peng",
title = "Threshold distributed access control with public
verification: a practical application of {PVSS}",
journal = j-INT-J-INFO-SEC,
volume = "11",
number = "1",
pages = "23--31",
month = feb,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-011-0151-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:36 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-011-0151-4",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Ates:2012:WHI,
author = "Mika{\"e}l Ates and Francesco Buccafurri and Jacques
Fayolle and Gianluca Lax",
title = "A warning on how to implement anonymous credential
protocols into the information card framework",
journal = j-INT-J-INFO-SEC,
volume = "11",
number = "1",
pages = "33--40",
month = feb,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-011-0150-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:36 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-011-0150-5",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Wang:2012:SGN,
author = "Yuanzhuo Wang and Min Yu and Jingyuan Li and Kun Meng
and Chuang Lin and Xueqi Cheng",
title = "Stochastic game net and applications in security
analysis for enterprise network",
journal = j-INT-J-INFO-SEC,
volume = "11",
number = "1",
pages = "41--52",
month = feb,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-011-0148-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:36 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-011-0148-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Huang:2012:NEO,
author = "Qiong Huang and Guomin Yang and Duncan S. Wong and
Willy Susilo",
title = "A new efficient optimistic fair exchange protocol
without random oracles",
journal = j-INT-J-INFO-SEC,
volume = "11",
number = "1",
pages = "53--63",
month = feb,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-011-0152-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:36 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-011-0152-3",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Guerra-Casanova:2012:AMD,
author = "J. Guerra-Casanova and C. S{\'a}nchez-{\'A}vila and G.
Bailador and A. de Santos Sierra",
title = "Authentication in mobile devices through hand gesture
recognition",
journal = j-INT-J-INFO-SEC,
volume = "11",
number = "2",
pages = "65--83",
month = apr,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-012-0154-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:37 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-012-0154-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Nuida:2012:SCS,
author = "Koji Nuida",
title = "Short collusion-secure fingerprint codes against three
pirates",
journal = j-INT-J-INFO-SEC,
volume = "11",
number = "2",
pages = "85--102",
month = apr,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-012-0155-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:37 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-012-0155-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Andreeva:2012:SAS,
author = "Elena Andreeva and Andrey Bogdanov and Bart Mennink
and Bart Preneel and Christian Rechberger",
title = "On security arguments of the second round {SHA-3}
candidates",
journal = j-INT-J-INFO-SEC,
volume = "11",
number = "2",
pages = "103--120",
month = apr,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-012-0156-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:37 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/hash.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-012-0156-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
keywords = "Classification; Differential attacks; Hash functions;
Security reductions; SHA-3 competition; US National
Institute for Standards and Technology (NIST)
cryptographic hash algorithm design competition",
}
@Article{Gritzalis:2012:FAR,
author = "Dimitris Gritzalis and Panagiotis Katsaros and
Stylianos Basagiannis and Yannis Soupionis",
title = "Formal analysis for robust anti-{SPIT} protection
using model checking",
journal = j-INT-J-INFO-SEC,
volume = "11",
number = "2",
pages = "121--135",
month = apr,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-012-0159-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:37 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-012-0159-4",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Niebuhr:2012:SPS,
author = "Robert Niebuhr and Mohammed Meziani and Stanislav
Bulygin and Johannes Buchmann",
title = "Selecting parameters for secure {McEliece}-based
cryptosystems",
journal = j-INT-J-INFO-SEC,
volume = "11",
number = "3",
pages = "137--147",
month = jun,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-011-0153-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:37 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-011-0153-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Andreeva:2012:PFG,
author = "Elena Andreeva and Bart Mennink and Bart Preneel",
title = "The parazoa family: generalizing the sponge hash
functions",
journal = j-INT-J-INFO-SEC,
volume = "11",
number = "3",
pages = "149--165",
month = jun,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-012-0157-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:37 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/hash.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-012-0157-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Dewri:2012:OSH,
author = "Rinku Dewri and Indrajit Ray and Nayot Poolsappasit
and Darrell Whitley",
title = "Optimal security hardening on attack tree models of
networks: a cost-benefit analysis",
journal = j-INT-J-INFO-SEC,
volume = "11",
number = "3",
pages = "167--188",
month = jun,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-012-0160-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:37 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-012-0160-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Das:2012:RKE,
author = "Ashok Kumar Das",
title = "A random key establishment scheme for multi-phase
deployment in large-scale distributed sensor networks",
journal = j-INT-J-INFO-SEC,
volume = "11",
number = "3",
pages = "189--211",
month = jun,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-012-0162-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:37 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-012-0162-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Ahmed:2012:MGE,
author = "Irfan Ahmed and Martin Naedele and Bradley Schatz and
Ryoichi Sasaki and Andrew West",
title = "Message from the guest editors",
journal = j-INT-J-INFO-SEC,
volume = "11",
number = "4",
pages = "213--213",
month = aug,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-012-0168-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:37 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-012-0168-3;
http://link.springer.com/content/pdf/10.1007/s10207-012-0168-3.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Reaves:2012:OVT,
author = "Bradley Reaves and Thomas Morris",
title = "An open virtual testbed for industrial control system
security research",
journal = j-INT-J-INFO-SEC,
volume = "11",
number = "4",
pages = "215--229",
month = aug,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-012-0164-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:37 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-012-0164-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Hadziosmanovic:2012:LMA,
author = "Dina Hadziosmanovi{\'c} and Damiano Bolzoni and Pieter
H. Hartel",
title = "A log mining approach for process monitoring in
{SCADA}",
journal = j-INT-J-INFO-SEC,
volume = "11",
number = "4",
pages = "231--251",
month = aug,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-012-0163-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:37 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-012-0163-8;
http://link.springer.com/content/pdf/10.1007/s10207-012-0163-8.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Sole:2012:EMT,
author = "Marc Sol{\'e} and Victor Munt{\'e}s-Mulero and Jordi
Nin",
title = "Efficient microaggregation techniques for large
numerical data volumes",
journal = j-INT-J-INFO-SEC,
volume = "11",
number = "4",
pages = "253--267",
month = aug,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-012-0158-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:37 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-012-0158-5",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Yaseen:2012:ITM,
author = "Qussai Yaseen and Brajendra Panda",
title = "Insider threat mitigation: preventing unauthorized
knowledge acquisition",
journal = j-INT-J-INFO-SEC,
volume = "11",
number = "4",
pages = "269--280",
month = aug,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-012-0165-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:37 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-012-0165-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Huber:2012:PSS,
author = "Michael Huber",
title = "Perfect secrecy systems immune to spoofing attacks",
journal = j-INT-J-INFO-SEC,
volume = "11",
number = "4",
pages = "281--289",
month = aug,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-012-0166-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:37 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-012-0166-5",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Zhou:2012:MGE,
author = "Jianying Zhou and Xuejia Lai and Hui Li",
title = "Message from the {Guest Editors}",
journal = j-INT-J-INFO-SEC,
volume = "11",
number = "5",
pages = "291--292",
month = oct,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-012-0172-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:38 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-012-0172-7;
http://link.springer.com/content/pdf/10.1007/s10207-012-0172-7.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Xin:2012:RAA,
author = "Zhi Xin and Huiyu Chen and Xinche Wang and Peng Liu
and Sencun Zhu and Bing Mao and Li Xie",
title = "Replacement attacks: automatically evading
behavior-based software birthmark",
journal = j-INT-J-INFO-SEC,
volume = "11",
number = "5",
pages = "293--304",
month = oct,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-012-0170-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:38 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-012-0170-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Chen:2012:DHP,
author = "Liqun Chen and Yu Chen",
title = "The $n$-{Diffie--Hellman} problem and multiple-key
encryption",
journal = j-INT-J-INFO-SEC,
volume = "11",
number = "5",
pages = "305--320",
month = oct,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-012-0171-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:38 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-012-0171-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Kontaxis:2012:MID,
author = "Georgios Kontaxis and Michalis Polychronakis and
Evangelos P. Markatos",
title = "Minimizing information disclosure to third parties in
social login platforms",
journal = j-INT-J-INFO-SEC,
volume = "11",
number = "5",
pages = "321--332",
month = oct,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-012-0173-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:38 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-012-0173-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Golic:2012:NAM,
author = "Jovan Dj. Goli{\'c}",
title = "A new authentication model for ad hoc networks",
journal = j-INT-J-INFO-SEC,
volume = "11",
number = "5",
pages = "333--347",
month = oct,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-012-0167-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:38 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-012-0167-4",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Camacho:2012:SAC,
author = "Philippe Camacho and Alejandro Hevia and Marcos Kiwi
and Roberto Opazo",
title = "Strong accumulators from collision-resistant hashing",
journal = j-INT-J-INFO-SEC,
volume = "11",
number = "5",
pages = "349--363",
month = oct,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-012-0169-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:38 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/hash.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-012-0169-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Perez-Mendez:2012:CLS,
author = "Alejandro P{\'e}rez-M{\'e}ndez and Fernando
Pere{\~n}{\'\i}guez-Garc{\'\i}a and Rafael
Mar{\'\i}n-L{\'o}pez and Gabriel L{\'o}pez-Mill{\'a}n",
title = "A cross-layer {SSO} solution for federating access to
kerberized services in the {eduroam\slash DAMe}
network",
journal = j-INT-J-INFO-SEC,
volume = "11",
number = "6",
pages = "365--388",
month = nov,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-012-0174-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:38 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-012-0174-5",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Han:2012:NCO,
author = "Jinguang Han and Willy Susilo and Yi Mu and Jun Yan",
title = "New constructions of {OSBE} schemes and their
applications in oblivious access control",
journal = j-INT-J-INFO-SEC,
volume = "11",
number = "6",
pages = "389--401",
month = nov,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-012-0176-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:38 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-012-0176-3",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Bogdanov:2012:HPS,
author = "Dan Bogdanov and Margus Niitsoo and Tomas Toft and Jan
Willemson",
title = "High-performance secure multi-party computation for
data mining applications",
journal = j-INT-J-INFO-SEC,
volume = "11",
number = "6",
pages = "403--418",
month = nov,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-012-0177-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:38 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-012-0177-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Bagheri:2012:SFP,
author = "Nasour Bagheri and Praveen Gauravaram and Lars R.
Knudsen and Erik Zenner",
title = "The suffix-free-prefix-free hash function construction
and its indifferentiability security analysis",
journal = j-INT-J-INFO-SEC,
volume = "11",
number = "6",
pages = "419--434",
month = nov,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-012-0175-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:38 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/hash.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-012-0175-4",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{DArco:2013:TTR,
author = "Paolo D'Arco and Angel Perez del Pozo",
title = "Toward tracing and revoking schemes secure against
collusion and any form of secret information leakage",
journal = j-INT-J-INFO-SEC,
volume = "12",
number = "1",
pages = "1--17",
month = feb,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-012-0186-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:38 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-012-0186-1",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Abe:2013:DTA,
author = "Masayuki Abe and Sherman S. M. Chow and Kristiyan
Haralambiev and Miyako Ohkubo",
title = "Double-trapdoor anonymous tags for traceable
signatures",
journal = j-INT-J-INFO-SEC,
volume = "12",
number = "1",
pages = "19--31",
month = feb,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-012-0184-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:38 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-012-0184-3",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Catalano:2013:FNI,
author = "Dario Catalano and Mario {Di Raimondo} and Dario Fiore
and Rosario Gennaro and Orazio Puglisi",
title = "Fully non-interactive onion routing with forward
secrecy",
journal = j-INT-J-INFO-SEC,
volume = "12",
number = "1",
pages = "33--47",
month = feb,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-012-0185-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:38 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-012-0185-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{DeCristofaro:2013:PDC,
author = "Emiliano {De Cristofaro} and Mark Manulis and Bertram
Poettering",
title = "Private discovery of common social contacts",
journal = j-INT-J-INFO-SEC,
volume = "12",
number = "1",
pages = "49--65",
month = feb,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-012-0183-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:38 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-012-0183-4",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Marmol:2013:PEA,
author = "F{\'e}lix G{\'o}mez M{\'a}rmol and Christoph Sorge and
Ronald Petrlic and Osman Ugus and Dirk Westhoff and
Gregorio Mart{\'\i}nez P{\'e}rez",
title = "Privacy-enhanced architecture for smart metering",
journal = j-INT-J-INFO-SEC,
volume = "12",
number = "2",
pages = "67--82",
month = apr,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-012-0181-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:39 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-012-0181-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Asghar:2013:CCH,
author = "Hassan Jameel Asghar and Shujun Li and Josef Pieprzyk
and Huaxiong Wang",
title = "Cryptanalysis of the convex hull click human
identification protocol",
journal = j-INT-J-INFO-SEC,
volume = "12",
number = "2",
pages = "83--96",
month = apr,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-012-0161-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:39 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-012-0161-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Alsaleh:2013:EAA,
author = "Mansour Alsaleh and P. C. van Oorschot",
title = "Evaluation in the absence of absolute ground truth:
toward reliable evaluation methodology for scan
detectors",
journal = j-INT-J-INFO-SEC,
volume = "12",
number = "2",
pages = "97--110",
month = apr,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-012-0178-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:39 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-012-0178-1",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Abbadi:2013:FET,
author = "Imad M. Abbadi",
title = "A framework for establishing trust in Cloud
provenance",
journal = j-INT-J-INFO-SEC,
volume = "12",
number = "2",
pages = "111--128",
month = apr,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-012-0179-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:39 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-012-0179-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Rebollo-Monedero:2013:MPA,
author = "David Rebollo-Monedero and Javier Parra-Arnau and
Claudia Diaz and Jordi Forn{\'e}",
title = "On the measurement of privacy as an attacker's
estimation error",
journal = j-INT-J-INFO-SEC,
volume = "12",
number = "2",
pages = "129--149",
month = apr,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-012-0182-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:39 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-012-0182-5",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Rizomiliotis:2013:SAP,
author = "Panagiotis Rizomiliotis and Stefanos Gritzalis",
title = "On the security of {AUTH}, a provably secure
authentication protocol based on the subspace {LPN}
problem",
journal = j-INT-J-INFO-SEC,
volume = "12",
number = "2",
pages = "151--154",
month = apr,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-012-0188-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:39 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-012-0188-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Xu:2013:VBP,
author = "Wenjuan Xu and Mohamed Shehab and Gail-Joon Ahn",
title = "Visualization-based policy analysis for {SELinux}:
framework and user study",
journal = j-INT-J-INFO-SEC,
volume = "12",
number = "3",
pages = "155--171",
month = jun,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-012-0180-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:39 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-012-0180-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Tormo:2013:DAI,
author = "Gin{\'e}s D{\'o}lera Tormo and Gabriel L{\'o}pez
Mill{\'a}n and Gregorio Mart{\'\i}nez P{\'e}rez",
title = "Definition of an advanced identity management
infrastructure",
journal = j-INT-J-INFO-SEC,
volume = "12",
number = "3",
pages = "173--200",
month = jun,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-012-0189-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:39 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-012-0189-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Vrakas:2013:IDP,
author = "Nikos Vrakas and Costas Lambrinoudakis",
title = "An intrusion detection and prevention system for {IMS}
and {VoIP} services",
journal = j-INT-J-INFO-SEC,
volume = "12",
number = "3",
pages = "201--217",
month = jun,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-012-0187-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:39 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-012-0187-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Bernhard:2013:AAU,
author = "D. Bernhard and G. Fuchsbauer and E. Ghadafi and N. P.
Smart and B. Warinschi",
title = "Anonymous attestation with user-controlled
linkability",
journal = j-INT-J-INFO-SEC,
volume = "12",
number = "3",
pages = "219--249",
month = jun,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-013-0191-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:39 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-013-0191-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Phan:2013:ACB,
author = "Duong-Hieu Phan and David Pointcheval and Siamak F.
Shahandashti and Mario Strefler",
title = "Adaptive {CCA} broadcast encryption with constant-size
secret keys and ciphertexts",
journal = j-INT-J-INFO-SEC,
volume = "12",
number = "4",
pages = "251--265",
month = aug,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-013-0190-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:39 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-013-0190-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Brzuska:2013:LMR,
author = "C. Brzuska and M. Fischlin and N. P. Smart and B.
Warinschi and S. C. Williams",
title = "Less is more: relaxed yet composable security notions
for key exchange",
journal = j-INT-J-INFO-SEC,
volume = "12",
number = "4",
pages = "267--297",
month = aug,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-013-0192-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:39 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-013-0192-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Draper-Gil:2013:OFE,
author = "G. Draper-Gil and J. Zhou and J. L. Ferrer-Gomila and
M. F. Hinarejos",
title = "An optimistic fair exchange protocol with active
intermediaries",
journal = j-INT-J-INFO-SEC,
volume = "12",
number = "4",
pages = "299--318",
month = aug,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-013-0194-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:39 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-013-0194-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Beauquier:2013:SPE,
author = "Dani{\`e}le Beauquier and Jo{\"e}lle Cohen and Ruggero
Lanotte",
title = "Security policies enforcement using finite and
pushdown edit automata",
journal = j-INT-J-INFO-SEC,
volume = "12",
number = "4",
pages = "319--336",
month = aug,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-013-0195-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:39 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-013-0195-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Peng:2013:SAH,
author = "Kun Peng",
title = "A shuffle to achieve high efficiency through
pre-computation and batch verification",
journal = j-INT-J-INFO-SEC,
volume = "12",
number = "4",
pages = "337--345",
month = aug,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-013-0193-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:39 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-013-0193-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Boteanu:2013:CSQ,
author = "Daniel Boteanu and Jos{\'e} M. Fernandez",
title = "A comprehensive study of queue management as a {DoS}
counter-measure",
journal = j-INT-J-INFO-SEC,
volume = "12",
number = "5",
pages = "347--382",
month = oct,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-013-0197-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:40 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-013-0197-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Wang:2013:USM,
author = "Pu Wang and Marta C. Gonz{\'a}lez and Ronaldo Menezes
and Albert-L{\'a}szl{\'o} Barab{\'a}si",
title = "Understanding the spread of malicious mobile-phone
programs and their damage potential",
journal = j-INT-J-INFO-SEC,
volume = "12",
number = "5",
pages = "383--392",
month = oct,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-013-0203-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:40 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-013-0203-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Schreuders:2013:FBA,
author = "Z. Cliffe Schreuders and Christian Payne and Tanya
McGill",
title = "The functionality-based application confinement
model",
journal = j-INT-J-INFO-SEC,
volume = "12",
number = "5",
pages = "393--422",
month = oct,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-013-0199-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:40 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-013-0199-4",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Zakerzadeh:2013:DSA,
author = "Hessam Zakerzadeh and Sylvia L. Osborn",
title = "Delay-sensitive approaches for anonymizing numerical
streaming data",
journal = j-INT-J-INFO-SEC,
volume = "12",
number = "5",
pages = "423--437",
month = oct,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-013-0196-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:40 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-013-0196-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Bresson:2013:LLS,
author = "Emmanuel Bresson and Dario Catalano and Mario {Di
Raimondo} and Dario Fiore and Rosario Gennaro",
title = "Off-line\slash on-line signatures revisited: a general
unifying paradigm, efficient threshold variants and
experimental results",
journal = j-INT-J-INFO-SEC,
volume = "12",
number = "6",
pages = "439--465",
month = nov,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-013-0200-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:40 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-013-0200-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Kundu:2013:PPA,
author = "Ashish Kundu and Elisa Bertino",
title = "Privacy-preserving authentication of trees and
graphs",
journal = j-INT-J-INFO-SEC,
volume = "12",
number = "6",
pages = "467--494",
month = nov,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-013-0198-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:40 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-013-0198-5",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Chen:2013:AMA,
author = "Yu-Shian Chen and Chin-Laung Lei",
title = "Aggregate message authentication codes ({AMACs}) with
on-the-fly verification",
journal = j-INT-J-INFO-SEC,
volume = "12",
number = "6",
pages = "495--504",
month = nov,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-013-0202-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:40 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-013-0202-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Pereniguez-Garcia:2013:KPA,
author = "F. Pere{\~n}{\'\i}guez-Garc{\'\i}a and R.
Mar{\'\i}n-L{\'o}pez and G. Kambourakis and A.
Ruiz-Mart{\'\i}nez and S. Gritzalis and A. F.
Skarmeta-G{\'o}mez",
title = "{KAMU}: providing advanced user privacy in {Kerberos}
multi-domain scenarios",
journal = j-INT-J-INFO-SEC,
volume = "12",
number = "6",
pages = "505--525",
month = nov,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-013-0201-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:40 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-013-0201-1",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Liao:2014:POC,
author = "Qi Liao and Zhen Li",
title = "Portfolio optimization of computer and mobile
botnets",
journal = j-INT-J-INFO-SEC,
volume = "13",
number = "1",
pages = "1--14",
month = feb,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-013-0206-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:41 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-013-0206-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Mizuki:2014:FCB,
author = "Takaaki Mizuki and Hiroki Shizuya",
title = "A formalization of card-based cryptographic protocols
via abstract machine",
journal = j-INT-J-INFO-SEC,
volume = "13",
number = "1",
pages = "15--23",
month = feb,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-013-0219-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:41 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-013-0219-4",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Manulis:2014:PAI,
author = "Mark Manulis and Bertram Poettering and Douglas
Stebila",
title = "Plaintext awareness in identity-based key
encapsulation",
journal = j-INT-J-INFO-SEC,
volume = "13",
number = "1",
pages = "25--49",
month = feb,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-013-0218-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:41 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-013-0218-5",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Emura:2014:GSI,
author = "Keita Emura and Goichiro Hanaoka and Yusuke Sakai and
Jacob C. N. Schuldt",
title = "Group signature implies public-key encryption with
non-interactive opening",
journal = j-INT-J-INFO-SEC,
volume = "13",
number = "1",
pages = "51--62",
month = feb,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-013-0204-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:41 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-013-0204-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Granadillo:2014:RBC,
author = "Gustavo Gonzalez Granadillo and Malek Belhaouane and
Herv{\'e} Debar and Gr{\'e}goire Jacob",
title = "{RORI}-based countermeasure selection using the
{OrBAC} formalism",
journal = j-INT-J-INFO-SEC,
volume = "13",
number = "1",
pages = "63--79",
month = feb,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-013-0207-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:41 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-013-0207-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Saikia:2014:PHF,
author = "Navajit Saikia and Prabin K. Bora",
title = "Perceptual hash function for scalable video",
journal = j-INT-J-INFO-SEC,
volume = "13",
number = "1",
pages = "81--93",
month = feb,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-013-0211-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:41 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/hash.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-013-0211-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Anonymous:2014:SCC,
author = "Anonymous",
title = "Security in cloud computing",
journal = j-INT-J-INFO-SEC,
volume = "13",
number = "2",
pages = "95--96",
month = apr,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0232-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:41 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0232-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Gouglidis:2014:SPV,
author = "Antonios Gouglidis and Ioannis Mavridis and Vincent C.
Hu",
title = "Security policy verification for multi-domains in
cloud systems",
journal = j-INT-J-INFO-SEC,
volume = "13",
number = "2",
pages = "97--111",
month = apr,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-013-0205-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:41 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-013-0205-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Fernandes:2014:SIC,
author = "Diogo A. B. Fernandes and Liliana F. B. Soares and
Jo{\~a}o V. Gomes and M{\'a}rio M. Freire and Pedro R.
M. In{\'a}cio",
title = "Security issues in cloud environments: a survey",
journal = j-INT-J-INFO-SEC,
volume = "13",
number = "2",
pages = "113--170",
month = apr,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-013-0208-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:41 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-013-0208-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Bates:2014:DCR,
author = "Adam Bates and Benjamin Mood and Joe Pletcher and
Hannah Pruse and Masoud Valafar and Kevin Butler",
title = "On detecting co-resident cloud instances using network
flow watermarking techniques",
journal = j-INT-J-INFO-SEC,
volume = "13",
number = "2",
pages = "171--189",
month = apr,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-013-0210-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:41 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-013-0210-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Albeshri:2014:EGI,
author = "Aiiad Albeshri and Colin Boyd and Juan Gonz{\'a}lez
Nieto",
title = "Enhanced {GeoProof}: improved geographic assurance for
data in the cloud",
journal = j-INT-J-INFO-SEC,
volume = "13",
number = "2",
pages = "191--198",
month = apr,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-013-0217-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:41 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-013-0217-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Nunez:2014:BPP,
author = "David Nu{\~n}ez and Isaac Agudo",
title = "{BlindIdM}: a privacy-preserving approach for identity
management as a service",
journal = j-INT-J-INFO-SEC,
volume = "13",
number = "2",
pages = "199--215",
month = apr,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0230-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:41 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0230-4",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Mavrogiannopoulos:2014:TSK,
author = "Nikos Mavrogiannopoulos and Andreas Pashalidis and
Bart Preneel",
title = "Toward a secure {Kerberos} key exchange with smart
cards",
journal = j-INT-J-INFO-SEC,
volume = "13",
number = "3",
pages = "217--228",
month = jun,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-013-0213-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:41 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-013-0213-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Li:2014:AAM,
author = "Fudong Li and Nathan Clarke and Maria Papadaki and
Paul Dowland",
title = "Active authentication for mobile devices utilising
behaviour profiling",
journal = j-INT-J-INFO-SEC,
volume = "13",
number = "3",
pages = "229--244",
month = jun,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-013-0209-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:41 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-013-0209-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Wu:2014:SSP,
author = "Tzong-Sun Wu and Ming-Lun Lee and Han-Yu Lin and
Chao-Yuan Wang",
title = "Shoulder-surfing-proof graphical password
authentication scheme",
journal = j-INT-J-INFO-SEC,
volume = "13",
number = "3",
pages = "245--254",
month = jun,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-013-0216-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:41 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-013-0216-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Mu:2014:RBD,
author = "Chengpo Mu and Meng Yu and Yingjiu Li and Wanyu Zang",
title = "Risk balance defense approach against intrusions for
network server",
journal = j-INT-J-INFO-SEC,
volume = "13",
number = "3",
pages = "255--269",
month = jun,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-013-0214-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:41 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-013-0214-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Lian:2014:PSC,
author = "Bin Lian and Gongliang Chen and Jianhua Li",
title = "Provably secure E-cash system with practical and
efficient complete tracing",
journal = j-INT-J-INFO-SEC,
volume = "13",
number = "3",
pages = "271--289",
month = jun,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0240-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:41 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0240-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{McEvoy:2014:ANT,
author = "Robert P. McEvoy and Michael Tunstall and Claire
Whelan and Colin C. Murphy and William P. Marnane",
title = "{All-or-Nothing Transforms} as a countermeasure to
differential side-channel analysis",
journal = j-INT-J-INFO-SEC,
volume = "13",
number = "3",
pages = "291--304",
month = jun,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-013-0212-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:41 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-013-0212-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Kim:2014:EVE,
author = "Kee Sung Kim and Ik Rae Jeong",
title = "Efficient verifiably encrypted signatures from
lattices",
journal = j-INT-J-INFO-SEC,
volume = "13",
number = "4",
pages = "305--314",
month = aug,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0226-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:42 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0226-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Sepahi:2014:LBC,
author = "Reza Sepahi and Ron Steinfeld and Josef Pieprzyk",
title = "Lattice-based certificateless public-key encryption in
the standard model",
journal = j-INT-J-INFO-SEC,
volume = "13",
number = "4",
pages = "315--333",
month = aug,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-013-0215-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:42 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-013-0215-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Bertoni:2014:SCS,
author = "Guido Bertoni and Joan Daemen and Micha{\"e}l Peeters
and Gilles {Van Assche}",
title = "Sufficient conditions for sound tree and sequential
hashing modes",
journal = j-INT-J-INFO-SEC,
volume = "13",
number = "4",
pages = "335--353",
month = aug,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-013-0220-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:42 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/hash.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-013-0220-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Alabrah:2014:ESC,
author = "Amerah Alabrah and Jeffrey Cashion and Mostafa
Bassiouni",
title = "Enhancing security of cookie-based sessions in mobile
networks using sparse caching",
journal = j-INT-J-INFO-SEC,
volume = "13",
number = "4",
pages = "355--366",
month = aug,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-013-0223-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:42 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-013-0223-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Shameli-Sendi:2014:ACA,
author = "Alireza Shameli-Sendi and Michel Dagenais",
title = "{ARITO}: Cyber-attack response system using accurate
risk impact tolerance",
journal = j-INT-J-INFO-SEC,
volume = "13",
number = "4",
pages = "367--390",
month = aug,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-013-0222-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:42 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-013-0222-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Mousazadeh:2014:RGA,
author = "Mousa Mousazadeh and Behrouz Tork Ladani",
title = "Randomized gossip algorithms under attack",
journal = j-INT-J-INFO-SEC,
volume = "13",
number = "4",
pages = "391--402",
month = aug,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-013-0221-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:42 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-013-0221-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Garcia:2014:WLS,
author = "Flavio D. Garcia and Gerhard de Koning Gans and Roel
Verdult",
title = "Wirelessly lockpicking a smart card reader",
journal = j-INT-J-INFO-SEC,
volume = "13",
number = "5",
pages = "403--420",
month = oct,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0234-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:42 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0234-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Catuogno:2014:ATF,
author = "Luigi Catuogno and Clemente Galdi",
title = "Analysis of a two-factor graphical password scheme",
journal = j-INT-J-INFO-SEC,
volume = "13",
number = "5",
pages = "421--437",
month = oct,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0228-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:42 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0228-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Zhang:2014:DFA,
author = "Meng Zhang and Anand Raghunathan and Niraj K. Jha",
title = "A defense framework against malware and vulnerability
exploits",
journal = j-INT-J-INFO-SEC,
volume = "13",
number = "5",
pages = "439--452",
month = oct,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0233-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:42 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0233-1",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Yasmin:2014:PSP,
author = "Rehana Yasmin and Eike Ritter and Guilin Wang",
title = "Provable security of a pairing-free one-pass
authenticated key establishment protocol for wireless
sensor networks",
journal = j-INT-J-INFO-SEC,
volume = "13",
number = "5",
pages = "453--465",
month = oct,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-013-0224-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:42 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-013-0224-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Gao:2014:TTR,
author = "Weizheng Gao and Kashi Neupane and Rainer Steinwandt",
title = "Tuning a two-round group key agreement",
journal = j-INT-J-INFO-SEC,
volume = "13",
number = "5",
pages = "467--476",
month = oct,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-013-0225-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:42 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-013-0225-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Shin:2014:AAA,
author = "Sooyeon Shin and Taekyoung Kwon",
title = "{AAnA}: Anonymous authentication and authorization
based on short traceable signatures",
journal = j-INT-J-INFO-SEC,
volume = "13",
number = "5",
pages = "477--495",
month = oct,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0227-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:42 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0227-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Herranz:2014:SEA,
author = "Javier Herranz and Jordi Nin",
title = "Secure and efficient anonymization of distributed
confidential databases",
journal = j-INT-J-INFO-SEC,
volume = "13",
number = "6",
pages = "497--512",
month = nov,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0237-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:42 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0237-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Lee:2014:AGU,
author = "Ming-Feng Lee and Nigel P. Smart and Bogdan Warinschi
and Gaven J. Watson",
title = "Anonymity guarantees of the {UMTS\slash LTE}
authentication and connection protocol",
journal = j-INT-J-INFO-SEC,
volume = "13",
number = "6",
pages = "513--527",
month = nov,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0231-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:42 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0231-3",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Veeningen:2014:DMC,
author = "Meilof Veeningen and Benne de Weger and Nicola
Zannone",
title = "Data minimisation in communication protocols: a formal
analysis framework and application to identity
management",
journal = j-INT-J-INFO-SEC,
volume = "13",
number = "6",
pages = "529--569",
month = nov,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0235-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:42 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0235-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Jovanovikj:2014:CMS,
author = "Vladimir Jovanovikj and Dusan Gabrijelcic and Tomaz
Klobucar",
title = "A conceptual model of security context",
journal = j-INT-J-INFO-SEC,
volume = "13",
number = "6",
pages = "571--581",
month = nov,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0229-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:42 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0229-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Sen:2014:UIW,
author = "Sevil Sen",
title = "Using instance-weighted naive {Bayes} for adapting
concept drift in masquerade detection",
journal = j-INT-J-INFO-SEC,
volume = "13",
number = "6",
pages = "583--590",
month = nov,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0238-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:42 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0238-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Han:2015:MAU,
author = "Kyoung Soo Han and Jae Hyun Lim and Boojoong Kang and
Eul Gyu Im",
title = "Malware analysis using visualized images and entropy
graphs",
journal = j-INT-J-INFO-SEC,
volume = "14",
number = "1",
pages = "1--14",
month = feb,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0242-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:43 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0242-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Nappa:2015:MDI,
author = "Antonio Nappa and M. Zubair Rafique and Juan
Caballero",
title = "The {MALICIA} dataset: identification and analysis of
drive-by download operations",
journal = j-INT-J-INFO-SEC,
volume = "14",
number = "1",
pages = "15--33",
month = feb,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0248-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:43 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0248-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Silva:2015:RMP,
author = "Helber Silva and Aldri Santos and Michele Nogueira",
title = "Routing management for performance and security
tradeoff in wireless mesh networks",
journal = j-INT-J-INFO-SEC,
volume = "14",
number = "1",
pages = "35--46",
month = feb,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0246-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:43 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0246-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Dolzhenko:2015:MRE,
author = "Egor Dolzhenko and Jay Ligatti and Srikar Reddy",
title = "Modeling runtime enforcement with mandatory results
automata",
journal = j-INT-J-INFO-SEC,
volume = "14",
number = "1",
pages = "47--60",
month = feb,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0239-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:43 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0239-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Valenzuela:2015:MAO,
author = "Michael Valenzuela and Ferenc Szidarovszky and Jerzy
Rozenblit",
title = "A multiresolution approach for optimal defense against
random attacks",
journal = j-INT-J-INFO-SEC,
volume = "14",
number = "1",
pages = "61--72",
month = feb,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0245-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:43 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0245-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Tonicelli:2015:ITS,
author = "Rafael Tonicelli and Anderson C. A. Nascimento and
Rafael Dowsley and J{\"o}rn M{\"u}ller-Quade and Hideki
Imai and Goichiro Hanaoka and Akira Otsuka",
title = "Information-theoretically secure oblivious polynomial
evaluation in the commodity-based model",
journal = j-INT-J-INFO-SEC,
volume = "14",
number = "1",
pages = "73--84",
month = feb,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0247-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:43 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0247-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Arbit:2015:IPK,
author = "Alex Arbit and Yoel Livne and Yossef Oren and Avishai
Wool",
title = "Implementing public-key cryptography on passive {RFID}
tags is practical",
journal = j-INT-J-INFO-SEC,
volume = "14",
number = "1",
pages = "85--99",
month = feb,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0236-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:43 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0236-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Bella:2015:SIS,
author = "Giampaolo Bella and Helge Janicke",
title = "Special issue on the {Security Track at the ACM
Symposium on Applied Computing 2013}",
journal = j-INT-J-INFO-SEC,
volume = "14",
number = "2",
pages = "101--102",
month = apr,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0280-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:43 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0280-2;
http://link.springer.com/content/pdf/10.1007/s10207-015-0280-2.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Martina:2015:ATM,
author = "Jean Everson Martina and Eduardo dos Santos and
Marcelo Carlomagno Carlos and Geraint Price and Ricardo
Felipe Cust{\'o}dio",
title = "An adaptive threat model for security ceremonies",
journal = j-INT-J-INFO-SEC,
volume = "14",
number = "2",
pages = "103--121",
month = apr,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0253-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:43 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0253-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Armando:2015:FMA,
author = "Alessandro Armando and Gabriele Costa and Alessio
Merlo and Luca Verderame",
title = "Formal modeling and automatic enforcement of {Bring
Your Own Device} policies",
journal = j-INT-J-INFO-SEC,
volume = "14",
number = "2",
pages = "123--140",
month = apr,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0252-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:43 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0252-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Spreitzenbarth:2015:MSC,
author = "Michael Spreitzenbarth and Thomas Schreck and Florian
Echtler and Daniel Arp and Johannes Hoffmann",
title = "{Mobile-Sandbox}: combining static and dynamic
analysis with machine-learning techniques",
journal = j-INT-J-INFO-SEC,
volume = "14",
number = "2",
pages = "141--153",
month = apr,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0250-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:43 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0250-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Riecker:2015:LEC,
author = "Michael Riecker and Sebastian Biedermann and Rachid
{El Bansarkhani} and Matthias Hollick",
title = "Lightweight energy consumption-based intrusion
detection system for wireless sensor networks",
journal = j-INT-J-INFO-SEC,
volume = "14",
number = "2",
pages = "155--167",
month = apr,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0241-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:43 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0241-1",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Egners:2015:MOW,
author = "Andr{\'e} Egners and Patrick Herrmann and Ulrike
Meyer",
title = "Multi-operator wireless mesh networks secured by an
all-encompassing security architecture",
journal = j-INT-J-INFO-SEC,
volume = "14",
number = "2",
pages = "169--186",
month = apr,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0244-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:43 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0244-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Martina:2015:VMB,
author = "Jean Everson Martina and Lawrence Charles Paulson",
title = "Verifying multicast-based security protocols using the
inductive method",
journal = j-INT-J-INFO-SEC,
volume = "14",
number = "2",
pages = "187--204",
month = apr,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0251-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:43 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0251-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Chakravarty:2015:DAE,
author = "Sambuddho Chakravarty and Georgios Portokalidis and
Michalis Polychronakis and Angelos D. Keromytis",
title = "Detection and analysis of eavesdropping in anonymous
communication networks",
journal = j-INT-J-INFO-SEC,
volume = "14",
number = "3",
pages = "205--220",
month = jun,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0256-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:43 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0256-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Seifi:2015:ATA,
author = "Younes Seifi and Suriadi Suriadi and Ernest Foo and
Colin Boyd",
title = "Analysis of two authorization protocols using {Colored
Petri Nets}",
journal = j-INT-J-INFO-SEC,
volume = "14",
number = "3",
pages = "221--247",
month = jun,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0243-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:43 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0243-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{James:2015:AIP,
author = "Joshua I. James and Pavel Gladyshev",
title = "Automated inference of past action instances in
digital investigations",
journal = j-INT-J-INFO-SEC,
volume = "14",
number = "3",
pages = "249--261",
month = jun,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0249-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:43 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0249-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Giffhorn:2015:NAL,
author = "Dennis Giffhorn and Gregor Snelting",
title = "A new algorithm for low-deterministic security",
journal = j-INT-J-INFO-SEC,
volume = "14",
number = "3",
pages = "263--287",
month = jun,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0257-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:43 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0257-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Vasiliadis:2015:GAM,
author = "Giorgos Vasiliadis and Michalis Polychronakis and
Sotiris Ioannidis",
title = "{GPU}-assisted malware",
journal = j-INT-J-INFO-SEC,
volume = "14",
number = "3",
pages = "289--297",
month = jun,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0262-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:43 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0262-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Pitropakis:2015:BRP,
author = "Nikolaos Pitropakis and Aggelos Pikrakis and Costas
Lambrinoudakis",
title = "Behaviour reflects personality: detecting co-residence
attacks on {Xen}-based cloud environments",
journal = j-INT-J-INFO-SEC,
volume = "14",
number = "4",
pages = "299--305",
month = aug,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0255-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:44 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0255-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Yu:2015:EPR,
author = "Yong Yu and Man Ho Au and Yi Mu and Shaohua Tang and
Jian Ren and Willy Susilo and Liju Dong",
title = "Enhanced privacy of a remote data integrity-checking
protocol for secure cloud storage",
journal = j-INT-J-INFO-SEC,
volume = "14",
number = "4",
pages = "307--318",
month = aug,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0263-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:44 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0263-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Casassa-Mont:2015:TSI,
author = "Marco Casassa-Mont and Ilaria Matteucci and Marinella
Petrocchi and Marco Luca Sbodio",
title = "Towards safer information sharing in the cloud",
journal = j-INT-J-INFO-SEC,
volume = "14",
number = "4",
pages = "319--334",
month = aug,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0258-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:44 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0258-5",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Isern-Deya:2015:PUG,
author = "Andreu Pere Isern-Dey{\`a} and Lloren{\c{c}}
Huguet-Rotger and M. Magdalena Payeras-Capell{\`a} and
Maci{\`a} Mut-Puigserver",
title = "On the practicability of using group signatures on
mobile devices: implementation and performance analysis
on the {Android} platform",
journal = j-INT-J-INFO-SEC,
volume = "14",
number = "4",
pages = "335--345",
month = aug,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0259-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:44 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0259-4",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Mustafa:2015:UIA,
author = "Tanveer Mustafa and Karsten Sohr",
title = "Understanding the implemented access control policy of
{Android} system services with slicing and extended
static checking",
journal = j-INT-J-INFO-SEC,
volume = "14",
number = "4",
pages = "347--366",
month = aug,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0260-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:44 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0260-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{ElHassani:2015:ION,
author = "Abdeljebar Ameziane {El Hassani} and Anas Abou {El
Kalam} and Adel Bouhoula and Ryma Abassi and Abdellah
Ait Ouahman",
title = "{Integrity-OrBAC}: a new model to preserve {Critical
Infrastructures} integrity",
journal = j-INT-J-INFO-SEC,
volume = "14",
number = "4",
pages = "367--385",
month = aug,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0254-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:44 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0254-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Al-Saleh:2015:IDC,
author = "Mohammed I. Al-Saleh and Fatima M. AbuHjeela and Ziad
A. Al-Sharif",
title = "Investigating the detection capabilities of
antiviruses under concurrent attacks",
journal = j-INT-J-INFO-SEC,
volume = "14",
number = "4",
pages = "387--396",
month = aug,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0261-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:44 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0261-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Wei:2015:TPE,
author = "Lei Wei and Michael K. Reiter",
title = "Toward practical encrypted email that supports
private, regular-expression searches",
journal = j-INT-J-INFO-SEC,
volume = "14",
number = "5",
pages = "397--416",
month = oct,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0268-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:44 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib;
https://www.math.utah.edu/pub/tex/bib/string-matching.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0268-3;
http://link.springer.com/content/pdf/10.1007/s10207-014-0268-3.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
keywords = "Cloud security; Private search on encrypted data;
Regular-expression search",
}
@Article{Zhou:2015:GCR,
author = "Lan Zhou and Vijay Varadharajan and Michael Hitchens",
title = "Generic constructions for role-based encryption",
journal = j-INT-J-INFO-SEC,
volume = "14",
number = "5",
pages = "417--430",
month = oct,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0267-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:44 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0267-4",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Lin:2015:RNR,
author = "Han-Yu Lin",
title = "{RPCAE}: a novel revocable proxy convertible
authenticated encryption scheme",
journal = j-INT-J-INFO-SEC,
volume = "14",
number = "5",
pages = "431--441",
month = oct,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0269-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:44 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0269-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Halevi:2015:KAS,
author = "Tzipora Halevi and Nitesh Saxena",
title = "Keyboard acoustic side channel attacks: exploring
realistic and security-sensitive scenarios",
journal = j-INT-J-INFO-SEC,
volume = "14",
number = "5",
pages = "443--456",
month = oct,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0264-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:44 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0264-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Li:2015:TMM,
author = "Tao Li and Aiqun Hu",
title = "Trusted mobile model based on {DTE} technology",
journal = j-INT-J-INFO-SEC,
volume = "14",
number = "5",
pages = "457--469",
month = oct,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0266-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:44 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0266-5",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Azkia:2015:DPA,
author = "Hanieh Azkia and Nora Cuppens-Boulahia and
Fr{\'e}d{\'e}ric Cuppens and Gouenou Coatrieux and Said
Oulmakhzoune",
title = "Deployment of a posteriori access control using {IHE
ATNA}",
journal = j-INT-J-INFO-SEC,
volume = "14",
number = "5",
pages = "471--483",
month = oct,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0265-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:44 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0265-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Bertino:2015:SPE,
author = "Elisa Bertino and Robert H. Deng and Xinyi Huang and
Jianying Zhou",
title = "Security and privacy of electronic health information
systems",
journal = j-INT-J-INFO-SEC,
volume = "14",
number = "6",
pages = "485--486",
month = nov,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0303-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:44 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0303-z;
http://link.springer.com/content/pdf/10.1007/s10207-015-0303-z.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Qian:2015:PPP,
author = "Huiling Qian and Jiguo Li and Yichen Zhang and
Jinguang Han",
title = "Privacy-preserving personal health record using
multi-authority attribute-based encryption with
revocation",
journal = j-INT-J-INFO-SEC,
volume = "14",
number = "6",
pages = "487--497",
month = nov,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0270-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:44 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0270-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Qin:2015:FAB,
author = "Bo Qin and Hua Deng and Qianhong Wu and Josep
Domingo-Ferrer and David Naccache and Yunya Zhou",
title = "Flexible attribute-based encryption applicable to
secure e-healthcare records",
journal = j-INT-J-INFO-SEC,
volume = "14",
number = "6",
pages = "499--511",
month = nov,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0272-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:44 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0272-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Hadavi:2015:SSS,
author = "Mohammad Ali Hadavi and Rasool Jalili and Ernesto
Damiani and Stelvio Cimato",
title = "Security and searchability in secret sharing-based
data outsourcing",
journal = j-INT-J-INFO-SEC,
volume = "14",
number = "6",
pages = "513--529",
month = nov,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0277-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:44 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0277-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Kamm:2015:SFP,
author = "Liina Kamm and Jan Willemson",
title = "Secure floating point arithmetic and private satellite
collision analysis",
journal = j-INT-J-INFO-SEC,
volume = "14",
number = "6",
pages = "531--548",
month = nov,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-014-0271-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:44 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/fparith.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-014-0271-8;
http://link.springer.com/content/pdf/10.1007/s10207-014-0271-8.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Hoang:2015:GAM,
author = "Thang Hoang and Deokjai Choi and Thuc Nguyen",
title = "Gait authentication on mobile phone using biometric
cryptosystem and fuzzy commitment scheme",
journal = j-INT-J-INFO-SEC,
volume = "14",
number = "6",
pages = "549--560",
month = nov,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0273-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:44 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0273-1",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Kozakevicius:2015:UQS,
author = "Alice Kozakevicius and Cristian Cappo and Bruno A.
Mozzaquatro and Raul Ceretta Nunes and Christian E.
Schaerer",
title = "{URL} query string anomaly sensor designed with the
bidimensional {Haar} wavelet transform",
journal = j-INT-J-INFO-SEC,
volume = "14",
number = "6",
pages = "561--581",
month = nov,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0276-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:44 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0276-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Liu:2016:STP,
author = "Liang Liu and Xiaofeng Chen and Wenjing Lou",
title = "Secure three-party computational protocols for
triangle area",
journal = j-INT-J-INFO-SEC,
volume = "15",
number = "1",
pages = "1--13",
month = feb,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0284-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:45 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0284-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Chen:2016:SOK,
author = "Yu Chen and Qiong Huang and Zongyang Zhang",
title = "{Sakai--Ohgishi--Kasahara} identity-based
non-interactive key exchange revisited and more",
journal = j-INT-J-INFO-SEC,
volume = "15",
number = "1",
pages = "15--33",
month = feb,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0274-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:45 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0274-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Liu:2016:PCC,
author = "Weiran Liu and Jianwei Liu and Qianhong Wu and Bo Qin
and Yan Li",
title = "Practical chosen-ciphertext secure {Hierarchical
Identity-Based Broadcast Encryption}",
journal = j-INT-J-INFO-SEC,
volume = "15",
number = "1",
pages = "35--50",
month = feb,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0287-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:45 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0287-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Susil:2016:SSA,
author = "Petr Susil and Pouyan Sepehrdad and Serge Vaudenay and
Nicolas Courtois",
title = "On selection of samples in algebraic attacks and a new
technique to find hidden low degree equations",
journal = j-INT-J-INFO-SEC,
volume = "15",
number = "1",
pages = "51--65",
month = feb,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0295-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:45 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0295-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Wang:2016:SSE,
author = "Yuyu Wang and Keisuke Tanaka",
title = "Strongly simulation-extractable leakage-resilient
{NIZK}",
journal = j-INT-J-INFO-SEC,
volume = "15",
number = "1",
pages = "67--79",
month = feb,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0291-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:45 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0291-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Rao:2016:EAB,
author = "Y. Sreenivasa Rao and Ratna Dutta",
title = "Efficient attribute-based signature and signcryption
realizing expressive access structures",
journal = j-INT-J-INFO-SEC,
volume = "15",
number = "1",
pages = "81--109",
month = feb,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0289-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:45 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0289-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{DeKeulenaer:2016:LTS,
author = "Ronald {De Keulenaer} and Jonas Maebe and Koen {De
Bosschere} and Bjorn {De Sutter}",
title = "Link-time smart card code hardening",
journal = j-INT-J-INFO-SEC,
volume = "15",
number = "2",
pages = "111--130",
month = apr,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0282-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:45 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0282-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Chikha:2016:BBA,
author = "Randa Jabeur {Ben Chikha} and Tarek Abbes and Wassim
{Ben Chikha} and Adel Bouhoula",
title = "Behavior-based approach to detect spam over {IP}
telephony attacks",
journal = j-INT-J-INFO-SEC,
volume = "15",
number = "2",
pages = "131--143",
month = apr,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0281-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:45 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0281-1",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Karimi:2016:UAA,
author = "Vahid R. Karimi and Paulo S. C. Alencar and Donald D.
Cowan",
title = "A uniform approach for access control and business
models with explicit rule realization",
journal = j-INT-J-INFO-SEC,
volume = "15",
number = "2",
pages = "145--171",
month = apr,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0275-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:45 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0275-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Raad:2016:PSR,
author = "Elie Raad and Bechara {Al Bouna} and Richard Chbeir",
title = "Preventing sensitive relationships disclosure for
better social media preservation",
journal = j-INT-J-INFO-SEC,
volume = "15",
number = "2",
pages = "173--194",
month = apr,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0278-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:45 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0278-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Celdran:2016:RPP,
author = "Alberto Huertas Celdr{\'a}n and Gin{\'e}s D{\'o}lera
Tormo and F{\'e}lix G{\'o}mez M{\'a}rmol and Manuel Gil
P{\'e}rez and Gregorio Mart{\'\i}nez P{\'e}rez",
title = "Resolving privacy-preserving relationships over
outsourced encrypted data storages",
journal = j-INT-J-INFO-SEC,
volume = "15",
number = "2",
pages = "195--209",
month = apr,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0283-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:45 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0283-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Mateu:2016:HAV,
author = "V{\'\i}ctor Mateu and Josep M. Miret and Francesc
Seb{\'e}",
title = "A hybrid approach to vector-based homomorphic tallying
remote voting",
journal = j-INT-J-INFO-SEC,
volume = "15",
number = "2",
pages = "211--221",
month = apr,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0279-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:45 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0279-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Yang:2016:MGE,
author = "Guomin Yang and Willy Susilo and Yi Mu",
title = "Message from the {Guest Editors}",
journal = j-INT-J-INFO-SEC,
volume = "15",
number = "2",
pages = "223--224",
month = apr,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0315-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:45 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0315-3;
http://link.springer.com/content/pdf/10.1007/s10207-016-0315-3.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Rashwan:2016:UTP,
author = "Hatem A. Rashwan and Agusti Solanas and Dom{\`e}nec
Puig and Antoni Mart{\'\i}nez-Ballest{\'e}",
title = "Understanding trust in privacy-aware video
surveillance systems",
journal = j-INT-J-INFO-SEC,
volume = "15",
number = "3",
pages = "225--234",
month = jun,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0286-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:45 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0286-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Kurek:2016:TBC,
author = "Tytus Kurek and Marcin Niemiec and Artur Lason",
title = "Taking back control of privacy: a novel framework for
preserving cloud-based firewall policy
confidentiality",
journal = j-INT-J-INFO-SEC,
volume = "15",
number = "3",
pages = "235--250",
month = jun,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0292-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:45 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0292-y;
http://link.springer.com/content/pdf/10.1007/s10207-015-0292-y.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Orencik:2016:MKS,
author = "Cengiz Orencik and Ayse Selcuk and Erkay Savas and
Murat Kantarcio{\u{g}}lu",
title = "Multi-keyword search over encrypted data with scoring
and search pattern obfuscation",
journal = j-INT-J-INFO-SEC,
volume = "15",
number = "3",
pages = "251--269",
month = jun,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0294-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:45 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib;
https://www.math.utah.edu/pub/tex/bib/string-matching.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0294-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
keywords = "Efficiency Scoring; Encrypted cloud data; Privacy
preservation; Secure search",
}
@Article{Gritti:2016:BED,
author = "Cl{\'e}mentine Gritti and Willy Susilo and Thomas
Plantard and Kaitai Liang and Duncan S. Wong",
title = "Broadcast encryption with dealership",
journal = j-INT-J-INFO-SEC,
volume = "15",
number = "3",
pages = "271--283",
month = jun,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0285-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:45 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0285-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Mennink:2016:EPH,
author = "Bart Mennink and Bart Preneel",
title = "Efficient parallelizable hashing using small
non-compressing primitives",
journal = j-INT-J-INFO-SEC,
volume = "15",
number = "3",
pages = "285--300",
month = jun,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0288-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:45 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/hash.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0288-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Abbes:2016:DFC,
author = "Tarek Abbes and Adel Bouhoula and Micha{\"e}l
Rusinowitch",
title = "Detection of firewall configuration errors with
updatable tree",
journal = j-INT-J-INFO-SEC,
volume = "15",
number = "3",
pages = "301--317",
month = jun,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0290-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:45 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0290-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Salini:2016:EPA,
author = "P. Salini and S. Kanmani",
title = "Effectiveness and performance analysis of
model-oriented security requirements engineering to
elicit security requirements: a systematic solution for
developing secure software systems",
journal = j-INT-J-INFO-SEC,
volume = "15",
number = "3",
pages = "319--334",
month = jun,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0305-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:45 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0305-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Khayati:2016:PPP,
author = "Leyli Javid Khayati and Cengiz Orencik and Erkay Savas
and Berkant Ustao{\u{g}}lu",
title = "A practical privacy-preserving targeted advertising
scheme for {IPTV} users",
journal = j-INT-J-INFO-SEC,
volume = "15",
number = "4",
pages = "335--360",
month = aug,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0296-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:46 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0296-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Miao:2016:MDU,
author = "Qiguang Miao and Jiachen Liu and Ying Cao and Jianfeng
Song",
title = "Malware detection using bilayer behavior abstraction
and improved one-class support vector machines",
journal = j-INT-J-INFO-SEC,
volume = "15",
number = "4",
pages = "361--379",
month = aug,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0297-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:46 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0297-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Skoric:2016:FBR,
author = "Boris Skori{\'c} and Sebastiaan J. A. de Hoogh and
Nicola Zannone",
title = "Flow-based reputation with uncertainty: evidence-based
subjective logic",
journal = j-INT-J-INFO-SEC,
volume = "15",
number = "4",
pages = "381--402",
month = aug,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0298-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:46 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0298-5;
http://link.springer.com/content/pdf/10.1007/s10207-015-0298-5.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Vajda:2016:ATA,
author = "Istv{\'a}n Vajda",
title = "On the analysis of time-aware protocols in universal
composability framework",
journal = j-INT-J-INFO-SEC,
volume = "15",
number = "4",
pages = "403--412",
month = aug,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0300-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:46 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0300-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Diaz-Santiago:2016:CST,
author = "Sandra D{\'\i}az-Santiago and Lil Mar{\'\i}a
Rodr{\'\i}guez-Henr{\'\i}quez and Debrup Chakraborty",
title = "A cryptographic study of tokenization systems",
journal = j-INT-J-INFO-SEC,
volume = "15",
number = "4",
pages = "413--432",
month = aug,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0313-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:46 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0313-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Malhi:2016:PPA,
author = "Avleen Malhi and Shalini Batra",
title = "Privacy-preserving authentication framework using
{Bloom} filter for secure vehicular communications",
journal = j-INT-J-INFO-SEC,
volume = "15",
number = "4",
pages = "433--453",
month = aug,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0299-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:46 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0299-4",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Anagnostopoulos:2016:NFM,
author = "Marios Anagnostopoulos and Georgios Kambourakis and
Stefanos Gritzalis",
title = "New facets of mobile botnet: architecture and
evaluation",
journal = j-INT-J-INFO-SEC,
volume = "15",
number = "5",
pages = "455--473",
month = oct,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0310-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:46 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0310-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Almaatouq:2016:IIL,
author = "Abdullah Almaatouq and Erez Shmueli and Mariam Nouh
and Ahmad Alabdulkareem and Vivek K. Singh and Mansour
Alsaleh and Abdulrahman Alarifi and Anas Alfaris and
Alex `Sandy' Pentland",
title = "If it looks like a spammer and behaves like a spammer,
it must be a spammer: analysis and detection of
microblogging spam accounts",
journal = j-INT-J-INFO-SEC,
volume = "15",
number = "5",
pages = "475--491",
month = oct,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0321-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:46 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0321-5",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Blanton:2016:POS,
author = "Marina Blanton and Everaldo Aguiar",
title = "Private and oblivious set and multiset operations",
journal = j-INT-J-INFO-SEC,
volume = "15",
number = "5",
pages = "493--518",
month = oct,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0301-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:46 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0301-1",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Kiraz:2016:EVA,
author = "Mehmet Sabir Kiraz and Osmanbey Uzunkol",
title = "Efficient and verifiable algorithms for secure
outsourcing of cryptographic computations",
journal = j-INT-J-INFO-SEC,
volume = "15",
number = "5",
pages = "519--537",
month = oct,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0308-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:46 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0308-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Hu:2016:EWS,
author = "Changhui Hu and Lidong Han",
title = "Efficient wildcard search over encrypted data",
journal = j-INT-J-INFO-SEC,
volume = "15",
number = "5",
pages = "539--547",
month = oct,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0302-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:46 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib;
https://www.math.utah.edu/pub/tex/bib/string-matching.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0302-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
keywords = "Cloud computing; Searchable symmetric encryption;
Wildcard search",
}
@Article{Kasamatsu:2016:TSE,
author = "Kohei Kasamatsu and Takahiro Matsuda and Keita Emura
and Nuttapong Attrapadung and Goichiro Hanaoka and
Hideki Imai",
title = "Time-specific encryption from forward-secure
encryption: generic and direct constructions",
journal = j-INT-J-INFO-SEC,
volume = "15",
number = "5",
pages = "549--571",
month = oct,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0304-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:46 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0304-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Chen:2016:MGE,
author = "Liqun Chen and Chris Mitchell",
title = "Message from the guest editors",
journal = j-INT-J-INFO-SEC,
volume = "15",
number = "6",
pages = "573--574",
month = nov,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0353-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:46 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0353-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Rowe:2016:MPS,
author = "Paul D. Rowe and Joshua D. Guttman and Moses D.
Liskov",
title = "Measuring protocol strength with security goals",
journal = j-INT-J-INFO-SEC,
volume = "15",
number = "6",
pages = "575--596",
month = nov,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0319-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:46 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0319-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Manulis:2016:SMP,
author = "Mark Manulis and Douglas Stebila and Franziskus Kiefer
and Nick Denham",
title = "Secure modular password authentication for the web
using channel bindings",
journal = j-INT-J-INFO-SEC,
volume = "15",
number = "6",
pages = "597--620",
month = nov,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0348-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:46 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0348-7;
http://link.springer.com/content/pdf/10.1007/s10207-016-0348-7.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Brown:2016:API,
author = "Christopher W. Brown and Michael Jenkins",
title = "Analyzing proposals for improving authentication on
the {TLS-\slash SSL}-protected {Web}",
journal = j-INT-J-INFO-SEC,
volume = "15",
number = "6",
pages = "621--635",
month = nov,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0316-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:46 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0316-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Degabriele:2016:UPC,
author = "Jean Paul Degabriele and Victoria Fehr and Marc
Fischlin and Tommaso Gagliardoni and Felix G{\"u}nther
and Giorgia Azzurra Marson and Arno Mittelbach and
Kenneth G. Paterson",
title = "Unpicking {PLAID}: a cryptographic analysis of an
{ISO}-standards-track authentication protocol",
journal = j-INT-J-INFO-SEC,
volume = "15",
number = "6",
pages = "637--657",
month = nov,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0309-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:46 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0309-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Cremers:2016:III,
author = "Cas Cremers and Marko Horvat",
title = "Improving the {ISO\slash IEC 11770} standard for key
management techniques",
journal = j-INT-J-INFO-SEC,
volume = "15",
number = "6",
pages = "659--673",
month = nov,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0306-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:46 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0306-9;
http://link.springer.com/content/pdf/10.1007/s10207-015-0306-9.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Poettering:2017:DAP,
author = "Bertram Poettering and Douglas Stebila",
title = "Double-authentication-preventing signatures",
journal = j-INT-J-INFO-SEC,
volume = "16",
number = "1",
pages = "1--22",
month = feb,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0307-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:47 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0307-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Li:2017:WOO,
author = "Lichun Li and Anwitaman Datta",
title = "Write-only oblivious {RAM}-based privacy-preserved
access of outsourced data",
journal = j-INT-J-INFO-SEC,
volume = "16",
number = "1",
pages = "23--42",
month = feb,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0329-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:47 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0329-x;
http://link.springer.com/content/pdf/10.1007/s10207-016-0329-x.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Karimi:2017:FMA,
author = "Vahid R. Karimi and Paulo S. C. Alencar and Donald D.
Cowan",
title = "A formal modeling and analysis approach for access
control rules, policies, and their combinations",
journal = j-INT-J-INFO-SEC,
volume = "16",
number = "1",
pages = "43--74",
month = feb,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0314-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:47 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0314-4",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Albertini:2017:EAC,
author = "Davide Alberto Albertini and Barbara Carminati and
Elena Ferrari",
title = "An extended access control mechanism exploiting data
dependencies",
journal = j-INT-J-INFO-SEC,
volume = "16",
number = "1",
pages = "75--89",
month = feb,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0322-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:47 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0322-4",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Shaikh:2017:DCM,
author = "Riaz Ahmed Shaikh and Kamel Adi and Luigi Logrippo",
title = "A Data Classification Method for Inconsistency and
Incompleteness Detection in Access Control Policy
Sets",
journal = j-INT-J-INFO-SEC,
volume = "16",
number = "1",
pages = "91--113",
month = feb,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0317-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:47 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0317-1",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Stevanovic:2017:MIC,
author = "Matija Stevanovic and Jens Myrup Pedersen and
Alessandro D'Alconzo and Stefan Ruehrup",
title = "A method for identifying compromised clients based on
{DNS} traffic analysis",
journal = j-INT-J-INFO-SEC,
volume = "16",
number = "2",
pages = "115--132",
month = apr,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0331-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:47 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0331-3",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Mehrnezhad:2017:PCI,
author = "Maryam Mehrnezhad and Abbas Ghaemi Bafghi and Ahad
Harati and Ehsan Toreini",
title = "{PiSHi}: click the images and {I} tell if you are a
human",
journal = j-INT-J-INFO-SEC,
volume = "16",
number = "2",
pages = "133--149",
month = apr,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0311-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:47 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0311-z;
http://link.springer.com/content/pdf/10.1007/s10207-015-0311-z.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Boyd:2017:AAK,
author = "Colin Boyd and Cas Cremers and Mich{\`e}le Feltz and
Kenneth G. Paterson and Bertram Poettering and Douglas
Stebila",
title = "{ASICS}: authenticated key exchange security
incorporating certification systems",
journal = j-INT-J-INFO-SEC,
volume = "16",
number = "2",
pages = "151--171",
month = apr,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-015-0312-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:47 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-015-0312-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Tiloca:2017:IRD,
author = "Marco Tiloca and Christian Gehrmann and Ludwig Seitz",
title = "On improving resistance to {Denial of Service} and key
provisioning scalability of the {DTLS} handshake",
journal = j-INT-J-INFO-SEC,
volume = "16",
number = "2",
pages = "173--193",
month = apr,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0326-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:47 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0326-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Singh:2017:RUA,
author = "Ankit Singh and Hervais C. Simo Fhom",
title = "Restricted usage of anonymous credentials in vehicular
ad hoc networks for misbehavior detection",
journal = j-INT-J-INFO-SEC,
volume = "16",
number = "2",
pages = "195--211",
month = apr,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0328-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:47 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0328-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Mann:2017:TFA,
author = "Christopher Mann and Daniel Loebenberger",
title = "Two-factor authentication for the {Bitcoin} protocol",
journal = j-INT-J-INFO-SEC,
volume = "16",
number = "2",
pages = "213--226",
month = apr,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0325-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Thu Nov 30 16:02:10 MST 2017",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0325-1",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Bat-Erdene:2017:EAC,
author = "Munkhbayar Bat-Erdene and Hyundo Park and Hongzhe Li
and Heejo Lee and Mahn-Soo Choi",
title = "Entropy analysis to classify unknown packing
algorithms for malware detection",
journal = j-INT-J-INFO-SEC,
volume = "16",
number = "3",
pages = "227--248",
month = jun,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0330-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:47 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0330-4",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Bernardini:2017:MRP,
author = "Riccardo Bernardini and Roberto Rinaldo",
title = "Making random permutations from physically unclonable
constants",
journal = j-INT-J-INFO-SEC,
volume = "16",
number = "3",
pages = "249--261",
month = jun,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0324-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:47 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib;
https://www.math.utah.edu/pub/tex/bib/prng.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0324-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
keywords = "Physically unclonable functions; Privacy and security;
Random permutations",
}
@Article{Kim:2017:MES,
author = "Minchul Kim and Younghoon Jung and Junghwan Song",
title = "A modified exhaustive search on a password system
using {SHA-1}",
journal = j-INT-J-INFO-SEC,
volume = "16",
number = "3",
pages = "263--269",
month = jun,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0332-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:47 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/hash.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib;
https://www.math.utah.edu/pub/tex/bib/string-matching.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0332-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
keywords = "Exhaustive search; Microsoft Office; Password
cracking; Security evaluation; SHA-1",
}
@Article{Ragab-Hassen:2017:KMS,
author = "Hani Ragab-Hassen and Esma Lounes",
title = "A key management scheme evaluation using {Markov}
processes",
journal = j-INT-J-INFO-SEC,
volume = "16",
number = "3",
pages = "271--280",
month = jun,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0323-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:47 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0323-3;
http://link.springer.com/content/pdf/10.1007/s10207-016-0323-3.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Gunther:2017:LMT,
author = "Felix G{\"u}nther and Bertram Poettering",
title = "Linkable message tagging: solving the key distribution
problem of signature schemes",
journal = j-INT-J-INFO-SEC,
volume = "16",
number = "3",
pages = "281--297",
month = jun,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0327-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:47 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0327-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Lai:2017:EIB,
author = "Jianchang Lai and Yi Mu and Fuchun Guo",
title = "Efficient identity-based online\slash offline
encryption and signcryption with short ciphertext",
journal = j-INT-J-INFO-SEC,
volume = "16",
number = "3",
pages = "299--311",
month = jun,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0320-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:47 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0320-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Kotzanikolaou:2017:BAR,
author = "Panayiotis Kotzanikolaou and George Chatzisofroniou
and Mike Burmester",
title = "Broadcast anonymous routing ({BAR}): scalable
real-time anonymous communication",
journal = j-INT-J-INFO-SEC,
volume = "16",
number = "3",
pages = "313--326",
month = jun,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0318-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:47 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0318-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Catalano:2017:CAO,
author = "Dario Catalano and Dario Fiore and Rosario Gennaro",
title = "A certificateless approach to onion routing",
journal = j-INT-J-INFO-SEC,
volume = "16",
number = "3",
pages = "327--343",
month = jun,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0337-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:47 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0337-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Lazouski:2017:SDU,
author = "Aliaksandr Lazouski and Fabio Martinelli and Paolo
Mori and Andrea Saracino",
title = "Stateful Data Usage Control for {Android} Mobile
Devices",
journal = j-INT-J-INFO-SEC,
volume = "16",
number = "4",
pages = "345--369",
month = aug,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0336-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:48 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0336-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Ruiz-Heras:2017:AAB,
author = "A. Ruiz-Heras and P. Garc{\'\i}a-Teodoro and L.
S{\'a}nchez-Casado",
title = "{ADroid}: anomaly-based detection of malicious events
in {Android} platforms",
journal = j-INT-J-INFO-SEC,
volume = "16",
number = "4",
pages = "371--384",
month = aug,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0333-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:48 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0333-1",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Garg:2017:NBD,
author = "Shree Garg and Sateesh K. Peddoju and Anil K. Sarje",
title = "Network-based detection of {Android} malicious apps",
journal = j-INT-J-INFO-SEC,
volume = "16",
number = "4",
pages = "385--400",
month = aug,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0343-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:48 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0343-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Kolias:2017:TDS,
author = "Constantinos Kolias and Vasilis Kolias and Georgios
Kambourakis",
title = "{TermID}: a distributed swarm intelligence-based
approach for wireless intrusion detection",
journal = j-INT-J-INFO-SEC,
volume = "16",
number = "4",
pages = "401--416",
month = aug,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0335-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:48 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0335-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Sampangi:2017:HSR,
author = "Raghav V. Sampangi and Srinivas Sampalli",
title = "{HiveSec}: security in resource-constrained wireless
networks inspired by beehives and bee swarms",
journal = j-INT-J-INFO-SEC,
volume = "16",
number = "4",
pages = "417--433",
month = aug,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0341-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:48 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0341-1",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Antunes:2017:DVT,
author = "Nuno Antunes and Marco Vieira",
title = "Designing vulnerability testing tools for web
services: approach, components, and tools",
journal = j-INT-J-INFO-SEC,
volume = "16",
number = "4",
pages = "435--457",
month = aug,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0334-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:48 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0334-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Sisaat:2017:STM,
author = "Khamphao Sisaat and Surin Kittitornkun and Hiroaki
Kikuchi and Chaxiong Yukonhiatou and Masato Terada and
Hiroshi Ishii",
title = "A spatio-temporal malware and country clustering
algorithm: {2012 IIJ MITF} case study",
journal = j-INT-J-INFO-SEC,
volume = "16",
number = "5",
pages = "459--473",
month = oct,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0342-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:48 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0342-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Duessel:2017:DZD,
author = "Patrick Duessel and Christian Gehl and Ulrich Flegel
and Sven Dietrich and Michael Meier",
title = "Detecting zero-day attacks using context-aware anomaly
detection at the application-layer",
journal = j-INT-J-INFO-SEC,
volume = "16",
number = "5",
pages = "475--490",
month = oct,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0344-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:48 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0344-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Arapinis:2017:APM,
author = "Myrto Arapinis and Loretta Ilaria Mancini and Eike
Ritter and Mark Dermot Ryan",
title = "Analysis of privacy in mobile telephony systems",
journal = j-INT-J-INFO-SEC,
volume = "16",
number = "5",
pages = "491--523",
month = oct,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0338-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:48 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0338-9;
http://link.springer.com/content/pdf/10.1007/s10207-016-0338-9.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Huang:2017:MAP,
author = "Cheng-Ta Huang and Yu-Hong Zhang and Li-Chiun Lin and
Wei-Jen Wang and Shiuh-Jeng Wang",
title = "Mutual authentications to parties with {QR}-code
applications in mobile systems",
journal = j-INT-J-INFO-SEC,
volume = "16",
number = "5",
pages = "525--540",
month = oct,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0349-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:48 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0349-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Alawatugoda:2017:GCM,
author = "Janaka Alawatugoda",
title = "Generic construction of an {eCK}-secure key exchange
protocol in the standard model",
journal = j-INT-J-INFO-SEC,
volume = "16",
number = "5",
pages = "541--557",
month = oct,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0346-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:48 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0346-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Zhang:2017:CIB,
author = "Lei Zhang and Qianhong Wu and Bo Qin and Hua Deng and
Jiangtao Li and Jianwei Liu and Wenchang Shi",
title = "Certificateless and identity-based authenticated
asymmetric group key agreement",
journal = j-INT-J-INFO-SEC,
volume = "16",
number = "5",
pages = "559--576",
month = oct,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0339-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:48 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0339-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Aliasgari:2017:SCH,
author = "Mehrdad Aliasgari and Marina Blanton and Fattaneh
Bayatbabolghani",
title = "Secure computation of hidden {Markov} models and
secure floating-point arithmetic in the malicious
model",
journal = j-INT-J-INFO-SEC,
volume = "16",
number = "6",
pages = "577--601",
month = nov,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0350-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:49 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/fparith.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0350-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
keywords = "Floating point; Gaussian mixture models; Hidden Markov
models; Secure computation",
}
@Article{Li:2017:RRS,
author = "Lichun Li and Michael Militzer and Anwitaman Datta",
title = "{rPIR}: ramp secret sharing-based
communication-efficient private information retrieval",
journal = j-INT-J-INFO-SEC,
volume = "16",
number = "6",
pages = "603--625",
month = nov,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0347-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:49 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0347-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Esfahani:2017:EHM,
author = "Alireza Esfahani and Georgios Mantas and Jonathan
Rodriguez and Jos{\'e} Carlos Neves",
title = "An efficient homomorphic {MAC}-based scheme against
data and tag pollution attacks in network
coding-enabled wireless networks",
journal = j-INT-J-INFO-SEC,
volume = "16",
number = "6",
pages = "627--639",
month = nov,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0351-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:49 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0351-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Kananizadeh:2017:DDP,
author = "Shahrzad Kananizadeh and Kirill Kononenko",
title = "Development of dynamic protection against timing
channels",
journal = j-INT-J-INFO-SEC,
volume = "16",
number = "6",
pages = "641--651",
month = nov,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0356-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:49 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0356-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Malatras:2017:EUI,
author = "Apostolos Malatras and Dimitris Geneiatakis and
Ioannis Vakalis",
title = "On the efficiency of user identification: a
system-based approach",
journal = j-INT-J-INFO-SEC,
volume = "16",
number = "6",
pages = "653--671",
month = nov,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0340-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:49 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0340-2;
http://link.springer.com/content/pdf/10.1007/s10207-016-0340-2.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Joh:2017:PSV,
author = "HyunChul Joh and Yashwant K. Malaiya",
title = "Periodicity in software vulnerability discovery,
patching and exploitation",
journal = j-INT-J-INFO-SEC,
volume = "16",
number = "6",
pages = "673--690",
month = nov,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0345-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:49 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0345-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Rial:2018:PPS,
author = "Alfredo Rial and George Danezis and Markulf
Kohlweiss",
title = "Privacy-preserving smart metering revisited",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "1",
pages = "1--31",
month = feb,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0355-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:49 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0355-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Deng:2018:SPT,
author = "Hua Deng and Yunya Zhou and Qianhong Wu and Bo Qin and
Jianwei Liu",
title = "Secure {pay-TV} for chained hotels",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "1",
pages = "33--42",
month = feb,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0354-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:49 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0354-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Yoneyama:2018:FMR,
author = "Kazuki Yoneyama",
title = "Formal modeling of random oracle programmability and
verification of signature unforgeability using
task-{PIOAs}",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "1",
pages = "43--66",
month = feb,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0352-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:49 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0352-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Bernardini:2018:GES,
author = "Riccardo Bernardini and Roberto Rinaldo",
title = "Generalized {Elias} schemes for efficient harvesting
of truly random bits",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "1",
pages = "67--81",
month = feb,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0358-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:49 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib;
https://www.math.utah.edu/pub/tex/bib/prng.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0358-5",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
keywords = "Gaussian random variables; Geometric random variables;
Random number conditioning; Random number generation;
Vector quantization",
}
@Article{Ayed:2018:ADS,
author = "Samiha Ayed and Muhammad Sabir Idrees and Nora Cuppens
and Frederic Cuppens",
title = "Achieving dynamicity in security policies enforcement
using aspects",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "1",
pages = "83--103",
month = feb,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0357-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:49 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0357-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Deepa:2018:BBD,
author = "G. Deepa and P. Santhi Thilagam and Furqan Ahmed Khan
and Amit Praseed and Alwyn R. Pais and Nushafreen
Palsetia",
title = "Black-box detection of {XQuery} injection and
parameter tampering vulnerabilities in web
applications",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "1",
pages = "105--120",
month = feb,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-016-0359-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 23 16:01:49 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-016-0359-4",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Shah:2018:MMM,
author = "Ankit Shah and Rajesh Ganesan and Sushil Jajodia and
Hasan Cam",
title = "A methodology to measure and monitor level of
operational effectiveness of a {CSOC}",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "2",
pages = "121--134",
month = apr,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-017-0365-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Mar 3 09:41:24 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-017-0365-1",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Akiyama:2018:HDC,
author = "Mitsuaki Akiyama and Takeshi Yagi and Takeo Hariu and
Youki Kadobayashi",
title = "{HoneyCirculator}: distributing credential honeytoken
for introspection of web-based attack cycle",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "2",
pages = "135--151",
month = apr,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-017-0361-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Mar 3 09:41:24 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-017-0361-5;
http://link.springer.com/content/pdf/10.1007/s10207-017-0361-5.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Kirubavathi:2018:SAD,
author = "G. Kirubavathi and R. Anitha",
title = "Structural analysis and detection of {Android} botnets
using machine learning techniques",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "2",
pages = "153--167",
month = apr,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-017-0363-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Mar 3 09:41:24 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-017-0363-3",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Gruber:2018:UTB,
author = "A. Gruber and I. Ben-Gal",
title = "Using targeted {Bayesian} network learning for suspect
identification in communication networks",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "2",
pages = "169--181",
month = apr,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-017-0362-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Mar 3 09:41:24 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-017-0362-4",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Kuo:2018:DRA,
author = "Tsung-Min Kuo and Sung-Ming Yen and Meng-Che Han",
title = "Dynamic reversed accumulator",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "2",
pages = "183--191",
month = apr,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-017-0360-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Mar 3 09:41:24 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-017-0360-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
keywords = "Dynamic accumulator; Revocation; Zero-knowledge
proof",
}
@Article{Seo:2018:AOF,
author = "Jae Hong Seo and Keita Emura and Keita Xagawa and
Kazuki Yoneyama",
title = "Accumulable optimistic fair exchange from verifiably
encrypted homomorphic signatures",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "2",
pages = "193--220",
month = apr,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-017-0367-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Mar 3 09:41:24 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-017-0367-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Laszka:2018:GTA,
author = "Aron Laszka and Yevgeniy Vorobeychik and Xenofon
Koutsoukos",
title = "A game-theoretic approach for integrity assurance in
resource-bounded systems",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "2",
pages = "221--242",
month = apr,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-017-0364-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Mar 3 09:41:24 MST 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-017-0364-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Domingo-Ferrer:2018:DGS,
author = "Josep Domingo-Ferrer and Alberto Blanco-Justicia and
Carla R{\`a}fols",
title = "Dynamic group size accreditation and group discounts
preserving anonymity",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "3",
pages = "243--260",
month = jun,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-017-0368-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Apr 16 12:27:34 MDT 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-017-0368-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Luo:2018:ASI,
author = "Ying Luo and Sen-ching S. Cheung and Riccardo
Lazzeretti and Tommaso Pignata and Mauro Barni",
title = "Anonymous subject identification and privacy
information management in video surveillance",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "3",
pages = "261--278",
month = jun,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-017-0380-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Apr 16 12:27:34 MDT 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-017-0380-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Martinez-Balleste:2018:DIS,
author = "Antoni Mart{\'\i}nez-Ballest{\'e} and Hatem Rashwan
and Domenec Puig and Agusti Solanas",
title = "Design and implementation of a secure and trustworthy
platform for privacy-aware video surveillance",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "3",
pages = "279--290",
month = jun,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-017-0370-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Apr 16 12:27:34 MDT 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-017-0370-4",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Mehrnezhad:2018:SPM,
author = "Maryam Mehrnezhad and Ehsan Toreini and Siamak F.
Shahandashti and Feng Hao",
title = "Stealing {PINs} via mobile sensors: actual risk versus
user perception",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "3",
pages = "291--313",
month = jun,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-017-0369-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Apr 16 12:27:34 MDT 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-017-0369-x;
http://link.springer.com/content/pdf/10.1007/s10207-017-0369-x.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Roy:2018:DSC,
author = "Sangita Roy and Ashok Singh Sairam",
title = "Distributed star coloring of network for {IP}
traceback",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "3",
pages = "315--326",
month = jun,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-017-0366-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Apr 16 12:27:34 MDT 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-017-0366-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Faust:2018:OPM,
author = "Sebastian Faust and Carmit Hazay and Daniele Venturi",
title = "Outsourced pattern matching",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "3",
pages = "327--346",
month = jun,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-017-0374-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Apr 16 12:27:34 MDT 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib;
https://www.math.utah.edu/pub/tex/bib/string-matching.bib",
URL = "http://link.springer.com/article/10.1007/s10207-017-0374-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Wang:2018:VEC,
author = "Yujue Wang and HweeHwa Pang and Robert H. Deng",
title = "Verifiably encrypted cascade-instantiable blank
signatures to secure progressive decision management",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "3",
pages = "347--363",
month = jun,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-017-0372-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Apr 16 12:27:34 MDT 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-017-0372-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Gonzalez-Serrano:2018:SML,
author = "Francisco-Javier Gonz{\'a}lez-Serrano and Adri{\'a}n
Amor-Mart{\'\i}n and Jorge Casamay{\'o}n-Ant{\'o}n",
title = "Supervised machine learning using encrypted training
data",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "4",
pages = "365--377",
month = aug,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-017-0381-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Jul 25 08:53:56 MDT 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-017-0381-1",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Ham:2018:IYP,
author = "HyoungMin Ham and JongHyup Lee and JooSeok Song",
title = "Improved yoking proof protocols for preserving
anonymity",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "4",
pages = "379--393",
month = aug,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-017-0383-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Jul 25 08:53:56 MDT 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-017-0383-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Lanet:2018:WTM,
author = "Jean-Louis Lanet and H{\'e}l{\`e}ne {Le Bouder} and
Mohammed Benattou and Axel Legay",
title = "When time meets test",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "4",
pages = "395--409",
month = aug,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-017-0371-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Jul 25 08:53:56 MDT 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-017-0371-3",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Ali:2018:ZMN,
author = "Syed Taha Ali and Patrick McCorry and Peter Hyun-Jeen
Lee and Feng Hao",
title = "{ZombieCoin 2.0}: managing next-generation botnets
using {Bitcoin}",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "4",
pages = "411--422",
month = aug,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-017-0379-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Jul 25 08:53:56 MDT 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-017-0379-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Yang:2018:NSS,
author = "Zheng Yang and Chao Liu and Wanping Liu and Daigu
Zhang and Song Luo",
title = "A new strong security model for stateful authenticated
group key exchange",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "4",
pages = "423--440",
month = aug,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-017-0373-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Jul 25 08:53:56 MDT 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-017-0373-1",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Morales-Sandoval:2018:PBC,
author = "Miguel Morales-Sandoval and Jose Luis Gonzalez-Compean
and Arturo Diaz-Perez and Victor J. Sosa-Sosa",
title = "A pairing-based cryptographic approach for data
security in the cloud",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "4",
pages = "441--461",
month = aug,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-017-0375-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Jul 25 08:53:56 MDT 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-017-0375-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Jiang:2018:FCP,
author = "Yinhao Jiang and Willy Susilo and Yi Mu and Fuchun
Guo",
title = "Flexible ciphertext-policy attribute-based encryption
supporting {AND}-gate and threshold with short
ciphertexts",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "4",
pages = "463--475",
month = aug,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-017-0376-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Jul 25 08:53:56 MDT 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-017-0376-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Jia:2018:ERH,
author = "Hongyong Jia and Yue Chen and Julong Lan and Kaixiang
Huang and Jun Wang",
title = "Efficient revocable hierarchical identity-based
encryption using cryptographic accumulators",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "4",
pages = "477--490",
month = aug,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-017-0387-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Jul 25 08:53:56 MDT 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-017-0387-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Chen:2018:MGE,
author = "Liqun Chen and Jinguang Han and Chris Mitchell",
title = "Message from the {Guest Editors}",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "5",
pages = "491--492",
month = oct,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-018-0416-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 25 06:07:03 MDT 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-018-0416-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Imamura:2018:IAA,
author = "Kazuya Imamura and Kazuhiko Minematsu and Tetsu
Iwata",
title = "Integrity analysis of authenticated encryption based
on stream ciphers",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "5",
pages = "493--511",
month = oct,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-017-0378-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 25 06:07:03 MDT 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-017-0378-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Yoneyama:2018:MCK,
author = "Kazuki Yoneyama and Reo Yoshida and Yuto Kawahara and
Tetsutaro Kobayashi and Hitoshi Fuji and Tomohide
Yamamoto",
title = "Multi-cast key distribution: scalable, dynamic and
provably secure construction",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "5",
pages = "513--532",
month = oct,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-017-0389-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 25 06:07:03 MDT 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-017-0389-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Jiang:2018:CPA,
author = "Yinhao Jiang and Willy Susilo and Yi Mu and Fuchun
Guo",
title = "Ciphertext-policy attribute-based encryption
supporting access policy update and its extension with
preserved attributes",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "5",
pages = "533--548",
month = oct,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-017-0388-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 25 06:07:03 MDT 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-017-0388-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Li:2018:IVC,
author = "Yuxi Li and Fucai Zhou and Yuhai Qin and Muqing Lin
and Zifeng Xu",
title = "Integrity-verifiable conjunctive keyword searchable
encryption in cloud storage",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "5",
pages = "549--568",
month = oct,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-017-0394-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 25 06:07:03 MDT 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-017-0394-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Ribeiro:2018:SRH,
author = "Carlos Ribeiro and Herbert Leitold and Simon Esposito
and David Mitzam",
title = "{STORK}: a real, heterogeneous, large-scale {eID}
management system",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "5",
pages = "569--585",
month = oct,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-017-0385-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 25 06:07:03 MDT 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-017-0385-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Frattolillo:2018:WPE,
author = "Franco Frattolillo",
title = "Watermarking protocols: an excursus to motivate a new
approach",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "5",
pages = "587--601",
month = oct,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-017-0386-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 25 06:07:03 MDT 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-017-0386-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Lopriore:2018:ARM,
author = "Lanfranco Lopriore",
title = "Access right management by extended password
capabilities",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "5",
pages = "603--612",
month = oct,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-017-0390-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 25 06:07:03 MDT 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-017-0390-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{ElSalamouny:2018:ONF,
author = "Ehab ElSalamouny and S{\'e}bastien Gambs",
title = "Optimal noise functions for location privacy on
continuous regions",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "6",
pages = "613--630",
month = nov,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-017-0384-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 25 06:07:04 MDT 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-017-0384-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Murakami:2018:OAA,
author = "Keisuke Murakami and Takeaki Uno",
title = "Optimization algorithm for $k$-anonymization of
datasets with low information loss",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "6",
pages = "631--644",
month = nov,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-017-0392-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 25 06:07:04 MDT 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-017-0392-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Scaife:2018:OSR,
author = "Nolen Scaife and Henry Carter and Lyrissa Lidsky and
Rachael L. Jones and Patrick Traynor",
title = "{OnionDNS}: a seizure-resistant top-level domain",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "6",
pages = "645--660",
month = nov,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-017-0391-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 25 06:07:04 MDT 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-017-0391-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Chiba:2018:DTA,
author = "Daiki Chiba and Takeshi Yagi and Mitsuaki Akiyama and
Toshiki Shibahara and Tatsuya Mori and Shigeki Goto",
title = "{DomainProfiler}: toward accurate and early discovery
of domain names abused in future",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "6",
pages = "661--680",
month = nov,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-017-0396-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 25 06:07:04 MDT 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-017-0396-7;
http://link.springer.com/content/pdf/10.1007/s10207-017-0396-7.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Wangen:2018:FEI,
author = "Gaute Wangen and Christoffer Hallstensen and Einar
Snekkenes",
title = "A framework for estimating information security risk
assessment method completeness",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "6",
pages = "681--699",
month = nov,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-017-0382-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 25 06:07:04 MDT 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-017-0382-0;
http://link.springer.com/content/pdf/10.1007/s10207-017-0382-0.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Bindel:2018:CAA,
author = "Nina Bindel and Johannes Buchmann and Susanne
Rie{\ss}",
title = "Comparing apples with apples: performance analysis of
lattice-based authenticated key exchange protocols",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "6",
pages = "701--718",
month = nov,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-017-0397-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 25 06:07:04 MDT 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-017-0397-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Cimitile:2018:TNM,
author = "Aniello Cimitile and Francesco Mercaldo and Vittoria
Nardone and Antonella Santone and Corrado Aaron
Visaggio",
title = "{Talos}: no more ransomware victims with formal
methods",
journal = j-INT-J-INFO-SEC,
volume = "17",
number = "6",
pages = "719--738",
month = nov,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-017-0398-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 25 06:07:04 MDT 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-017-0398-5",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Das:2019:DSI,
author = "Debasish Das and Utpal Sharma and D. K.
Bhattacharyya",
title = "Defeating {SQL} injection attack in authentication
security: an experimental study",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "1",
pages = "1--22",
month = feb,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-017-0393-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 22 17:04:47 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-017-0393-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Dasgupta:2019:DIN,
author = "Dipankar Dasgupta and Abhijit Kumar Nag and Denise
Ferebee and Sanjib Kumar Saha and Kul Prasad Subedi and
Arunava Roy and Alvaro Madero and Abel Sanchez and John
R. Williams",
title = "Design and implementation of {Negative Authentication
System}",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "1",
pages = "23--48",
month = feb,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-017-0395-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 22 17:04:47 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-017-0395-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Stasinopoulos:2019:CAE,
author = "Anastasios Stasinopoulos and Christoforos Ntantogian
and Christos Xenakis",
title = "{Commix}: automating evaluation and exploitation of
command injection vulnerabilities in {Web}
applications",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "1",
pages = "49--72",
month = feb,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-018-0399-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 22 17:04:47 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-018-0399-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Faria:2019:DAA,
author = "Gerson de Souza Faria and Hae Yong Kim",
title = "Differential audio analysis: a new side-channel attack
on {PIN} pads",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "1",
pages = "73--84",
month = feb,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-018-0403-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 22 17:04:47 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-018-0403-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Mesbah:2019:REJ,
author = "Abdelhak Mesbah and Jean-Louis Lanet and Mohamed
Mezghiche",
title = "Reverse engineering {Java Card} and vulnerability
exploitation: a shortcut to {ROM}",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "1",
pages = "85--100",
month = feb,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-018-0401-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 22 17:04:47 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib;
https://www.math.utah.edu/pub/tex/bib/java2010.bib",
URL = "http://link.springer.com/article/10.1007/s10207-018-0401-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Hinarejos:2019:DPE,
author = "M. Francisca Hinarejos and Andreu-Pere Isern-Dey{\`a}
and Josep-Llu{\'\i}s Ferrer-Gomila and Lloren{\c{c}}
Huguet-Rotger",
title = "Deployment and performance evaluation of mobile
multicoupon solutions",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "1",
pages = "101--124",
month = feb,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-018-0404-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 22 17:04:47 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-018-0404-6;
http://link.springer.com/content/pdf/10.1007/s10207-018-0404-6.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Gulyas:2019:HIA,
author = "G{\'a}bor Gy{\"o}rgy Guly{\'a}s and S{\'a}ndor Imre",
title = "Hiding information against structural
re-identification",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "2",
pages = "125--139",
month = apr,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-018-0400-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Mar 18 14:19:02 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-018-0400-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Zheng:2019:IDR,
author = "Jian-Wu Zheng and Jing Zhao and Xin-Ping Guan",
title = "Identifier discrimination: realizing selective-{ID}
{HIBE} with authorized delegation and dedicated
encryption privacy",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "2",
pages = "141--162",
month = apr,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-018-0402-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Mar 18 14:19:02 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-018-0402-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Chang:2019:CTM,
author = "Donghoon Chang and Arpan Jati and Sweta Mishra and
Somitra Kumar Sanadhya",
title = "Cryptanalytic time-memory trade-off for password
hashing schemes",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "2",
pages = "163--180",
month = apr,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-018-0405-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Mar 18 14:19:02 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/hash.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-018-0405-5",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Kluczniak:2019:MDA,
author = "Kamil Kluczniak and Jianfeng Wang and Xiaofeng Chen
and Miroslaw Kutylowski",
title = "Multi-device anonymous authentication",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "2",
pages = "181--197",
month = apr,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-018-0406-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Mar 18 14:19:02 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-018-0406-4;
http://link.springer.com/content/pdf/10.1007/s10207-018-0406-4.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Shah:2019:MEF,
author = "Ankit Shah and Rajesh Ganesan and Sushil Jajodia",
title = "A methodology for ensuring fair allocation of {CSOC}
effort for alert investigation",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "2",
pages = "199--218",
month = apr,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-018-0407-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Mar 18 14:19:02 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-018-0407-3",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Ros-Martin:2019:SND,
author = "Miguel Ros-Mart{\'\i}n and Juli{\'a}n Salas and Jordi
Casas-Roma",
title = "Scalable non-deterministic clustering-based
$k$-anonymization for rich networks",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "2",
pages = "219--238",
month = apr,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-018-0409-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Mar 18 14:19:02 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-018-0409-1",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Joudaki:2019:ETS,
author = "Zeinab Joudaki and Julie Thorpe and Miguel {Vargas
Martin}",
title = "{Enhanced Tacit Secrets}: System-assigned passwords
you can't write down, but don't need to",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "2",
pages = "239--255",
month = apr,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-018-0408-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Mar 18 14:19:02 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-018-0408-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Bernardi:2019:DMD,
author = "Mario Luca Bernardi and Marta Cimitile Damiano
Distante and Fabio Martinelli and Francesco Mercaldo",
title = "Dynamic malware detection and phylogeny analysis using
process mining",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "3",
pages = "257--284",
month = jun,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-018-0415-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Thu May 23 17:57:24 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-018-0415-3",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Grining:2019:PPP,
author = "Krzysztof Grining and Marek Klonowski and Piotr Syga",
title = "On practical privacy-preserving fault-tolerant data
aggregation",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "3",
pages = "285--304",
month = jun,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-018-0413-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Thu May 23 17:57:24 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-018-0413-5",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Vora:2019:KBP,
author = "Aishwarya Vipul Vora and Saumya Hegde",
title = "Keyword-based private searching on cloud data along
with keyword association and dissociation using cuckoo
filter",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "3",
pages = "305--319",
month = jun,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-018-0418-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Thu May 23 17:57:24 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-018-0418-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Wu:2019:TPP,
author = "Ge Wu and Yi Mu and Willy Susilo and Fuchun Guo and
Futai Zhang",
title = "Threshold privacy-preserving cloud auditing with
multiple uploaders",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "3",
pages = "321--331",
month = jun,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-018-0420-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Thu May 23 17:57:24 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-018-0420-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Hiemenz:2019:DSS,
author = "Benedikt Hiemenz and Michel Kr{\"a}mer",
title = "Dynamic searchable symmetric encryption for storing
geospatial data in the cloud",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "3",
pages = "333--354",
month = jun,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-018-0414-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Thu May 23 17:57:24 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-018-0414-4",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Gao:2019:LBD,
author = "Wen Gao and Liqun Chen and Yupu Hu and Christopher J.
P. Newton and Baocang Wang and Jiangshan Chen",
title = "Lattice-based deniable ring signatures",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "3",
pages = "355--370",
month = jun,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-018-0417-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Thu May 23 17:57:24 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-018-0417-1;
http://link.springer.com/content/pdf/10.1007/s10207-018-0417-1.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Samadani:2019:SPM,
author = "Mohammad Hasan Samadani and Mehdi Berenjkoob and
Marina Blanton",
title = "Secure pattern matching based on bit parallelism",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "3",
pages = "371--391",
month = jun,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-018-0410-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Thu May 23 17:57:24 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib;
https://www.math.utah.edu/pub/tex/bib/string-matching.bib",
URL = "http://link.springer.com/article/10.1007/s10207-018-0410-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Kulah:2019:SAD,
author = "Yusuf Kulah and Berkay Dincer and Cemal Yilmaz and
Erkay Savas",
title = "{SpyDetector}: an approach for detecting side-channel
attacks at runtime",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "4",
pages = "393--422",
month = aug,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-018-0411-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Jul 13 14:23:17 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-018-0411-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Faghani:2019:MBM,
author = "Mohammad R. Faghani and Uyen T. Nguyen",
title = "Mobile botnets meet social networks: design and
analysis of a new type of botnet",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "4",
pages = "423--449",
month = aug,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-018-0412-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Jul 13 14:23:17 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-018-0412-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Perez-Sola:2019:DSP,
author = "Cristina P{\'e}rez-Sol{\`a} and Sergi Delgado-Segura
and Guillermo Navarro-Arribas and Jordi
Herrera-Joancomart{\'\i}",
title = "Double-spending prevention for {Bitcoin}
zero-confirmation transactions",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "4",
pages = "451--463",
month = aug,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-018-0422-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Jul 13 14:23:17 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-018-0422-4",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Rezvani:2019:AXP,
author = "Mohsen Rezvani and David Rajaratnam and Aleksandar
Ignjatovic and Maurice Pagnucco and Sanjay Jha",
title = "Analyzing {XACML} policies using answer set
programming",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "4",
pages = "465--479",
month = aug,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-018-0421-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Jul 13 14:23:17 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-018-0421-5",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Saini:2019:YCS,
author = "Anil Saini and Manoj Singh Gaur and Vijay Laxmi and
Mauro Conti",
title = "You click, {I} steal: analyzing and detecting click
hijacking attacks in web pages",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "4",
pages = "481--504",
month = aug,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-018-0423-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Jul 13 14:23:17 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-018-0423-3",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Resende:2019:BMI,
author = "Jo{\~a}o S. Resende and Patr{\'\i}cia R. Sousa and
Rolando Martins and Lu{\'\i}s Antunes",
title = "Breaking {MPC} implementations through compression",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "4",
pages = "505--518",
month = aug,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-018-0424-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Jul 13 14:23:17 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/datacompression.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-018-0424-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
keywords = "multiparty computation (MPC) [a sub-field of
cryptography with the goal of creating methods for
parties to jointly compute a function over their inputs
while keeping those inputs private]",
}
@Article{Marco-Gisbert:2019:SES,
author = "H{\'e}ctor Marco-Gisbert and Ismael Ripoll-Ripoll",
title = "{SSPFA}: effective stack smashing protection for
{Android OS}",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "4",
pages = "519--532",
month = aug,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-018-00425-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Jul 13 14:23:17 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-018-00425-8;
http://link.springer.com/content/pdf/10.1007/s10207-018-00425-8.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Farras:2019:PSP,
author = "Oriol Farr{\`a}s and Jordi Ribes-Gonz{\'a}lez",
title = "Provably secure public-key encryption with conjunctive
and subset keyword search",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "5",
pages = "533--548",
month = oct,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-018-00426-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Sep 11 11:59:37 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-018-00426-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Dyer:2019:PHE,
author = "James Dyer and Martin Dyer and Jie Xu",
title = "Practical homomorphic encryption over the integers for
secure computation in the cloud",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "5",
pages = "549--579",
month = oct,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00427-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Sep 11 11:59:37 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00427-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Takahashi:2019:SSF,
author = "Kenta Takahashi and Takahiro Matsuda and Takao
Murakami and Goichiro Hanaoka and Masakatsu Nishigaki",
title = "Signature schemes with a fuzzy private key",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "5",
pages = "581--617",
month = oct,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00428-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Sep 11 11:59:37 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00428-z;
http://link.springer.com/content/pdf/10.1007/s10207-019-00428-z.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Rastegari:2019:CDV,
author = "Parvin Rastegari and Willy Susilo and Mohammad
Dakhilalian",
title = "Certificateless designated verifier signature
revisited: achieving a concrete scheme in the standard
model",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "5",
pages = "619--635",
month = oct,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00430-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Sep 11 11:59:37 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00430-5",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Garra:2019:RAB,
author = "Ricard Garra and Dominik Leibenger and Josep M. Miret
and Francesc Seb{\'e}",
title = "Repairing an aggregation-based smart metering system",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "5",
pages = "637--646",
month = oct,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00435-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Sep 11 11:59:37 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00435-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Yu:2019:UUP,
author = "Xiaoying Yu and Qi Liao",
title = "Understanding user passwords through password prefix
and postfix ({P3}) graph analysis and visualization",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "5",
pages = "647--663",
month = oct,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00432-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Sep 11 11:59:37 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00432-3",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Makhlouf:2019:SAS,
author = "Amel Meddeb Makhlouf and Mohsen Guizani",
title = "{SE-AOMDV}: secure and efficient {AOMDV} routing
protocol for vehicular communications",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "5",
pages = "665--676",
month = oct,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00436-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Sep 11 11:59:37 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00436-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Cai:2019:STP,
author = "Yixian Cai and George Karakostas and Alan Wassyng",
title = "Secure and trusted partial grey-box verification",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "6",
pages = "677--700",
month = dec,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00431-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Sep 23 07:53:38 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00431-4",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Zhang:2019:FGA,
author = "Tao Zhang and Wang Hao Lee and Mingyuan Gao and
Jianying Zhou",
title = "{File Guard}: automatic format-based media file
sanitization",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "6",
pages = "701--713",
month = dec,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00440-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Sep 23 07:53:38 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00440-3",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Riesco:2019:LCT,
author = "R. Riesco and V. A. Villagr{\'a}",
title = "Leveraging cyber threat intelligence for a dynamic
risk framework",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "6",
pages = "715--739",
month = dec,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00433-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Sep 23 07:53:38 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00433-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Yildirim:2019:EUI,
author = "M. Yildirim and I. Mackie",
title = "Encouraging users to improve password security and
memorability",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "6",
pages = "741--759",
month = dec,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00429-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Sep 23 07:53:38 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00429-y;
http://link.springer.com/content/pdf/10.1007/s10207-019-00429-y.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Aamir:2019:DAD,
author = "Muhammad Aamir and Syed Mustafa Ali Zaidi",
title = "{DDoS} attack detection with feature engineering and
machine learning: the framework and performance
evaluation",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "6",
pages = "761--785",
month = dec,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00434-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Sep 23 07:53:38 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00434-1",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Patsakis:2019:HID,
author = "Constantinos Patsakis and Fran Casino",
title = "{Hydras} and {IPFS}: a decentralised playground for
malware",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "6",
pages = "787--799",
month = dec,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00443-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Sep 23 07:53:38 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00443-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Toreini:2019:DEW,
author = "Ehsan Toreini and Siamak F. Shahandashti and Maryam
Mehrnezhad and Feng Hao",
title = "{DOMtegrity}: ensuring web page integrity against
malicious browser extensions",
journal = j-INT-J-INFO-SEC,
volume = "18",
number = "6",
pages = "801--814",
month = dec,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00442-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Sep 23 07:53:38 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00442-1;
http://link.springer.com/content/pdf/10.1007/s10207-019-00442-1.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Takahashi:2020:MGE,
author = "Takeshi Takahashi and Rodrigo Roman Castro and
Bilhanan Silverajan and Ryan K. L. Ko and Said Tabet",
title = "Message from the guest editors",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "1",
pages = "1--2",
month = feb,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00472-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Feb 1 14:23:11 MST 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00472-9;
http://link.springer.com/content/pdf/10.1007/s10207-019-00472-9.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Aufner:2020:ISG,
author = "Peter Aufner",
title = "The {IoT} security gap: a look down into the valley
between threat models and their implementation",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "1",
pages = "3--14",
month = feb,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00445-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Feb 1 14:23:11 MST 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00445-y;
http://link.springer.com/content/pdf/10.1007/s10207-019-00445-y.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Anada:2020:KUP,
author = "Hiroaki Anada and Akira Kanaoka and Natsume Matsuzaki
and Yohei Watanabe",
title = "Key-updatable public-key encryption with keyword
search (Or: How to realize {PEKS} with efficient key
updates for {IoT} environments)",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "1",
pages = "15--38",
month = feb,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00441-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Feb 1 14:23:11 MST 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00441-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Yehuda:2020:PAR,
author = "Raz {Ben Yehuda} and Nezer Jacob Zaidenberg",
title = "Protection against reverse engineering in {ARM}",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "1",
pages = "39--51",
month = feb,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00450-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Feb 1 14:23:11 MST 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00450-1",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Ko:2020:FDD,
author = "Ili Ko and Desmond Chambers and Enda Barrett",
title = "Feature dynamic deep learning approach for {DDoS}
mitigation within the {ISP} domain",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "1",
pages = "53--70",
month = feb,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00453-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Feb 1 14:23:11 MST 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00453-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Takase:2020:PIE,
author = "Hayate Takase and Ryotaro Kobayashi and Masahiko Kato
and Ren Ohmura",
title = "A prototype implementation and evaluation of the
malware detection mechanism for {IoT} devices using the
processor information",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "1",
pages = "71--81",
month = feb,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00437-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Feb 1 14:23:11 MST 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00437-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Ozawa:2020:SIM,
author = "Seiichi Ozawa and Tao Ban and Naoki Hashimoto and
Junji Nakazato and Jumpei Shimamura",
title = "A study of {IoT} malware activities using association
rule learning for darknet sensor data",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "1",
pages = "83--92",
month = feb,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00439-w",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Feb 1 14:23:11 MST 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00439-w",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Shayesteh:2020:TMS,
author = "Behshid Shayesteh and Vesal Hakami and Ahmad Akbari",
title = "A trust management scheme for {IoT-enabled}
environmental health\slash accessibility monitoring
services",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "1",
pages = "93--110",
month = feb,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00446-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Feb 1 14:23:11 MST 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00446-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Ferraris:2020:TTR,
author = "Davide Ferraris and Carmen Fernandez-Gago",
title = "{TrUStAPIS}: a trust requirements elicitation method
for {IoT}",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "1",
pages = "111--127",
month = feb,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00438-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Feb 1 14:23:11 MST 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00438-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Sowjanya:2020:ECC,
author = "K. Sowjanya and Mou Dasgupta and Sangram Ray",
title = "An elliptic curve cryptography based enhanced
anonymous authentication protocol for wearable health
monitoring systems",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "1",
pages = "129--146",
month = feb,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00464-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Feb 1 14:23:11 MST 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00464-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Patil:2020:DVA,
author = "Rajendra Patil and Harsha Dudeja and Chirag Modi",
title = "Designing in-{VM}-assisted lightweight agent-based
malware detection framework for securing virtual
machines in cloud computing",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "2",
pages = "147--162",
month = apr,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00447-w",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 18 12:04:16 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00447-w",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{BenAttia:2020:UHT,
author = "Hasiba {Ben Attia} and Laid Kahloul Saber Benharzallah
and Samir Bourekkache",
title = "Using Hierarchical Timed Coloured {Petri} Nets in the
formal study of {TRBAC} security policies",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "2",
pages = "163--187",
month = apr,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00448-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 18 12:04:16 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
note = "See author name correction \cite{BenAttia:2020:CUH}.",
URL = "http://link.springer.com/article/10.1007/s10207-019-00448-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Adepu:2020:ASG,
author = "Sridhar Adepu and Nandha Kumar Kandasamy and Jianying
Zhou and Aditya Mathur",
title = "Attacks on smart grid: power supply interruption and
malicious power generation",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "2",
pages = "189--211",
month = apr,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00452-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 18 12:04:16 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00452-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Cheng:2020:SAA,
author = "Peng Cheng and Ibrahim Ethem Bagci and Utz Roedig and
Jeff Yan",
title = "{SonarSnoop}: active acoustic side-channel attacks",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "2",
pages = "213--228",
month = apr,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00449-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 18 12:04:16 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00449-8;
http://link.springer.com/content/pdf/10.1007/s10207-019-00449-8.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Nayak:2020:SSE,
author = "Sanjeet Kumar Nayak and Somanath Tripathy",
title = "{SEDS}: secure and efficient server-aided data
deduplication scheme for cloud storage",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "2",
pages = "229--240",
month = apr,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00455-w",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 18 12:04:16 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00455-w",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{BenAttia:2020:CUH,
author = "Hasiba {Ben Attia} and Laid Kahloul and Saber
Benharzallah and Samir Bourekkache",
title = "Correction to: {Using Hierarchical Timed Coloured
Petri Nets in the formal study of TRBAC security
policies}",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "2",
pages = "241--241",
month = apr,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00454-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 18 12:04:16 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
note = "See \cite{BenAttia:2020:UHT}.",
URL = "http://link.springer.com/article/10.1007/s10207-019-00454-x;
http://link.springer.com/content/pdf/10.1007/s10207-019-00454-x.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
remark = "In the original publication of this article, the third
author's name was incorrectly published. The correct
name of the third author should read as ``Saber
Benharzallah''.",
}
@Article{Yeh:2020:SIS,
author = "Kuo-Hui Yeh and Chunhua Su and Robert H. Deng and Moti
Yung and Miroslaw Kutylowski",
title = "Special issue on security and privacy of blockchain
technologies",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "3",
pages = "243--244",
month = jun,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00496-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue May 19 08:49:45 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00496-6;
http://link.springer.com/content/pdf/10.1007/s10207-020-00496-6.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Fan:2020:SHB,
author = "Chun-I Fan and Yi-Fan Tseng and Hui-Po Su and Ruei-Hau
Hsu and Hiroaki Kikuchi",
title = "Secure hierarchical {Bitcoin} wallet scheme against
privilege escalation attacks",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "3",
pages = "245--255",
month = jun,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00476-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue May 19 08:49:45 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00476-5",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Yohan:2020:FSB,
author = "Alexander Yohan and Nai-Wei Lo",
title = "{FOTB}: a secure blockchain-based firmware update
framework for {IoT} environment",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "3",
pages = "257--278",
month = jun,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00467-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue May 19 08:49:45 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00467-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Meng:2020:ECB,
author = "Weizhi Meng and Wenjuan Li and Laurence T. Yang and
Peng Li",
title = "Enhancing challenge-based collaborative intrusion
detection networks against insider attacks using
blockchain",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "3",
pages = "279--290",
month = jun,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00462-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue May 19 08:49:45 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00462-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Sattath:2020:IQB,
author = "Or Sattath",
title = "On the insecurity of quantum {Bitcoin} mining",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "3",
pages = "291--302",
month = jun,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00493-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue May 19 08:49:45 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00493-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Zhou:2020:IFV,
author = "Yuanjian Zhou and Yining Liu and Chengshun Jiang and
Shulan Wang",
title = "An improved {FOO} voting scheme using blockchain",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "3",
pages = "303--310",
month = jun,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00457-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue May 19 08:49:45 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00457-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Bao:2020:LSP,
author = "Zijian Bao and Wenbo Shi and Saru Kumari and Zhi-yin
Kong and Chien-Ming Chen",
title = "{Lockmix}: a secure and privacy-preserving mix service
for {Bitcoin} anonymity",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "3",
pages = "311--321",
month = jun,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00459-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue May 19 08:49:45 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00459-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Zhang:2020:CBE,
author = "Shufan Zhang and Lili Wang and Hu Xiong",
title = "{Chaintegrity}: blockchain-enabled large-scale
e-voting system with robustness and universal
verifiability",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "3",
pages = "323--341",
month = jun,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00465-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue May 19 08:49:45 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00465-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Tiloca:2020:GRB,
author = "Marco Tiloca and Gianluca Dini and Kiki Rizki and
Shahid Raza",
title = "Group rekeying based on member join history",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "4",
pages = "343--381",
month = aug,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00451-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jul 21 07:55:30 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00451-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Seo:2020:ERL,
author = "Minhye Seo and Suhri Kim and Dong Hoon Lee and Jong
Hwan Park",
title = "{EMBLEM}: {(R)LWE}-based key encapsulation with a new
multi-bit encoding method",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "4",
pages = "383--399",
month = aug,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00456-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jul 21 07:55:30 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00456-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Holzl:2020:DDA,
author = "Michael H{\"o}lzl and Michael Roland and Omid Mir and
Ren{\'e} Mayrhofer",
title = "Disposable dynamic accumulators: toward practical
privacy-preserving mobile {eIDs} with scalable
revocation",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "4",
pages = "401--417",
month = aug,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00458-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jul 21 07:55:30 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00458-7;
http://link.springer.com/content/pdf/10.1007/s10207-019-00458-7.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Ogata:2020:SAS,
author = "Wakaha Ogata and Takaaki Otemori",
title = "Security analysis of secure {kNN} and ranked keyword
search over encrypted data",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "4",
pages = "419--425",
month = aug,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00461-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jul 21 07:55:30 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00461-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Pilz:2020:SAS,
author = "M. Pilz and F. Baghaei Naeini and K. Grammont and C.
Smagghe and M. Davis and J.-C. Nebel and L. Al-Fagih
and E. Pfluegel",
title = "Security attacks on smart grid scheduling and their
defences: a game-theoretic approach",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "4",
pages = "427--443",
month = aug,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00460-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jul 21 07:55:30 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00460-z;
http://link.springer.com/content/pdf/10.1007/s10207-019-00460-z.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Ueda:2020:SIR,
author = "Itaru Ueda and Daiki Miyahara and Akihiro Nishimura
and Yu-ichi Hayashi and Takaaki Mizuki and Hideaki
Sone",
title = "Secure implementations of a random bisection cut",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "4",
pages = "445--452",
month = aug,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00463-w",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jul 21 07:55:30 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00463-w",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Wu:2020:CIB,
author = "Chunhui Wu and Xiaofeng Chen and Willy Susilo",
title = "Concise {ID}-based mercurial functional commitments
and applications to zero-knowledge sets",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "4",
pages = "453--464",
month = aug,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00466-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jul 21 07:55:30 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00466-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Casas-Roma:2020:DGD,
author = "Jordi Casas-Roma",
title = "{DUEF-GA}: data utility and privacy evaluation
framework for graph anonymization",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "4",
pages = "465--478",
month = aug,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00469-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jul 21 07:55:30 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00469-4",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Mitropoulos:2020:PAC,
author = "Dimitris Mitropoulos and Thodoris Sotiropoulos and
Nikos Koutsovasilis and Diomidis Spinellis",
title = "{PDGuard}: an architecture for the control and secure
processing of personal data",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "4",
pages = "479--498",
month = aug,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00468-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jul 21 07:55:30 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00468-5",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Sheikhalishahi:2020:DWD,
author = "Mina Sheikhalishahi and Andrea Saracino and Fabio
Martinelli and Antonio {La Marra} and Mohammed Mejri
and Nadia Tawbi",
title = "Digital Waste Disposal: an automated framework for
analysis of spam emails",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "5",
pages = "499--522",
month = oct,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00470-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Aug 15 07:08:49 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00470-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Alzaidi:2020:DHP,
author = "Areej Alzaidi and Suhair Alshehri and Seyed M.
Buhari",
title = "{DroidRista}: a highly precise static data flow
analysis framework for {Android} applications",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "5",
pages = "523--536",
month = oct,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00471-w",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Aug 15 07:08:49 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00471-w",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Torra:2020:RDP,
author = "Vicen{\c{c}} Torra",
title = "Random dictatorship for privacy-preserving social
choice",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "5",
pages = "537--545",
month = oct,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00474-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Aug 15 07:08:49 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00474-7;
http://link.springer.com/content/pdf/10.1007/s10207-019-00474-7.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Bernardini:2020:ASS,
author = "Riccardo Bernardini and Roberto Rinaldo",
title = "Analysis of some simple stabilizers for physically
obfuscated keys",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "5",
pages = "547--565",
month = oct,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00473-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Aug 15 07:08:49 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00473-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Nguyen:2020:NGB,
author = "Huy-Trung Nguyen and Quoc-Dung Ngo and Van-Hoang Le",
title = "A novel graph-based approach for {IoT} botnet
detection",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "5",
pages = "567--577",
month = oct,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00475-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Aug 15 07:08:49 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00475-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Manasrah:2020:KPD,
author = "Ahmed M. Manasrah and Areej R. AL-Rabadi and Najib A.
Kofahi",
title = "Key pre-distribution approach using block {$ L U $}
decomposition in wireless sensor network",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "5",
pages = "579--596",
month = oct,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00477-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Aug 15 07:08:49 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00477-4",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Taheri:2020:CTU,
author = "Sona Taheri and Adil M. Bagirov and Iqbal Gondal and
Simon Brown",
title = "Cyberattack triage using incremental clustering for
intrusion detection systems",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "5",
pages = "597--607",
month = oct,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00478-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Aug 15 07:08:49 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00478-3",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Hale:2020:UMA,
author = "Britta Hale",
title = "User-mediated authentication protocols and
unforgeability in key collision",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "6",
pages = "609--621",
month = dec,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00479-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 19 07:03:34 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00479-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Picazo-Sanchez:2020:AYP,
author = "Pablo Picazo-Sanchez and Juan Tapiador and Gerardo
Schneider",
title = "After you, please: browser extensions order attacks
and countermeasures",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "6",
pages = "623--638",
month = dec,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00481-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 19 07:03:34 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00481-8;
http://link.springer.com/content/pdf/10.1007/s10207-019-00481-8.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Zhang:2020:FAB,
author = "Yanting Zhang and Jianwei Liu and Zongyang Zhang and
Weiran Liu",
title = "{FDCO}: attribute-based fast data cloud-outsourcing
scheme for mobile devices",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "6",
pages = "639--656",
month = dec,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00480-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 19 07:03:34 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00480-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Sethi:2020:CAR,
author = "Kamalakanta Sethi and E. Sai Rupesh and Rahul Kumar
and Padmalochan Bera and Y. Venu Madhav",
title = "A context-aware robust intrusion detection system: a
reinforcement learning-based approach",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "6",
pages = "657--678",
month = dec,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00482-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 19 07:03:34 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00482-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Melki:2020:LMF,
author = "Reem Melki and Hassan N. Noura and Ali Chehab",
title = "Lightweight multi-factor mutual authentication
protocol for {IoT} devices",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "6",
pages = "679--694",
month = dec,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00484-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 19 07:03:34 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00484-5",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Tavizi:2020:LPS,
author = "Tina Tavizi and Mehdi Shajari",
title = "A language and a pattern system for temporal property
specification: advanced metering infrastructure case
study",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "6",
pages = "695--710",
month = dec,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00483-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 19 07:03:34 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00483-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Sun:2020:PDI,
author = "Lixue Sun and Chunxiang Xu and Yuan Zhang and Kefei
Chen",
title = "Public data integrity auditing without homomorphic
authenticators from indistinguishability obfuscation",
journal = j-INT-J-INFO-SEC,
volume = "19",
number = "6",
pages = "711--720",
month = dec,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00486-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 19 07:03:34 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00486-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Leontiadis:2021:SCR,
author = "Iraklis Leontiadis and Ming Li",
title = "Secure and collusion-resistant data aggregation from
convertible tags",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "1",
pages = "1--20",
month = feb,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-019-00485-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 19 07:03:35 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-019-00485-4",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Schlette:2021:MVC,
author = "Daniel Schlette and Fabian B{\"o}hm and Marco Caselli
and G{\"u}nther Pernul",
title = "Measuring and visualizing cyber threat intelligence
quality",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "1",
pages = "21--38",
month = feb,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00490-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 19 07:03:35 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00490-y;
http://link.springer.com/content/pdf/10.1007/s10207-020-00490-y.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{El-Zawawy:2021:DLN,
author = "Mohamed A. El-Zawawy and Eleonora Losiouk and Mauro
Conti",
title = "Do not let {Next-Intent Vulnerability} be your next
nightmare: type system-based approach to detect it in
{Android} apps",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "1",
pages = "39--58",
month = feb,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00491-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 19 07:03:35 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00491-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Liu:2021:NEM,
author = "Pengfei Liu and Weiping Wang and Xi Luo and Haodong
Wang and Chushu Liu",
title = "{NSDroid}: efficient multi-classification of {Android}
malware using neighborhood signature in local function
call graphs",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "1",
pages = "59--71",
month = feb,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00489-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 19 07:03:35 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00489-5",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{VandenBroeck:2021:OIS,
author = "Jens {Van den Broeck} and Bart Coppens and Bjorn {De
Sutter}",
title = "Obfuscated integration of software protections",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "1",
pages = "73--101",
month = feb,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00494-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 19 07:03:35 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00494-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Jia:2021:CNI,
author = "Huiwen Jia and Chunming Tang",
title = "Cryptanalysis of a non-interactive deniable ring
signature scheme",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "1",
pages = "103--112",
month = feb,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00497-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 19 07:03:35 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00497-5",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Ibnugraha:2021:RMD,
author = "Prajna Deshanta Ibnugraha and Lukito Edi Nugroho and
Paulus Insap Santosa",
title = "Risk model development for information security in
organization environment based on business
perspectives",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "1",
pages = "113--126",
month = feb,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00495-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Jan 19 07:03:35 MST 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00495-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Li:2021:TBB,
author = "Wenjuan Li and Yu Wang and Man Ho Au",
title = "Toward a blockchain-based framework for
challenge-based collaborative intrusion detection",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "2",
pages = "127--139",
month = apr,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00488-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Mar 23 08:25:39 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-020-00488-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
online-date = "Published: 11 February 2020 Pages: 127 - 139",
}
@Article{Xu:2021:SLR,
author = "Jia Xu and Jianying Zhou",
title = "Strong leakage-resilient encryption: enhancing data
confidentiality by hiding partial ciphertext",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "2",
pages = "141--159",
month = apr,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00487-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Mar 23 08:25:39 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-020-00487-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
online-date = "Published: 12 February 2020 Pages: 141 - 159",
}
@Article{Faisal:2021:SAT,
author = "Abu Faisal and Mohammad Zulkernine",
title = "A secure architecture for {TCP\slash UDP}-based cloud
communications",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "2",
pages = "161--179",
month = apr,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00511-w",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Mar 23 08:25:39 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-020-00511-w",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
online-date = "Published: 07 July 2020 Pages: 161 - 179",
}
@Article{Solano:2021:CBB,
author = "Jesus Solano and Luis Camacho and Mart{\'\i}n Ochoa",
title = "Combining behavioral biometrics and session context
analytics to enhance risk-based static authentication
in web applications",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "2",
pages = "181--197",
month = apr,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00510-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Mar 23 08:25:39 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-020-00510-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
online-date = "Published: 16 June 2020 Pages: 181 - 197",
}
@Article{Chatterjee:2021:SEW,
author = "Sanjit Chatterjee and Manish Kesarwani and Akash
Shah",
title = "Secure and efficient wildcard search over encrypted
data",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "2",
pages = "199--244",
month = apr,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00492-w",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Mar 23 08:25:39 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-020-00492-w",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
online-date = "Published: 30 March 2020 Pages: 199 - 244",
}
@Article{Medina-Lopez:2021:SAD,
author = "Crist{\'o}bal Medina-L{\'o}pez and L. G. Casado and
Yuansong Qiao",
title = "An {SDN} approach to detect targeted attacks in {P2P}
fully connected overlays",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "2",
pages = "245--255",
month = apr,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00499-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Mar 23 08:25:39 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-020-00499-3",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
online-date = "Published: 02 May 2020 Pages: 245 - 255",
}
@Article{Wang:2021:SLR,
author = "Yuntao Wang and Tsuyoshi Takagi",
title = "Studying lattice reduction algorithms improved by
quick reordering technique",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "2",
pages = "257--268",
month = apr,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00501-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Mar 23 08:25:39 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-020-00501-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
online-date = "Published: 13 May 2020 Pages: 257 - 268",
}
@Article{Benarfa:2021:CED,
author = "Abdelmadjid Benarfa and Muhammad Hassan and Eleonora
Losiouk and Alberto Compagno and Mohamed Bachir Yagoubi
and Mauro Conti",
title = "{ChoKIFA+}: an early detection and mitigation approach
against interest flooding attacks in {NDN}",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "3",
pages = "269--285",
month = jun,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00500-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat May 29 07:09:27 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00500-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Manulis:2021:CSN,
author = "M. Manulis and C. P. Bridges and R. Harrison and V.
Sekar and A. Davis",
title = "Cyber security in New Space",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "3",
pages = "287--311",
month = jun,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00503-w",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat May 29 07:09:27 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00503-w;
http://link.springer.com/content/pdf/10.1007/s10207-020-00503-w.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Berger:2021:WTC,
author = "Harel Berger and Amit Z. Dvir and Moti Geva",
title = "A wrinkle in time: a case study in {DNS} poisoning",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "3",
pages = "313--329",
month = jun,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00502-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat May 29 07:09:27 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00502-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Ji:2021:EVA,
author = "Soo-Yeon Ji and Bong-Keun Jeong and Dong Hyun Jeong",
title = "Evaluating visualization approaches to detect abnormal
activities in network traffic data",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "3",
pages = "331--345",
month = jun,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00504-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat May 29 07:09:27 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00504-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Spathoulas:2021:UHE,
author = "Georgios Spathoulas and Georgios Theodoridis and
Georgios-Paraskevas Damiris",
title = "Using homomorphic encryption for privacy-preserving
clustering of intrusion detection alerts",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "3",
pages = "347--370",
month = jun,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00506-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat May 29 07:09:27 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00506-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Pitolli:2021:MAF,
author = "Gregorio Pitolli and Giuseppe Laurenza and Leonardo
Aniello and Leonardo Querzoni and Roberto Baldoni",
title = "{MalFamAware}: automatic family identification and
malware classification through online clustering",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "3",
pages = "371--386",
month = jun,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00509-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat May 29 07:09:27 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00509-4",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Mighan:2021:NSI,
author = "Soosan Naderi Mighan and Mohsen Kahani",
title = "A novel scalable intrusion detection system based on
deep learning",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "3",
pages = "387--403",
month = jun,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00508-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat May 29 07:09:27 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00508-5",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Mandal:2021:ATC,
author = "Mriganka Mandal",
title = "Anonymity in traceable cloud data broadcast system
with simultaneous individual messaging",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "3",
pages = "405--430",
month = jun,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00512-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat May 29 07:09:27 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00512-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Khan:2021:EAB,
author = "Fawad Khan and Hui Li and Yinghui Zhang and Haider
Abbas and Tahreem Yaqoob",
title = "Efficient attribute-based encryption with repeated
attributes optimization",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "3",
pages = "431--444",
month = jun,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00505-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat May 29 07:09:27 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00505-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Aniello:2021:ABT,
author = "Leonardo Aniello and Basel Halak and Peter Chai and
Riddhi Dhall and Mircea Mihalea and Adrian Wilczynski",
title = "{Anti-BlUFf}: towards counterfeit mitigation in {IC}
supply chains using blockchain and {PUF}",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "3",
pages = "445--460",
month = jun,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00513-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat May 29 07:09:27 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00513-8;
http://link.springer.com/content/pdf/10.1007/s10207-020-00513-8.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Yamauchi:2021:AKO,
author = "Toshihiro Yamauchi and Yohei Akao and Ryota Yoshitani
and Yuichi Nakamura and Masaki Hashimoto",
title = "Additional kernel observer: privilege escalation
attack prevention mechanism focusing on system call
privilege changes",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "4",
pages = "461--473",
month = aug,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00514-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Jul 28 09:12:45 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00514-7;
http://link.springer.com/content/pdf/10.1007/s10207-020-00514-7.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Kim:2021:ISD,
author = "Hyoseung Kim and Kwangsu Lee and Jong Hwan Park and
Dong Hoon Lee",
title = "Improving the security of direct anonymous attestation
under host corruptions",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "4",
pages = "475--492",
month = aug,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00507-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Jul 28 09:12:45 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00507-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Jouini:2021:QAS,
author = "Mouna Jouini and Latifa {Ben Arfa Rabai} and Ridha
Khedri",
title = "A quantitative assessment of security risks based on a
multifaceted classification approach",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "4",
pages = "493--510",
month = aug,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00515-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Jul 28 09:12:45 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00515-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Deldar:2021:EST,
author = "Fatemeh Deldar and Mahdi Abadi",
title = "Enhancing spatial and temporal utilities in
differentially private moving objects database
release",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "4",
pages = "511--533",
month = aug,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00516-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Jul 28 09:12:45 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00516-5",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Bi:2021:MPA,
author = "Kun Bi and Dezhi Han and Guichen Zhang and Kuan-Ching
Li and Aniello Castiglione",
title = "{$K$} maximum probability attack paths generation
algorithm for target nodes in networked systems",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "4",
pages = "535--551",
month = aug,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00517-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Jul 28 09:12:45 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00517-4",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Sermpinis:2021:DDT,
author = "Thomas Sermpinis and George Vlahavas and Konstantinos
Karasavvas and Athena Vakali",
title = "{DeTRACT}: a decentralized, transparent, immutable and
open {PKI} certificate framework",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "4",
pages = "553--570",
month = aug,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00518-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Jul 28 09:12:45 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00518-3",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Ferraris:2021:TMP,
author = "Davide Ferraris and Daniel Bastos and Carmen
Fernandez-Gago and Fadi El-Moussa",
title = "A trust model for popular smart home devices",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "4",
pages = "571--587",
month = aug,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00519-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Jul 28 09:12:45 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00519-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Lee:2021:BBM,
author = "Tian-Fu Lee and Hong-Ze Li and Yi-Pei Hsieh",
title = "A blockchain-based medical data preservation scheme
for telecare medical information systems",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "4",
pages = "589--601",
month = aug,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00521-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Jul 28 09:12:45 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00521-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Parida:2021:PMC,
author = "Trushna Parida and Suvrojit Das",
title = "{PageDumper}: a mechanism to collect page table
manipulation information at run-time",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "4",
pages = "603--619",
month = aug,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00520-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Jul 28 09:12:45 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00520-9",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Ngamboe:2021:RAC,
author = "Mika{\"e}la Ngambo{\'e} and Paul Berthier and Nader
Ammari and Katia Dyrda and Jos{\'e} M. Fernandez",
title = "Risk assessment of cyber-attacks on telemetry-enabled
cardiac implantable electronic devices ({CIED})",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "4",
pages = "621--645",
month = aug,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00522-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Jul 28 09:12:45 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00522-7;
http://link.springer.com/content/pdf/10.1007/s10207-020-00522-7.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Gomez:2021:CCM,
author = "Juan Manuel Castelo G{\'o}mez and Javier Carrillo
Mond{\'e}jar and Jos{\'e} Rold{\'a}n G{\'o}mez and
Jos{\'e} Luis Mart{\'\i}nez Mart{\'\i}nez",
title = "A context-centered methodology for {IoT} forensic
investigations",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "5",
pages = "647--673",
month = oct,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00523-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Aug 14 05:33:52 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00523-6",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Chen:2021:PAS,
author = "Liqun Chen and Kaibin Huang and Mark Manulis and
Venkkatesh Sekar",
title = "Password-authenticated searchable encryption",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "5",
pages = "675--693",
month = oct,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00524-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Aug 14 05:33:52 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00524-5;
http://link.springer.com/content/pdf/10.1007/s10207-020-00524-5.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Sicari:2021:ABE,
author = "Sabrina Sicari and Alessandra Rizzardi and Gianluca
Dini and Pericle Perazzo and Michele {La Manna} and
Alberto Coen-Porisini",
title = "Attribute-based encryption and sticky policies for
data access control in a smart home scenario: a
comparison on networked smart object middleware",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "5",
pages = "695--713",
month = oct,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00526-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Aug 14 05:33:52 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00526-3;
http://link.springer.com/content/pdf/10.1007/s10207-020-00526-3.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Borges:2021:EPP,
author = "Ricard Borges and Francesc Seb{\'e}",
title = "An efficient privacy-preserving pay-by-phone system
for regulated parking areas",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "5",
pages = "715--727",
month = oct,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00527-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Aug 14 05:33:52 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00527-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Miyahara:2021:ECB,
author = "Daiki Miyahara and Itaru Ueda and Yu-ichi Hayashi and
Takaaki Mizuki and Hideaki Sone",
title = "Evaluating card-based protocols in terms of execution
time",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "5",
pages = "729--740",
month = oct,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00525-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Aug 14 05:33:52 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00525-4;
http://link.springer.com/content/pdf/10.1007/s10207-020-00525-4.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Menges:2021:DDI,
author = "Florian Menges and Benedikt Putz and G{\"u}nther
Pernul",
title = "{DEALER}: decentralized incentives for threat
intelligence reporting and exchange",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "5",
pages = "741--761",
month = oct,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00528-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Aug 14 05:33:52 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00528-1;
http://link.springer.com/content/pdf/10.1007/s10207-020-00528-1.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Granese:2021:EMP,
author = "Federica Granese and Daniele Gorla and Catuscia
Palamidessi",
title = "Enhanced models for privacy and utility in
continuous-time diffusion networks",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "5",
pages = "763--782",
month = oct,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00530-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Aug 14 05:33:52 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00530-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Josephlal:2021:EIR,
author = "Edwin Franco Myloth Josephlal and Sridhar Adepu and
Zheng Yang and Jianying Zhou",
title = "Enabling isolation and recovery in {PLC} redundancy
framework of metro train systems",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "6",
pages = "783--795",
month = dec,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00529-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Oct 19 09:44:52 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00529-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Alecakir:2021:ATI,
author = "Huseyin Alecakir and Burcu Can and Sevil Sen",
title = "Attention: there is an inconsistency between {Android}
permissions and application metadata!",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "6",
pages = "797--815",
month = dec,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00536-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Oct 19 09:44:52 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00536-1",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Murvay:2021:SCA,
author = "Pal-Stefan Murvay and Lucian Popa and Bogdan Groza",
title = "Securing the controller area network with covert
voltage channels",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "6",
pages = "817--831",
month = dec,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00532-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Oct 19 09:44:52 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00532-5",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Imamura:2021:WAM,
author = "Yuta Imamura and Rintaro Orito and Hiroyuki Uekawa and
Kritsana Chaikaew and Pattara Leelaprute and Masaya
Sato and Toshihiro Yamauchi",
title = "{Web} access monitoring mechanism via {Android
WebView} for threat analysis",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "6",
pages = "833--847",
month = dec,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00534-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Oct 19 09:44:52 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00534-3;
http://link.springer.com/content/pdf/10.1007/s10207-020-00534-3.pdf",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Yankson:2021:CIP,
author = "Benjamin Yankson",
title = "Continuous improvement process ({CIP})-based
privacy-preserving framework for smart connected toys",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "6",
pages = "849--869",
month = dec,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00535-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Oct 19 09:44:52 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-020-00535-2",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Cianciullo:2021:OCD,
author = "Louis Cianciullo and Hossein Ghodosi",
title = "Outsourced cheating detection for secret sharing",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "6",
pages = "871--878",
month = dec,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-021-00538-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Oct 19 09:44:52 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-021-00538-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Bonte:2021:THM,
author = "Charlotte Bonte and Nigel P. Smart and Titouan
Tanguy",
title = "Thresholdizing {HashEdDSA}: {MPC} to the Rescue",
journal = j-INT-J-INFO-SEC,
volume = "20",
number = "6",
pages = "879--894",
month = dec,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-021-00539-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Oct 19 09:44:52 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/hash.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "http://link.springer.com/article/10.1007/s10207-021-00539-6",
abstract = "Following recent comments in a NIST document related
to threshold cryptographic standards, we examine the
case of thresholdizing the HashEdDSA signature scheme.
This is a deterministic signature scheme based on
Edwards elliptic curves. Unlike DSA, it has a
Schnorr-like signature equation, which is an advantage
for threshold implementations, but it has the
disadvantage of having the ephemeral secret obtained by
hashing the secret key and the message. We show that
one can obtain relatively efficient implementations of
threshold HashEdDSA with no modifications to the
behaviour of the signing algorithm; we achieve this
using a doubly authenticated bit (daBit) generation
protocol tailored for $ Q_2 $ access structures that is
more efficient than prior work. However, if one was to
modify the standard algorithm to use an MPC-friendly
hash function, such as Rescue, the performance becomes
very fast indeed.",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Kim:2022:DAD,
author = "Hee Yeon Kim and Ji Hoon Kim and Kyounggon Kim",
title = "{DAPP}: automatic detection and analysis of prototype
pollution vulnerability in \pkg{Node.js} modules",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "1",
pages = "1--23",
month = feb,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00537-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Feb 14 11:57:44 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-020-00537-0",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Shin:2022:NSS,
author = "Hansub Shin and Sungyong Sim and Younho Lee",
title = "A new smart smudge attack using {CNN}",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "1",
pages = "25--36",
month = feb,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-021-00540-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Feb 14 11:57:44 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-021-00540-z",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Stergiopoulos:2022:AAA,
author = "George Stergiopoulos and Panagiotis Dedousis and
Dimitris Gritzalis",
title = "Automatic analysis of attack graphs for risk
mitigation and prioritization on large-scale and
complex networks in {Industry 4.0}",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "1",
pages = "37--59",
month = feb,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00533-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Feb 14 11:57:44 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-020-00533-4",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Lyvas:2022:MME,
author = "Christos Lyvas and Christoforos Ntantogian and
Christos Xenakis",
title = "\pkg{[m]allotROPism}: a metamorphic engine for
malicious software variation development",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "1",
pages = "61--78",
month = feb,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-021-00541-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Feb 14 11:57:44 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-021-00541-y",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Sheikhalishahi:2022:PPD,
author = "Mina Sheikhalishahi and Andrea Saracino and Antonio
{La Marra}",
title = "Privacy preserving data sharing and analysis for
edge-based architectures",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "1",
pages = "79--101",
month = feb,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-021-00542-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Feb 14 11:57:44 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-021-00542-x",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Braeken:2022:PKV,
author = "An Braeken",
title = "Public key versus symmetric key cryptography in
client--server authentication protocols",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "1",
pages = "103--114",
month = feb,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-021-00543-w",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Feb 14 11:57:44 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-021-00543-w",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Yaacoub:2022:RCS,
author = "Jean-Paul A. Yaacoub and Hassan N. Noura and Ali
Chehab",
title = "Robotics cyber security: vulnerabilities, attacks,
countermeasures, and recommendations",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "1",
pages = "115--158",
month = feb,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-021-00545-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Feb 14 11:57:44 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-021-00545-8",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Anonymous:2022:TS,
author = "Anonymous",
title = "Track for surveys",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "1",
pages = "159--159",
month = feb,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-021-00546-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Feb 14 11:57:44 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-021-00546-7",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Yichiet:2022:SAL,
author = "Aun Yichiet and Yen-Min Jasmina Khaw and Vasaki
Ponnusamy",
title = "A semantic-aware log generation method for network
activities",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "2",
pages = "161--177",
month = apr,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-021-00547-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Thu Mar 24 07:43:45 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-021-00547-6",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Tommasi:2022:BMB,
author = "Franco Tommasi and Christian Catalano and Ivan
Taurino",
title = "{Browser-in-the-Middle (BitM)} attack",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "2",
pages = "179--189",
month = apr,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-021-00548-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Thu Mar 24 07:43:45 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-021-00548-5",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Melo:2022:IAI,
author = "Roberto Vasconcelos Melo and Douglas D. J. de Macedo
and Mauricio Martinuzzi Fiorenza",
title = "{ISM-AC}: an immune security model based on alert
correlation and software-defined networking",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "2",
pages = "191--205",
month = apr,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-021-00550-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Thu Mar 24 07:43:45 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-021-00550-x",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Hougaard:2022:ALO,
author = "Hector B. Hougaard and Atsuko Miyaji",
title = "Authenticated logarithmic-order supersingular isogeny
group key exchange",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "2",
pages = "207--221",
month = apr,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-021-00549-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Thu Mar 24 07:43:45 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-021-00549-4",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Munonye:2022:MLA,
author = "Kindson Munonye and Martinek P{\'e}ter",
title = "Machine learning approach to vulnerability detection
in {OAuth 2.0} authentication and authorization flow",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "2",
pages = "223--237",
month = apr,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-021-00551-w",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Thu Mar 24 07:43:45 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-021-00551-w",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Yildirim:2022:MIT,
author = "Metehan Yildirim and Emin Anarim",
title = "Mitigating insider threat by profiling users based on
mouse usage pattern: ensemble learning and frequency
domain analysis",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "2",
pages = "239--251",
month = apr,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-021-00544-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Thu Mar 24 07:43:45 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-021-00544-9",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Bajic:2022:ABN,
author = "Alexander Bajic and Georg T. Becker",
title = "Automated benchmark network diversification for
realistic attack simulation with application to moving
target defense",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "2",
pages = "253--278",
month = apr,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-021-00552-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Thu Mar 24 07:43:45 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-021-00552-9",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Mimura:2022:ANT,
author = "Mamoru Mimura and Ryo Ito",
title = "Applying {NLP} techniques to malware detection in a
practical environment",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "2",
pages = "279--291",
month = apr,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-021-00553-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Thu Mar 24 07:43:45 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-021-00553-8",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Erdodi:2022:AWM,
author = "L{\'a}szl{\'o} Erd{\H{o}}di and Fabio Massimo
Zennaro",
title = "The {Agent Web Model}: modeling web hacking for
reinforcement learning",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "2",
pages = "293--309",
month = apr,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-021-00554-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Thu Mar 24 07:43:45 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-021-00554-7",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Lee:2022:SPM,
author = "Junwon Lee and Heejo Lee",
title = "An {SSH} predictive model using machine learning with
web proxy session logs",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "2",
pages = "311--322",
month = apr,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-021-00555-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Thu Mar 24 07:43:45 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-021-00555-6",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Hadjadj:2022:OPF,
author = "Taha Elamine Hadjadj and Adel Bouhoula and Riadh
Ksantini",
title = "Optimization of parallel firewalls filtering rules",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "2",
pages = "323--340",
month = apr,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-021-00557-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Thu Mar 24 07:43:45 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-021-00557-4",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Zhang:2022:THG,
author = "Zheng Zhang and Shaohao Xie and Fangguo Zhang",
title = "Topology-hiding garbled circuits without universal
circuits",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "2",
pages = "341--356",
month = apr,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-021-00556-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Thu Mar 24 07:43:45 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-021-00556-5",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Kazoleas:2022:NMR,
author = "Ioannis Kazoleas and Panagiotis Karampelas",
title = "A novel malicious remote administration tool using
stealth and self-defense techniques",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "2",
pages = "357--378",
month = apr,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-021-00559-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Thu Mar 24 07:43:45 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-021-00559-2",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Ahmad:2022:EAC,
author = "Tahir Ahmad and Umberto Morelli and Nicola Zannone",
title = "Extending access control in {AWS} {IoT} through
event-driven functions: an experimental evaluation
using a smart lock system",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "2",
pages = "379--408",
month = apr,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-021-00558-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Thu Mar 24 07:43:45 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-021-00558-3",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Parish:2022:PGU,
author = "Zach Parish and Connor Cushing and Julie Thorpe",
title = "Password guessers under a microscope: an in-depth
analysis to inform deployments",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "2",
pages = "409--425",
month = apr,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-021-00560-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Thu Mar 24 07:43:45 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-021-00560-9",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Bhattacharjya:2022:EVS,
author = "Sairath Bhattacharjya and Hossein Saiedian",
title = "Establishing and validating secured keys for {IoT}
devices: using {P3} connection model on a cloud-based
architecture",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "3",
pages = "427--436",
month = jun,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-021-00562-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat May 28 06:50:21 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-021-00562-7",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Spence:2022:SBC,
author = "Aaron Spence and Shaun Bangay",
title = "Security beyond cybersecurity: side-channel attacks
against non-cyber systems and their countermeasures",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "3",
pages = "437--453",
month = jun,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-021-00563-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat May 28 06:50:21 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-021-00563-6",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Park:2022:EDP,
author = "Cheolhee Park and Dowon Hong and Changho Seo",
title = "Evaluating differentially private decision tree model
over model inversion attack",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "3",
pages = "1--14",
month = jun,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-021-00564-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat May 28 06:50:21 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-021-00564-5",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Alghamdi:2022:NTA,
author = "Saleh A. Alghamdi",
title = "Novel trust-aware intrusion detection and prevention
system for {5G} {MANET-Cloud}",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "3",
pages = "469--488",
month = jun,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-020-00531-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat May 28 06:50:21 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-020-00531-6",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Ghorbel:2022:APP,
author = "Amal Ghorbel and Mahmoud Ghorbel and Mohamed Jmaiel",
title = "Accountable privacy preserving attribute-based access
control for cloud services enforced using blockchain",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "3",
pages = "489--508",
month = jun,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-021-00565-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat May 28 06:50:21 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-021-00565-4",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Zhang:2022:RLA,
author = "Lu Zhang and Arie Taal and Paola Grosso",
title = "A risk-level assessment system based on the
{STRIDE\slash DREAD} model for digital data
marketplaces",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "3",
pages = "509--525",
month = jun,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-021-00566-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat May 28 06:50:21 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-021-00566-3",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Singh:2022:IAM,
author = "Jaya Singh and Ayush Sinha and Om Prakash Vyas",
title = "Insider attack mitigation in a smart metering
infrastructure using reputation score and blockchain
technology",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "3",
pages = "527--546",
month = jun,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-021-00561-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat May 28 06:50:21 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-021-00561-8",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Soltani:2022:CBD,
author = "Mahdi Soltani and Mahdi Jafari Siavoshani and Amir
Hossein Jahangir",
title = "A content-based deep intrusion detection system",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "3",
pages = "547--562",
month = jun,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-021-00567-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat May 28 06:50:21 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-021-00567-2",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Tiplea:2022:NPD,
author = "Ferucio Laurentiu Tiplea",
title = "Narrow privacy and desynchronization in {Vaudenay}'s
{RFID} model",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "3",
pages = "563--575",
month = jun,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-021-00569-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat May 28 06:50:21 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-021-00569-0",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Khan:2022:PAK,
author = "Haibat Khan and Benjamin Dowling and Keith M. Martin",
title = "Pragmatic authenticated key agreement for {IEEE Std
802.15.6}",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "3",
pages = "577--595",
month = jun,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-021-00570-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat May 28 06:50:21 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-021-00570-7",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Potteiger:2022:DSR,
author = "Bradley Potteiger and Feiyang Cai and Xenofon
Koutsoukos",
title = "Data space randomization for securing cyber-physical
systems",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "3",
pages = "597--610",
month = jun,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-021-00568-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat May 28 06:50:21 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-021-00568-1",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Amraoui:2022:ABD,
author = "Noureddine Amraoui and Belhassen Zouari",
title = "Anomalous behavior detection-based approach for
authenticating smart home system users",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "3",
pages = "611--636",
month = jun,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-021-00571-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat May 28 06:50:21 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-021-00571-6",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Shah:2022:MLO,
author = "Ankit Shah and Rajesh Ganesan and Hasan Cam",
title = "Maintaining the level of operational effectiveness of
a {CSOC} under adverse conditions",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "3",
pages = "637--651",
month = jun,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-021-00573-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat May 28 06:50:21 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-021-00573-4",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Zulfiqar:2022:TAR,
author = "Maryam Zulfiqar and Muhammad Umar Janjua and Jack W.
Stokes",
title = "Tracking adoption of revocation and cryptographic
features in {X.509} certificates",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "3",
pages = "653--668",
month = jun,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-021-00572-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat May 28 06:50:21 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-021-00572-5",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{DArco:2022:GWP,
author = "P. D'Arco and R. {De Prisco} and R. Zaccagnino",
title = "{Gossamer}: weaknesses and performance",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "3",
pages = "669--687",
month = jun,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-021-00575-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat May 28 06:50:21 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-021-00575-2",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Zhang:2022:DTA,
author = "Xiaokuan Zhang and Jihun Hamm and Yinqian Zhang",
title = "Defeating traffic analysis via differential privacy: a
case study on streaming traffic",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "3",
pages = "689--706",
month = jun,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-021-00574-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat May 28 06:50:21 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-021-00574-3",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Huszti:2022:SPB,
author = "Andrea Huszti and Szabolcs Kov{\'a}cs and Norbert
Ol{\'a}h",
title = "Scalable, password-based and threshold authentication
for smart homes",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "4",
pages = "707--723",
month = aug,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00578-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Fri Jul 29 14:41:26 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00578-7",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Kim:2022:MPD,
author = "Jinsung Kim and Younghoon Ban and Jeong Hyun Yi",
title = "{MAPAS}: a practical deep learning-based {Android}
malware detection system",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "4",
pages = "725--738",
month = aug,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00579-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Fri Jul 29 14:41:26 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00579-6",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Zabihimayvan:2022:FLR,
author = "Mahdieh Zabihimayvan and Derek Doran",
title = "A first look at references from the dark to the
surface web world: a case study in {Tor}",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "4",
pages = "739--755",
month = aug,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00580-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Fri Jul 29 14:41:26 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00580-z",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Koike:2022:IOH,
author = "Kazuki Koike and Ryotaro Kobayashi and Masahiko
Katoh",
title = "{IoT}-oriented high-efficient anti-malware hardware
focusing on time series metadata extractable from
inside a processor core",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "4",
pages = "1--19",
month = aug,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-021-00577-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Fri Jul 29 14:41:26 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-021-00577-0",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Karl:2022:DNI,
author = "Ryan Karl and Hannah Burchfield and Taeho Jung",
title = "Developing non-interactive {MPC} with trusted hardware
for enhanced security",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "4",
pages = "777--797",
month = aug,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00583-w",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Fri Jul 29 14:41:26 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00583-w",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Gong:2022:TDR,
author = "Qian Gong and Phil DeMar and Mine Altunay",
title = "{ThunderSecure}: deploying real-time intrusion
detection for {100G} research networks by leveraging
stream-based features and one-class classification
network",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "4",
pages = "799--812",
month = aug,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00584-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Fri Jul 29 14:41:26 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00584-9",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Zenitani:2022:MOC,
author = "Kengo Zenitani",
title = "A multi-objective cost-benefit optimization algorithm
for network hardening",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "4",
pages = "813--832",
month = aug,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00586-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Fri Jul 29 14:41:26 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00586-7",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Komano:2022:CBS,
author = "Yuichi Komano and Takaaki Mizuki",
title = "Coin-based Secure Computations",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "4",
pages = "833--846",
month = aug,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00585-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Fri Jul 29 14:41:26 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00585-8",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Saifuzzaman:2022:SLR,
author = "Munshi Saifuzzaman and Tajkia Nuri Ananna and Farida
Chowdhury",
title = "A systematic literature review on wearable health data
publishing under differential privacy",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "4",
pages = "847--872",
month = aug,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-021-00576-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Fri Jul 29 14:41:26 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-021-00576-1",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Agrawal:2022:SAE,
author = "Ankit Agrawal and Ashutosh Bhatia and Rekha Kaushik",
title = "A survey on analyzing encrypted network traffic of
mobile devices",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "4",
pages = "873--915",
month = aug,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00581-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Fri Jul 29 14:41:26 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00581-y",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Zia:2022:SIE,
author = "Unsub Zia and Mark McCartney and Ali Sajjad",
title = "Survey on image encryption techniques using chaotic
maps in spatial, transform and spatiotemporal domains",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "4",
pages = "917--935",
month = aug,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00588-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Fri Jul 29 14:41:26 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00588-5",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Tan:2022:CPQ,
author = "Teik Guan Tan and Pawel Szalachowski and Jianying
Zhou",
title = "Challenges of post-quantum digital signing in
real-world applications: a survey",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "4",
pages = "937--952",
month = aug,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00587-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Fri Jul 29 14:41:26 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00587-6",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Park:2022:EVC,
author = "Jai Hyun Park and Jung Hee Cheon and Dongwoo Kim",
title = "Efficient verifiable computation over quotient
polynomial rings",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "5",
pages = "953--971",
month = oct,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00590-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Sep 24 10:44:14 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00590-x",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Lyvas:2022:EIS,
author = "Christos Lyvas and Costas Lambrinoudakis and Dimitris
Geneiatakis",
title = "\pkg{IntentAuth}: Securing {Android}'s intent-based
inter-process communication",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "5",
pages = "973--982",
month = oct,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00592-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Sep 24 10:44:14 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00592-9",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Singh:2022:DAI,
author = "Ram Govind Singh and Ananya Shrivastava and Sushmita
Ruj",
title = "A Digital Asset Inheritance Model to Convey Online
Persona Posthumously",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "5",
pages = "983--1003",
month = oct,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00593-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Sep 24 10:44:14 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00593-8",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Agostini:2022:BBM,
author = "E. Agostini and M. Bernaschi",
title = "{BitCracker}: {BitLocker} meets {GPUs}",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "5",
pages = "1005--1018",
month = oct,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00589-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Sep 24 10:44:14 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00589-4",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Ahmim:2022:SAT,
author = "Ilyes Ahmim and Nacira Ghoualmi-Zine and Marwa Ahmim",
title = "Security analysis on ``{Three}-factor authentication
protocol using physical unclonable function for
{IoV}''",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "5",
pages = "1019--1026",
month = oct,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00595-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Sep 24 10:44:14 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00595-6",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Armour:2022:ASA,
author = "Marcel Armour and Bertram Poettering",
title = "Algorithm substitution attacks against receivers",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "5",
pages = "1027--1050",
month = oct,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00596-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Sep 24 10:44:14 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00596-5",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Camtepe:2022:ABC,
author = "Seyit Camtepe and Jarek Duda and Josef Pieprzyk",
title = "{ANS}-based compression and encryption with 128-bit
security",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "5",
pages = "1051--1067",
month = oct,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00597-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Sep 24 10:44:14 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00597-4",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Pericas-Gornals:2022:HPB,
author = "Rosa Peric{\`a}s-Gornals and Maci{\`a} Mut-Puigserver
and M. Magdalena Payeras-Capell{\`a}",
title = "Highly private blockchain-based management system for
digital {COVID-19} certificates",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "5",
pages = "1069--1090",
month = oct,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00598-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Sep 24 10:44:14 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00598-3",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Vlachos:2022:SOS,
author = "Vasileios Vlachos and Yannis C. Stamatiou and Sotiris
Nikoletseas",
title = "The {SAINT} observatory subsystem: an open-source
intelligence tool for uncovering cybersecurity
threats",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "5",
pages = "1091--1106",
month = oct,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00599-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Sep 24 10:44:14 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00599-2",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Cevik:2022:LAG,
author = "Beyza Cevik and Nur Altiparmak and Sevil Sen",
title = "{Lib2Desc}: automatic generation of security-centric
{Android} app descriptions using third-party
libraries",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "5",
pages = "1107--1125",
month = oct,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00601-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Sep 24 10:44:14 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00601-x",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Inayoshi:2022:VUT,
author = "Hiroki Inayoshi and Shohei Kakei and Shoichi Saito",
title = "Value-utilized taint propagation: toward precise
detection of apps' information flows across {Android}
{API} calls",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "5",
pages = "1127--1149",
month = oct,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00603-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Sep 24 10:44:14 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00603-9",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Borges:2022:AUE,
author = "Ricard Borges and Francesc Seb{\'e} and Magda Valls",
title = "An anonymous and unlinkable electronic toll collection
system",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "5",
pages = "1151--1162",
month = oct,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00604-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Sep 24 10:44:14 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00604-8",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Jeet:2022:SIP,
author = "Rabari Jeet and P. Arun Raj Kumar",
title = "A survey on interest packet flooding attacks and its
countermeasures in named data networking",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "5",
pages = "1163--1187",
month = oct,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00591-w",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Sep 24 10:44:14 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00591-w",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Syrmakesis:2022:CRA,
author = "Andrew D. Syrmakesis and Cristina Alcaraz and Nikos D.
Hatziargyriou",
title = "Classifying resilience approaches for protecting smart
grids against cyber threats",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "5",
pages = "1189--1210",
month = oct,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00594-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Sep 24 10:44:14 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00594-7",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Lygerou:2022:DHI,
author = "Irini Lygerou and Shreyas Srinivasa and Dimitris
Gritzalis",
title = "A decentralized honeypot for {IoT} Protocols based on
{Android} devices",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "6",
pages = "1211--1222",
month = dec,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00605-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Oct 15 16:48:15 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
note = "See correction \cite{Lygerou:2023:CDH}.",
URL = "https://link.springer.com/article/10.1007/s10207-022-00605-7",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Fu:2022:CGP,
author = "Bingxue Fu and Xing Yu and Tao Feng",
title = "{CT-GCN}: a phishing identification model for
blockchain cryptocurrency transactions",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "6",
pages = "1223--1232",
month = dec,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00606-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Oct 15 16:48:15 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00606-6",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Templ:2022:SOM,
author = "Matthias Templ and Murat Sariyar",
title = "A systematic overview on methods to protect sensitive
data provided for various analyses",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "6",
pages = "1233--1246",
month = dec,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00607-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Oct 15 16:48:15 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00607-5",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Kifouche:2022:DIN,
author = "Abdenour Kifouche and Mohamed Salah Azzaz and Remy
Kocik",
title = "Design and implementation of a new lightweight
chaos-based cryptosystem to secure {IoT}
communications",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "6",
pages = "1247--1262",
month = dec,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00609-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Oct 15 16:48:15 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00609-3",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Prajisha:2022:EID,
author = "C. Prajisha and A. R. Vasudevan",
title = "An efficient intrusion detection system for {MQTT-IoT}
using enhanced chaotic salp swarm algorithm and
{LightGBM}",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "6",
pages = "1263--1282",
month = dec,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00611-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Oct 15 16:48:15 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00611-9",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Picazo-Sanchez:2022:CEC,
author = "Pablo Picazo-Sanchez and Lara Ortiz-Martin and Andrei
Sabelfeld",
title = "Are chrome extensions compliant with the spirit of
least privilege?",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "6",
pages = "1283--1297",
month = dec,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00610-w",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Oct 15 16:48:15 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00610-w",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Adewole:2022:DDL,
author = "Kayode S. Adewole and Vicen{\c{c}} Torra",
title = "{DFTMicroagg}: a dual-level anonymization algorithm
for smart grid data",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "6",
pages = "1299--1321",
month = dec,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00612-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Oct 15 16:48:15 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00612-8",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Skopik:2022:SDA,
author = "Florian Skopik and Arndt Bonitz and G{\"u}nter
G{\"o}hler",
title = "From scattered data to actionable knowledge: flexible
cyber security reporting in the military domain",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "6",
pages = "1323--1347",
month = dec,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00613-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Oct 15 16:48:15 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00613-7",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Torra:2022:PFP,
author = "Vicen{\c{c}} Torra and Edgar Galv{\'a}n and Guillermo
Navarro-Arribas",
title = "{PSO + FL = PAASO}: particle swarm optimization +
federated learning = privacy-aware agent swarm
optimization",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "6",
pages = "1349--1359",
month = dec,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00614-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Oct 15 16:48:15 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00614-6",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Yang:2022:SAI,
author = "Xiaodong Yang and Wenjia Wang and Caifen Wang",
title = "Security analysis and improvement of a
privacy-preserving authentication scheme in {VANET}",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "6",
pages = "1361--1371",
month = dec,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00617-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Oct 15 16:48:15 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00617-3",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Abdussami:2022:LLA,
author = "Mohammad Abdussami and Ruhul Amin and Satyanarayana
Vollala",
title = "{LASSI}: a lightweight authenticated key agreement
protocol for fog-enabled {IoT} deployment",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "6",
pages = "1373--1387",
month = dec,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00619-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Oct 15 16:48:15 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00619-1",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Kishore:2022:SPD,
author = "R. Kishore and I. Ioannou and A. Pitsillides",
title = "A security protocol for {D2D} communications in {5G}
networks using elliptic curve cryptography",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "6",
pages = "1389--1408",
month = dec,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00620-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Oct 15 16:48:15 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00620-8",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Kumar:2022:SML,
author = "Raju Kumar and Aruna Bhat",
title = "A study of machine learning-based models for
detection, control, and mitigation of cyberbullying in
online social media",
journal = j-INT-J-INFO-SEC,
volume = "21",
number = "6",
pages = "1409--1431",
month = dec,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00600-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Sat Oct 15 16:48:15 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00600-y",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Sah:2023:IDS,
author = "Gulab Sah and Subhasish Banerjee and Sweety Singh",
title = "Intrusion detection system over real-time data traffic
using machine learning methods with feature selection
approaches",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "1",
pages = "1--27",
month = feb,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00616-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Fri Mar 17 09:48:22 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00616-4",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Picazo-Sanchez:2023:GIP,
author = "Pablo Picazo-Sanchez and Magnus Almgren",
title = "{Gridchain}: an investigation of privacy for the
future local distribution grid",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "1",
pages = "29--46",
month = feb,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00622-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Fri Mar 17 09:48:22 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00622-6",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Hannousse:2023:DLM,
author = "Abdelhakim Hannousse and Mohamed Cherif Nait-Hamoud
and Salima Yahiouche",
title = "A deep learner model for multi-language webshell
detection",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "1",
pages = "47--61",
month = feb,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00615-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Fri Mar 17 09:48:22 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00615-5",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Sangari:2023:MRD,
author = "Seema Sangari and Eric Dallal and Michael Whitman",
title = "Modeling reporting delays in cyber incidents: an
industry-level comparison",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "1",
pages = "63--76",
month = feb,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00623-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Fri Mar 17 09:48:22 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00623-5",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Rajic:2023:EWA,
author = "Branislav Raji{\'c} and Zarko Stanisavljevi{\'c} and
Pavle Vuleti{\'c}",
title = "Early web application attack detection using network
traffic analysis",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "1",
pages = "77--91",
month = feb,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00627-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Fri Mar 17 09:48:22 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00627-1",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Rathore:2023:RDL,
author = "Nemi Chandra Rathore and Somanath Tripathy",
title = "Restricting data-leakage using fine-grained access
control on {OSN} objects",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "1",
pages = "93--106",
month = feb,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00629-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Fri Mar 17 09:48:22 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00629-z",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Balikcioglu:2023:MCD,
author = "Pinar G. Balikcioglu and Melih Sirlanci and Ozge A.
Kucuk and Bulut Ulukapi and Ramazan K. Turkmen and
Cengiz Acarturk",
title = "Malicious code detection in {Android}: the role of
sequence characteristics and disassembling methods",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "1",
pages = "107--118",
month = feb,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00626-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Fri Mar 17 09:48:22 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00626-2",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Sharma:2023:NAD,
author = "Amit Sharma and Brij B. Gupta and Awadhesh Kumar Singh
and V. K. Saraswat",
title = "A novel approach for detection of {APT} malware using
multi-dimensional hybrid {Bayesian} belief network",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "1",
pages = "119--135",
month = feb,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00631-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Fri Mar 17 09:48:22 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00631-5",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Hamzenejadi:2023:MBD,
author = "Sajad Hamzenejadi and Mahdieh Ghazvini and
Seyedamiryousef Hosseini",
title = "Mobile botnet detection: a comprehensive survey",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "1",
pages = "137--175",
month = feb,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00624-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Fri Mar 17 09:48:22 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00624-4",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Rastogi:2023:RFN,
author = "Shubhangi Rastogi and Divya Bansal",
title = "A review on fake news detection {3T's}: typology, time
of detection, taxonomies",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "1",
pages = "177--212",
month = feb,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00625-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Fri Mar 17 09:48:22 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00625-3",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Suren:2023:PPA,
author = "Emre S{\"u}ren and Fredrik Heiding and Johannes
Oleg{\aa}rd and Robert Lagerstr{\"o}m",
title = "{PatrIoT}: practical and agile threat research for
{IoT}",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "1",
pages = "213--233",
month = feb,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00633-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Fri Mar 17 09:48:22 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00633-3",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Mohamed:2023:DSB,
author = "Safa Mohamed and Ridha Ejbali",
title = "Deep {SARSA}-based reinforcement learning approach for
anomaly network intrusion detection system",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "1",
pages = "235--247",
month = feb,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00634-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Fri Mar 17 09:48:22 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00634-2",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Amro:2023:CRM,
author = "Ahmed Amro and Vasileios Gkioulos",
title = "Cyber risk management for autonomous passenger ships
using threat-informed defense-in-depth",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "1",
pages = "249--288",
month = feb,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00638-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Fri Mar 17 09:48:22 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00638-y",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Alawneh:2023:UIU,
author = "Luay Alawneh and Mohammad Al-Zinati and Mahmoud
Al-Ayyoub",
title = "User identification using deep learning and human
activity mobile sensor data",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "1",
pages = "289--301",
month = feb,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00640-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Fri Mar 17 09:48:22 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00640-4",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Lygerou:2023:CDH,
author = "Irini Lygerou and Shreyas Srinivasa and Emmanouil
Vasilomanolakis and George Stergiopoulos and Dimitris
Gritzalis",
title = "Correction to: {A decentralized honeypot for IoT
Protocols based on Android devices}",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "1",
pages = "303--303",
month = feb,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00628-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Fri Mar 17 09:48:22 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
note = "See \cite{Lygerou:2022:DHI}.",
URL = "https://link.springer.com/article/10.1007/s10207-022-00628-0",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{An:2023:HEL,
author = "Qin An and Wilson Cheong Hin Hong and XiaoShu Xu and
Yunfeng Zhang and Kimberly Kolletar-Zhu",
title = "How education level influences {Internet} security
knowledge, behaviour, and attitude: a comparison among
undergraduates, postgraduates and working graduates",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "2",
pages = "305--317",
month = apr,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00637-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Fri Mar 17 09:48:23 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00637-z",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Kuzlu:2023:ASM,
author = "Murat Kuzlu and Ferhat Ozgur Catak and Umit Cali and
Evren Catak and Ozgur Guler",
title = "Adversarial security mitigations of {mmWave}
beamforming prediction models using defensive
distillation and adversarial retraining",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "2",
pages = "319--332",
month = apr,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00644-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Fri Mar 17 09:48:23 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00644-0",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Swati:2023:DAD,
author = "Swati and Sangita Roy and Jawar Singh and Jimson
Mathew",
title = "Design and analysis of {DDoS} mitigating network
architecture",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "2",
pages = "333--345",
month = apr,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00635-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Fri Mar 17 09:48:23 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00635-1",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Chatzoglou:2023:RQA,
author = "Efstratios Chatzoglou and Vasileios Kouliaridis and
Georgios Karopoulos and Georgios Kambourakis",
title = "Revisiting {QUIC} attacks: a comprehensive review on
{QUIC} security and a hands-on study",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "2",
pages = "347--365",
month = apr,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00630-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Fri Mar 17 09:48:23 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00630-6",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Mohammadi:2023:HML,
author = "Reza Mohammadi and Chhagan Lal and Mauro Conti",
title = "{HTTPScout}: a Machine Learning based Countermeasure
for {HTTP} Flood Attacks in {SDN}",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "2",
pages = "367--379",
month = apr,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00641-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Fri Mar 17 09:48:23 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00641-3",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Andriotis:2023:BDU,
author = "Panagiotis Andriotis and Myles Kirby and Atsuhiro
Takasu",
title = "\pkg{Bu-Dash}: a universal and dynamic graphical
password scheme (extended version)",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "2",
pages = "381--401",
month = apr,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00642-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Fri Mar 17 09:48:23 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00642-2",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Mishra:2023:SSU,
author = "Kailash Chandra Mishra and Subrata Dutta",
title = "A simple and secure user authentication scheme using
{Map Street View} with usability analysis based on
{ISO\slash IEC 25022}",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "2",
pages = "403--415",
month = apr,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00636-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Fri Mar 17 09:48:23 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00636-0",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Gandhi:2023:TUS,
author = "Kapilan Kulayan Arumugam Gandhi and Chamundeswari
Arumugam",
title = "Toward a unified and secure approach for extraction of
forensic digital evidence from an {IoT} device",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "2",
pages = "417--431",
month = apr,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00645-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Fri Mar 17 09:48:23 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00645-z",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Zhou:2023:IDA,
author = "Hanxun Zhou and Longyu Kang and Hong Pan and Guo Wei
and Yong Feng",
title = "An intrusion detection approach based on incremental
long short-term memory",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "2",
pages = "433--446",
month = apr,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00632-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Fri Mar 17 09:48:23 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00632-4",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Guardiola-Muzquiz:2023:SCS,
author = "Gorka Guardiola-M{\'u}zquiz and Enrique
Soriano-Salvador",
title = "{SealFSv2}: combining storage-based and ratcheting for
tamper-evident logging",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "2",
pages = "447--466",
month = apr,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00643-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Fri Mar 17 09:48:23 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00643-1",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Alzahrani:2023:DAC,
author = "Bander Alzahrani and Nikos Fotiou and Aiiad Albeshri
and Abdullah Almuhaimeed and Khalid Alsubhi",
title = "Distributed access control for information-centric
networking architectures using verifiable credentials",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "2",
pages = "467--478",
month = apr,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00649-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Fri Mar 17 09:48:23 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00649-9",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Bilgen:2023:AEA,
author = "Melike Burakgazi Bilgen and Osman Abul and Kemal
Bicakci",
title = "Authentication-enabled attribute-based access control
for smart homes",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "2",
pages = "479--495",
month = apr,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00639-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Fri Mar 17 09:48:23 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00639-x",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Wang:2023:DAM,
author = "Kai Wang and Jinxia Wu and Tianqing Zhu and Wei Ren
and Ying Hong",
title = "Defense against membership inference attack in graph
neural networks through graph perturbation",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "2",
pages = "497--509",
month = apr,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00646-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Fri Mar 17 09:48:23 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00646-y",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Ahmad:2023:TPB,
author = "Hira Ahmad and Muhammad Ahtazaz Ahsan and Adnan Noor
Mian",
title = "Trends in publishing blockchain surveys: a
bibliometric perspective",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "2",
pages = "511--523",
month = apr,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00653-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Fri Mar 17 09:48:23 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00653-z",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Brama:2023:ENN,
author = "Haya Brama and Lihi Dery and Tal Grinshpoun",
title = "Evaluation of neural networks defenses and attacks
using {NDCG} and reciprocal rank metrics",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "2",
pages = "525--540",
month = apr,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00652-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Fri Mar 17 09:48:23 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00652-0",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Celdran:2023:IBB,
author = "Alberto Huertas Celdr{\'a}n and Pedro Miguel
S{\'a}nchez S{\'a}nchez and Miguel Azor{\'{\i}}n
Castillo and G{\'e}r{\^o}me Bovet and Gregorio
Mart{\'{\i}}nez P{\'e}rez and Burkhard Stiller",
title = "Intelligent and behavioral-based detection of malware
in {IoT} spectrum sensors",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "3",
pages = "541--561",
month = jun,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00602-w",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Thu Jun 1 08:23:50 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00602-w",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Akbarzadeh:2023:DBS,
author = "Aida Akbarzadeh and Sokratis K. Katsikas",
title = "Dependency-based security risk assessment for
cyber-physical systems",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "3",
pages = "563--578",
month = jun,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00608-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Thu Jun 1 08:23:50 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00608-4",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Higgins:2023:CPR,
author = "Martin Higgins and Wangkun Xu and Fei Teng and Thomas
Parisini",
title = "Cyber-physical risk assessment for false data
injection attacks considering moving target defences",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "3",
pages = "579--589",
month = jun,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00621-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Thu Jun 1 08:23:50 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00621-7",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Bandara:2023:OPP,
author = "Eranga Bandara and Xueping Liang and Sachin Shetty and
Ravi Mukkamala and Peter Foytik and Nalin Ranasinghe
and Kasun {De Zoysa}",
title = "{Octopus}: privacy preserving peer-to-peer
transactions system with {InterPlanetary} file system
({IPFS})",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "3",
pages = "591--609",
month = jun,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00650-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Thu Jun 1 08:23:50 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00650-2",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Al-Shehari:2023:RRA,
author = "Taher Al-Shehari and Rakan A. Alsowail",
title = "Random resampling algorithms for addressing the
imbalanced dataset classes in insider threat
detection",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "3",
pages = "611--629",
month = jun,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00651-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Thu Jun 1 08:23:50 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00651-1",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Orooji:2023:FAD,
author = "Marmar Orooji and Seyedeh Shaghayegh Rabbanian and
Gerald M. Knapp",
title = "Flexible adversary disclosure risk measure for
identity and attribute disclosure attacks",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "3",
pages = "631--645",
month = jun,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00654-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Thu Jun 1 08:23:50 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00654-y",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Ullah:2023:PTA,
author = "Imdad Ullah and Roksana Boreli and Salil S. Kanhere",
title = "Privacy in targeted advertising on mobile devices: a
survey",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "3",
pages = "647--678",
month = jun,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00655-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Thu Jun 1 08:23:50 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00655-x",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Chen:2023:EIS,
author = "Yingchun Chen and Jinguo Li and Naiwang Guo",
title = "Efficient and interpretable {SRU} combined with
{TabNet} for network intrusion detection in the big
data environment",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "3",
pages = "679--689",
month = jun,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00656-w",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Thu Jun 1 08:23:50 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00656-w",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Velasquez:2023:SRS,
author = "Juan Miguel L{\'o}pez Vel{\'a}squez and Sergio
Mauricio Mart{\'{\i}}nez Monterrubio and Luis Enrique
S{\'a}nchez Crespo and David Garcia Rosado",
title = "Systematic review of {SIEM} technology: {SIEM--SC}
birth",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "3",
pages = "691--711",
month = jun,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00657-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Thu Jun 1 08:23:50 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00657-9",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Lovrencic:2023:MCA,
author = "Rudolf Lovrenci{\'c} and Dejan Skvorc",
title = "Multi-cloud applications: data and code fragmentation
for improved security",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "3",
pages = "713--721",
month = jun,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00658-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Thu Jun 1 08:23:50 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00658-8",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Song:2023:NFS,
author = "Guangjia Song and Jianhua Hu and Hui Wang",
title = "A novel frame switching model based on virtual {MAC}
in {SDN}",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "3",
pages = "723--736",
month = jun,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-022-00659-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Thu Jun 1 08:23:50 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-022-00659-7",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Tsohou:2023:CIS,
author = "Aggeliki Tsohou and Vasiliki Diamantopoulou and
Stefanos Gritzalis and Costas Lambrinoudakis",
title = "Cyber insurance: state of the art, trends and future
directions",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "3",
pages = "737--748",
month = jun,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00660-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Thu Jun 1 08:23:50 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00660-8",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Kaur:2023:PPP,
author = "Jasleen Kaur and Alka Agrawal and Raees Ahmad Khan",
title = "{P2ADF}: a privacy-preserving attack detection
framework in {fog-IoT} environment",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "4",
pages = "749--762",
month = aug,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00661-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Aug 1 08:49:49 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00661-7",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Al-ani:2023:PSI,
author = "Ruqayah Al-ani and Thar Baker and Bo Zhou and Qi Shi",
title = "Privacy and safety improvement of {VANET} data via a
safety-related privacy scheme",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "4",
pages = "763--783",
month = aug,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00662-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Aug 1 08:49:49 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00662-6",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Molla:2023:ESS,
author = "Eirini Molla and Panagiotis Rizomiliotis and Stefanos
Gritzalis",
title = "Efficient searchable symmetric encryption supporting
range queries",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "4",
pages = "785--798",
month = aug,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00667-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Aug 1 08:49:49 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00667-1",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Mittal:2023:NTL,
author = "Shweta Mittal and Mohona Ghosh",
title = "A novel two-level secure access control approach for
blockchain platform in healthcare",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "4",
pages = "799--817",
month = aug,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00664-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Aug 1 08:49:49 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00664-4",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Grontas:2023:AEP,
author = "Panagiotis Grontas and Aris Pagourtzis",
title = "Anonymity and everlasting privacy in electronic
voting",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "4",
pages = "819--832",
month = aug,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00666-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Aug 1 08:49:49 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00666-2",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Chimuco:2023:SCB,
author = "Francisco T. Chimuco and Jo{\~a}o B. F. Sequeiros and
Carolina Galv{\~a}o Lopes and Tiago M. C. Sim{\~o}es
and M{\'a}rio M. Freire and Pedro R. M. In{\'a}cio",
title = "Secure cloud-based mobile apps: attack taxonomy,
requirements, mechanisms, tests and automation",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "4",
pages = "833--867",
month = aug,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00669-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Aug 1 08:49:49 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00669-z",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Menezes:2023:BSC,
author = "Leonardo Dias Menezes and Luciano Vieira de Ara{\'u}jo
and Marislei Nishijima",
title = "Blockchain and smart contract architecture for
notaries services under civil law: a {Brazilian}
experience",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "4",
pages = "869--880",
month = aug,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00673-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Aug 1 08:49:49 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00673-3",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Pandey:2023:PSN,
author = "Pankaj Pandey and Nishchol Mishra",
title = "{Phish-Sight}: a new approach for phishing detection
using dominant colors on web pages and machine
learning",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "4",
pages = "881--891",
month = aug,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00672-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Aug 1 08:49:49 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00672-4",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Bowen:2023:BHD,
author = "Brandon Bowen and Anitha Chennamaneni and Ana Goulart
and Daisy Lin",
title = "{BLoCNet}: a hybrid, dataset-independent intrusion
detection system using deep learning",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "4",
pages = "893--917",
month = aug,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00663-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Aug 1 08:49:49 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00663-5",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Yang:2023:AEA,
author = "Zhen Yang and Shisong Yang and Yunbo Huang and
Jos{\'e}-Fern{\'a}n Mart{\'{\i}}nez and Lourdes
L{\'o}pez and Yuwen Chen",
title = "{AAIA}: an efficient aggregation scheme against
inverting attack for federated learning",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "4",
pages = "919--930",
month = aug,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00670-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Aug 1 08:49:49 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00670-6",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Bhaskara:2023:CEA,
author = "Srividya Bhaskara and Santosh Singh Rathore",
title = "Causal effect analysis-based intrusion detection
system for {IoT} applications",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "4",
pages = "931--946",
month = aug,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00674-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Aug 1 08:49:49 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00674-2",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Sarhan:2023:ZSM,
author = "Mohanad Sarhan and Siamak Layeghy and Marcus Gallagher
and Marius Portmann",
title = "From zero-shot machine learning to zero-day attack
detection",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "4",
pages = "947--959",
month = aug,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00676-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Aug 1 08:49:49 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00676-0",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Seth:2023:LDD,
author = "Abhay Deep Seth and Santosh Biswas and Amit Kumar
Dhar",
title = "{LDES}: detector design for version number attack
detection using linear temporal logic based on discrete
event system",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "4",
pages = "961--985",
month = aug,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00665-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Aug 1 08:49:49 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00665-3",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Tuna:2023:TNH,
author = "Omer Faruk Tuna and Ferhat Ozgur Catak and M. Taner
Eskil",
title = "{TENET}: a new hybrid network architecture for
adversarial defense",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "4",
pages = "987--1004",
month = aug,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00675-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Aug 1 08:49:49 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00675-1",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Katsantonis:2023:CRD,
author = "M. N. Katsantonis and A. Manikas and I. Mavridis and
D. Gritzalis",
title = "Cyber range design framework for cyber security
education and training",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "4",
pages = "1005--1027",
month = aug,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00680-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Aug 1 08:49:49 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00680-4",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Alidoosti:2023:BLC,
author = "Mitra Alidoosti and Alireza Nowroozi and Ahmad
Nickabadi",
title = "Business-layer client-side racer: dynamic security
testing of the web application against client-side race
condition in the business layer",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "4",
pages = "1029--1054",
month = aug,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00671-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Aug 1 08:49:49 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00671-5",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Din:2023:TSM,
author = "Nizamud Din and Abdul Waheed and Shamsher Ullah and
Noor Ul Amin and Gautam Srivastava and Farhan Ullah and
Jerry Chun-Wei Lin",
title = "A typology of secure multicast communication over {5
G\slash 6 G} networks",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "4",
pages = "1055--1073",
month = aug,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00678-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Aug 1 08:49:49 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00678-y",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Zeghida:2023:SMP,
author = "Hayette Zeghida and Mehdi Boulaiche and Ramdane
Chikh",
title = "Securing {MQTT} protocol for {IoT} environment using
{IDS} based on ensemble learning",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "4",
pages = "1075--1086",
month = aug,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00681-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Aug 1 08:49:49 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00681-3",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Kim:2023:ERS,
author = "Moon-Seok Kim and Sungho Kim and Sang-Kyung Yoo and
Bong-Soo Lee and Ji-Man Yu and Il-Woong Tcho and
Yang-Kyu Choi",
title = "Error reduction of {SRAM}-based physically unclonable
function for chip authentication",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "5",
pages = "1087--1098",
month = oct,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00668-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 26 12:08:51 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00668-0",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Cai:2023:RTD,
author = "Feiyang Cai and Xenofon Koutsoukos",
title = "Real-time detection of deception attacks in
cyber-physical systems",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "5",
pages = "1099--1114",
month = oct,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00677-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 26 12:08:51 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
note = "See correction \cite{Cai:2023:CRT}.",
URL = "https://link.springer.com/article/10.1007/s10207-023-00677-z",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Shi:2023:SAM,
author = "Sibo Shi and Shengwei Tian and Bo Wang and Tiejun Zhou
and Guanxin Chen",
title = "{SFCGDroid}: {Android} malware detection based on
sensitive function call graph",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "5",
pages = "1115--1124",
month = oct,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00679-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 26 12:08:51 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00679-x",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Abdulganiyu:2023:SLR,
author = "Oluwadamilare Harazeem Abdulganiyu and Taha Ait
Tchakoucht and Yakub Kayode Saheed",
title = "A systematic literature review for network intrusion
detection system ({IDS})",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "5",
pages = "1125--1162",
month = oct,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00682-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 26 12:08:51 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00682-2",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Mohammadi:2023:CBO,
author = "Reza Mohammadi",
title = "A comprehensive Blockchain-oriented secure framework
for {SDN\slash Fog}-based {IoUT}",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "5",
pages = "1163--1175",
month = oct,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00683-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 26 12:08:51 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00683-1",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Mohammadi:2023:NHH,
author = "Shahriar Mohammadi and Mehdi Babagoli",
title = "A novel hybrid hunger games algorithm for intrusion
detection systems based on nonlinear regression
modeling",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "5",
pages = "1177--1195",
month = oct,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00684-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 26 12:08:51 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00684-0",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Ahmad:2023:PCS,
author = "Suhail Ahmad and Ajaz Hussain Mir",
title = "Protection of centralized {SDN} control plane from
high-rate {Packet--In} messages",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "5",
pages = "1197--1206",
month = oct,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00685-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 26 12:08:51 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00685-z",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Naim:2023:MWI,
author = "Or Naim and Doron Cohen and Irad Ben-Gal",
title = "Malicious website identification using design
attribute learning",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "5",
pages = "1207--1217",
month = oct,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00686-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 26 12:08:51 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00686-y",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Li:2023:BEC,
author = "Wenjuan Li and Yu Wang and Jin Li",
title = "A blockchain-enabled collaborative intrusion detection
framework for {SDN}-assisted cyber-physical systems",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "5",
pages = "1219--1230",
month = oct,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00687-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 26 12:08:51 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00687-x",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Gruner:2023:ACS,
author = "Andreas Gr{\"u}ner and Alexander M{\"u}hle and Niko
Lockenvitz and Christoph Meinel",
title = "Analyzing and comparing the security of self-sovereign
identity management systems through threat modeling",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "5",
pages = "1231--1248",
month = oct,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00688-w",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 26 12:08:51 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00688-w",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Zhang:2023:ISF,
author = "Denghui Zhang and Zhaoquan Gu and Lijing Ren and
Muhammad Shafiq",
title = "An interpretability security framework for intelligent
decision support systems based on saliency map",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "5",
pages = "1249--1260",
month = oct,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00689-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 26 12:08:51 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00689-9",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Panda:2023:SAP,
author = "Suryakanta Panda and Samrat Mondal and Ashok Kumar Das
and Willy Susilo",
title = "Secure access privilege delegation using
attribute-based encryption",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "5",
pages = "1261--1276",
month = oct,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00690-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 26 12:08:51 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00690-2",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Baradaran:2023:UBS,
author = "Sara Baradaran and Mahdi Heidari and Ali Kamali and
Maryam Mouzarani",
title = "A unit-based symbolic execution method for detecting
memory corruption vulnerabilities in executable codes",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "5",
pages = "1277--1290",
month = oct,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00691-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 26 12:08:51 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00691-1",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Prantl:2023:RSG,
author = "Thomas Prantl and Andr{\'e} Bauer and Lukas
Iffl{\"a}nder and Christian Krupitzer and Samuel
Kounev",
title = "Recommendation of secure group communication schemes
using multi-objective optimization",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "5",
pages = "1291--1332",
month = oct,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00692-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 26 12:08:51 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00692-0",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Zacharis:2023:AAA,
author = "Alexandros Zacharis and Constantinos Patsakis",
title = "{AiCEF}: an {AI-assisted} cyber exercise content
generation framework using named entity recognition",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "5",
pages = "1333--1354",
month = oct,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00693-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 26 12:08:51 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00693-z",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Mazumder:2023:CCB,
author = "Md. Mumtahin Habib Ullah Mazumder and Md. Eusha Kadir
and Sadia Sharmin and Md. Shariful Islam and Muhammad
Mahbub Alam",
title = "{cFEM}: a cluster based feature extraction method for
network intrusion detection",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "5",
pages = "1355--1369",
month = oct,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00694-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 26 12:08:51 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00694-y",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Asha:2023:DFD,
author = "S. Asha and P. Vinod and Varun G. Menon",
title = "A defensive framework for deepfake detection under
adversarial settings using temporal and spatial
features",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "5",
pages = "1371--1382",
month = oct,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00695-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 26 12:08:51 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00695-x",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Cai:2023:CRT,
author = "Feiyang Cai and Xenofon Koutsoukos",
title = "Correction: {Real-time detection of deception attacks
in cyber-physical systems}",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "5",
pages = "1383--1383",
month = oct,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00696-w",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 26 12:08:51 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
note = "See \cite{Cai:2023:RTD}.",
URL = "https://link.springer.com/article/10.1007/s10207-023-00696-w",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Sepehrzadeh:2023:MIT,
author = "Hamed Sepehrzadeh",
title = "A method for insider threat assessment by modeling the
internal employee interactions",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "5",
pages = "1385--1393",
month = oct,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00697-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 26 12:08:51 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00697-9",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Alcaraz:2023:OST,
author = "Cristina Alcaraz and Jesus Cumplido and Alicia
Trivi{\~n}o",
title = "{OCPP} in the spotlight: threats and countermeasures
for electric vehicle charging infrastructures 4.0",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "5",
pages = "1395--1421",
month = oct,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00698-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 26 12:08:51 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00698-8",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Wang:2023:ANM,
author = "Runzheng Wang and Jian Gao and Shuhua Huang",
title = "{AIHGAT}: a novel method of malware detection and
homology analysis using assembly instruction
heterogeneous graph",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "5",
pages = "1423--1443",
month = oct,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00699-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 26 12:08:51 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00699-7",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Gimenez-Aguilar:2023:MUB,
author = "Mar Gimenez-Aguilar and Jose Maria de Fuentes and
Lorena Gonzalez-Manzano",
title = "Malicious uses of blockchains by malware: from the
analysis to {Smart--Zephyrus}",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "5",
pages = "1445--1480",
month = oct,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00700-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 26 12:08:51 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00700-3",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Alhaj:2023:EAS,
author = "Taqwa Ahmed Alhaj and Maheyzah Md Siraj and Anazida
Zainal and Inshirah Idris and Anjum Nazir and Fatin
Elhaj and Tasneem Darwish",
title = "An effective attack scenario construction model based
on identification of attack steps and stages",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "5",
pages = "1481--1496",
month = oct,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00701-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 26 12:08:51 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00701-2",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Zhang:2023:AOS,
author = "Yin Sheng Zhang",
title = "Analysis of {OSPU} security effect and data assembly
verification under semi-network {OS} architecture",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "5",
pages = "1497--1509",
month = oct,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00702-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 26 12:08:51 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00702-1",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Papanikolaou:2023:ANT,
author = "Alexandros Papanikolaou and Aggelos Alevizopoulos and
Christos Ilioudis and Konstantinos Demertzis and
Konstantinos Rantos",
title = "An {autoML} network traffic analyzer for cyber threat
detection",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "5",
pages = "1511--1530",
month = oct,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00703-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 26 12:08:51 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00703-0",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Chowdhury:2023:PLT,
author = "Nabin Chowdhury and Vasileios Gkioulos",
title = "A personalized learning theory-based cyber-security
training exercise",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "6",
pages = "1531--1546",
month = dec,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00704-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 26 12:09:01 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00704-z",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Luong:2023:BML,
author = "Ngoc T. Luong and Doan Hoang",
title = "{BAPRP}: a machine learning approach to blackhole
attacks prevention routing protocol in vehicular Ad Hoc
networks",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "6",
pages = "1547--1566",
month = dec,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00705-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 26 12:09:01 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00705-y",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Gonzalez-Manzano:2023:TCA,
author = "Lorena Gonz{\'a}lez-Manzano and Jos{\'e} M. de Fuentes
and Flavio Lombardi and Cristina Ramos",
title = "A technical characterization of {APTs} by leveraging
public resources",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "6",
pages = "1567--1584",
month = dec,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00706-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 26 12:09:01 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00706-x",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Barhoun:2023:TMD,
author = "Rabie Barhoun and Maryam Ed-daibouni",
title = "Trust modeling in a distributed collaborative
environment: application to a collaborative healthcare
system",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "6",
pages = "1585--1604",
month = dec,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00707-w",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 26 12:09:01 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00707-w",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Rovida:2023:FAH,
author = "Lorenzo Rovida",
title = "Fast but approximate homomorphic $k$-means based on
masking technique",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "6",
pages = "1605--1619",
month = dec,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00708-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 26 12:09:01 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00708-9",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Shukla:2023:QFS,
author = "Ankur Shukla and Basel Katt and Muhammad Mudassar
Yamin",
title = "A quantitative framework for security assurance
evaluation and selection of cloud services: a case
study",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "6",
pages = "1621--1650",
month = dec,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00709-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 26 12:09:01 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00709-8",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Ogunseyi:2023:SRP,
author = "Taiwo Blessing Ogunseyi and Cossi Blaise Avoussoukpo
and Yiqiang Jiang",
title = "A systematic review of privacy techniques in
recommendation systems",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "6",
pages = "1651--1664",
month = dec,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00710-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 26 12:09:01 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00710-1",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Lopez:2023:AAA,
author = "Christian L{\'o}pez and Jes{\'u}s Solano and Esteban
Rivera and Lizzy Tengana and Johana Florez-Lozano and
Alejandra Castelblanco and Mart{\'{\i}}n Ochoa",
title = "Adversarial attacks against mouse- and keyboard-based
biometric authentication: black-box versus
domain-specific techniques",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "6",
pages = "1665--1685",
month = dec,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00711-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 26 12:09:01 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00711-0",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Zyout:2023:MCA,
author = "Mo'ath Zyout and Raed Shatnawi and Hassan Najadat",
title = "Malware classification approaches utilizing binary and
text encoding of permissions",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "6",
pages = "1687--1712",
month = dec,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00712-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 26 12:09:01 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00712-z",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Ekstedt:2023:YAC,
author = "Mathias Ekstedt and Zeeshan Afzal and Preetam
Mukherjee and Simon Hacks and Robert Lagerstr{\"o}m",
title = "Yet another cybersecurity risk assessment framework",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "6",
pages = "1713--1729",
month = dec,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00713-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 26 12:09:01 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00713-y",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Kuppusamy:2023:APS,
author = "K. S. Kuppusamy and G. Balayogi",
title = "Accessible password strength assessment method for
visually challenged users",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "6",
pages = "1731--1741",
month = dec,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00714-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 26 12:09:01 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00714-x",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Pandey:2023:EMC,
author = "Saurabh Pandey and Nitesh Kumar and Anand Handa and
Sandeep Kumar Shukla",
title = "Evading malware classifiers using {RL} agent with
action-mask",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "6",
pages = "1743--1763",
month = dec,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00715-w",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 26 12:09:01 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00715-w",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Guan:2023:AHO,
author = "Zhenyu Guan and Lixin Zhang and Bohan Huang and Bihe
Zhao and Song Bian",
title = "Adaptive hyperparameter optimization for black-box
adversarial attack",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "6",
pages = "1765--1779",
month = dec,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00716-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 26 12:09:01 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00716-9",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Ali:2023:ENI,
author = "Muhammad Ali and Mansoor-ul- Haque and Muhammad Hanif
Durad and Anila Usman and Syed Muhammad Mohsin and Hana
Mujlid and Carsten Maple",
title = "Effective network intrusion detection using
stacking-based ensemble approach",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "6",
pages = "1781--1798",
month = dec,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00718-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 26 12:09:01 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00718-7",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Madabhushi:2023:SAD,
author = "Srinidhi Madabhushi and Rinku Dewri",
title = "A survey of anomaly detection methods for power
grids",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "6",
pages = "1799--1832",
month = dec,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00720-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 26 12:09:01 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00720-z",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Baig:2023:PPC,
author = "Ahmed Fraz Baig and Sigurd Eskeland and Bian Yang",
title = "Privacy-preserving continuous authentication using
behavioral biometrics",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "6",
pages = "1833--1847",
month = dec,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00721-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 26 12:09:01 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00721-y",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Ibrahim:2023:CSS,
author = "Nasir Ibrahim and Harin Sellahewa",
title = "A cross-setting study of user unlocking behaviour in a
graphical authentication scheme: a case study on
{Android Pattern Unlock}",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "6",
pages = "1849--1863",
month = dec,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00722-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 26 12:09:01 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00722-x",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Ziza:2023:DED,
author = "Kristijan Ziza and Predrag Tadi{\'c} and Pavle
Vuleti{\'c}",
title = "{DNS} exfiltration detection in the presence of
adversarial attacks and modified exfiltrator
behaviour",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "6",
pages = "1865--1880",
month = dec,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00723-w",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 26 12:09:01 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00723-w",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Sneha:2023:RRT,
author = "M. Sneha and A. Keerthan Kumar and Nikhil V. Hegde and
A. S. Anish and G. Shobha",
title = "{RADS}: a real-time anomaly detection model for
software-defined networks using machine learning",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "6",
pages = "1881--1891",
month = dec,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00724-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 26 12:09:01 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00724-9",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Smiliotopoulos:2023:DLM,
author = "Christos Smiliotopoulos and Georgios Kambourakis and
Konstantia Barbatsalou",
title = "On the detection of lateral movement through
supervised machine learning and an open-source tool to
create turnkey datasets from {Sysmon} logs",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "6",
pages = "1893--1919",
month = dec,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00725-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 26 12:09:01 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00725-8",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Levshun:2023:TMA,
author = "Dmitry Levshun and Olga Tushkanova and Andrey
Chechulin",
title = "Two-model active learning approach for inappropriate
information classification in social networks",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "6",
pages = "1921--1936",
month = dec,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00726-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 26 12:09:01 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00726-7",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Hamdi:2023:FLB,
author = "Najet Hamdi",
title = "Federated learning-based intrusion detection system
for {Internet of Things}",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "6",
pages = "1937--1948",
month = dec,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00727-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 26 12:09:01 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00727-6",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Kaur:2023:IAL,
author = "Sarabjeet Kaur and Amanpreet Kaur Sandhu and Abhinav
Bhandari",
title = "Investigation of application layer {DDoS} attacks in
legacy and software-defined networks: a comprehensive
review",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "6",
pages = "1949--1988",
month = dec,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00728-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 26 12:09:01 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00728-5",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Farhat:2023:CMD,
author = "Saida Farhat and Manel Abdelkader and Amel
Meddeb-Makhlouf and Faouzi Zarai",
title = "{CADS-ML\slash DL}: efficient cloud-based multi-attack
detection system",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "6",
pages = "1989--2013",
month = dec,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00729-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 26 12:09:01 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00729-4",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Torra:2023:ADR,
author = "Vicen{\c{c}} Torra and Guillermo Navarro-Arribas",
title = "Attribute disclosure risk for $k$-anonymity: the case
of numerical data",
journal = j-INT-J-INFO-SEC,
volume = "22",
number = "6",
pages = "2015--2024",
month = dec,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00730-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Sep 26 12:09:01 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00730-x",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Rajasekaran:2024:FBA,
author = "Arun Sekar Rajasekaran and M. Azees",
title = "A fog-based anonymous authentication scheme with
location privacy for wireless body area network with
{FPGA} implementation",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "1",
pages = "1--13",
month = feb,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00717-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 27 06:06:19 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00717-8",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Rahal:2024:BBM,
author = "Hakima Rym Rahal and Sihem Slatnia and Okba Kazar and
Ezedin Barka and Saad Harous",
title = "Blockchain-based multi-diagnosis deep learning
application for various diseases classification",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "1",
pages = "15--30",
month = feb,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00733-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 27 06:06:19 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00733-8",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Silvestri:2024:CTA,
author = "Stefano Silvestri and Shareful Islam and Dmitry Amelin
and Gabriele Weiler and Spyridon Papastergiou and Mario
Ciampi",
title = "Cyber threat assessment and management for securing
healthcare ecosystems using natural language
processing",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "1",
pages = "31--50",
month = feb,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00769-w",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 27 06:06:19 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00769-w",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Rabie:2024:FPP,
author = "Osama Bassam J. Rabie and Shitharth Selvarajan and
Tawfiq Hasanin and Gouse Baig Mohammed and Abddulrhman
M. Alshareef and Mueen Uddin",
title = "A full privacy-preserving distributed batch-based
certificate-less aggregate signature authentication
scheme for healthcare wearable wireless medical sensor
networks ({HWMSNs})",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "1",
pages = "51--80",
month = feb,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00748-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 27 06:06:19 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
note = "See correction \cite{Rabie:2024:CFP}.",
URL = "https://link.springer.com/article/10.1007/s10207-023-00748-1",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Alharbi:2024:FTL,
author = "Afnan A. Alharbi",
title = "Federated transfer learning for attack detection for
{Internet of Medical Things}",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "1",
pages = "81--100",
month = feb,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00805-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 27 06:06:19 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00805-9",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Rekeraho:2024:CCI,
author = "Alexandre Rekeraho and Daniel Tudor Cotfas and Petru
Adrian Cotfas and Titus Constantin B{\u{a}}lan and
Emmanuel Tuyishime and Rebecca Acheampong",
title = "Cybersecurity challenges in {IoT}-based smart
renewable energy",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "1",
pages = "101--117",
month = feb,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00732-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 27 06:06:19 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00732-9",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Lagraa:2024:RGB,
author = "Sofiane Lagraa and Martin Hus{\'a}k and Hamida Seba
and Satyanarayana Vuppala and Radu State and Moussa
Ouedraogo",
title = "A review on graph-based approaches for network
security monitoring and botnet detection",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "1",
pages = "119--140",
month = feb,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00742-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 27 06:06:19 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00742-7",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Ayodele:2024:SDM,
author = "Believe Ayodele and Victor Buttigieg",
title = "{SDN} as a defence mechanism: a comprehensive survey",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "1",
pages = "141--185",
month = feb,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00764-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 27 06:06:19 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00764-1",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Adamos:2024:EAR,
author = "Konstantinos Adamos and George Stergiopoulos and
Michalis Karamousadakis and Dimitris Gritzalis",
title = "Enhancing attack resilience of cyber-physical systems
through state dependency graph models",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "1",
pages = "187--198",
month = feb,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00731-w",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 27 06:06:19 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00731-w",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Dinesh:2024:EET,
author = "K. Dinesh and S. V. N. Santhosh Kumar",
title = "Energy-efficient trust-aware secured neuro-fuzzy
clustering with sparrow search optimization in wireless
sensor network",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "1",
pages = "199--223",
month = feb,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00737-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 27 06:06:19 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00737-4",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Sommervoll:2024:SAA,
author = "{\AA}vald {\AA}slaugson Sommervoll and L{\'a}szl{\'o}
Erd{\H{o}}di and Fabio Massimo Zennaro",
title = "Simulating all archetypes of {SQL} injection
vulnerability exploitation using reinforcement learning
agents",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "1",
pages = "225--246",
month = feb,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00738-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 27 06:06:19 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00738-3",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Kekul:2024:EVM,
author = "Hakan Kek{\"u}l and Burhan Ergen and Halil Arslan",
title = "Estimating vulnerability metrics with word embedding
and multiclass classification methods",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "1",
pages = "247--270",
month = feb,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00734-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 27 06:06:19 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00734-7",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Vitel:2024:SVL,
author = "Silviu Vi{\c{t}}el and Marilena Lupa{\c{s}}cu and
Drago{\c{s}} Teodor Gavrilu{\c{t}} and Henri Luchian",
title = "Short- versus long-term performance of detection
models for obfuscated {MSOffice}-embedded malware",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "1",
pages = "271--297",
month = feb,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00736-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 27 06:06:19 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00736-5",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Ryu:2024:DAA,
author = "Gwonsang Ryu and Daeseon Choi",
title = "Detection of adversarial attacks based on differences
in image entropy",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "1",
pages = "299--314",
month = feb,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00735-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 27 06:06:19 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00735-6",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Dhingra:2024:RLM,
author = "Bhavya Dhingra and Vidhi Jain and Deepak Kumar Sharma
and Koyel Datta Gupta and Deepika Kukreja",
title = "{RLET}: a lightweight model for ubiquitous multi-class
intrusion detection in sustainable and secured smart
environment",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "1",
pages = "315--330",
month = feb,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00739-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 27 06:06:19 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00739-2",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Jin:2024:FID,
author = "Philgeun Jin and Namjun Kim and Sangjin Lee and Doowon
Jeong",
title = "Forensic investigation of the dark web on the {Tor}
network: pathway toward the surface web",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "1",
pages = "331--346",
month = feb,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00745-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 27 06:06:19 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00745-4",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Farao:2024:ICI,
author = "Aristeidis Farao and Georgios Paparis and Sakshyam
Panda and Emmanouil Panaousis and Apostolis Zarras and
Christos Xenakis",
title = "{INCHAIN}: a cyber insurance architecture with smart
contracts and self-sovereign identity on top of
blockchain",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "1",
pages = "347--371",
month = feb,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00741-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 27 06:06:19 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00741-8",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Mvah:2024:GGT,
author = "Fabrice Mvah and Vianney Kengne Tchendji and
Cl{\'e}mentin Tayou Djamegni and Ahmed H. Anwar and
Deepak K. Tosh and Charles Kamhoua",
title = "{GaTeBaSep}: game theory-based security protocol
against {ARP} spoofing attacks in software-defined
networks",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "1",
pages = "373--387",
month = feb,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00749-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 27 06:06:19 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00749-0",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Narita:2024:SDP,
author = "Jun Narita and Takao Murakami and Hideitsu Hino and
Masakatsu Nishigaki and Tetsushi Ohki",
title = "Synthesizing differentially private location traces
including co-locations",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "1",
pages = "389--410",
month = feb,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00740-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 27 06:06:19 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00740-9",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Feng:2024:SAI,
author = "Tao Feng and Wentao Jin and Minghu Zhang and Lu
Zheng",
title = "Security assessment and improvement of smart grid
{NIKE} protocol",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "1",
pages = "411--429",
month = feb,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00746-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 27 06:06:19 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00746-3",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Amine:2024:SEV,
author = "Oussama Amine and Karim Baghery and Zaira Pindado and
Carla R{\`a}fols",
title = "Simulation extractable versions of {Groth}'s
{zk-SNARK} revisited",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "1",
pages = "431--445",
month = feb,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00750-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 27 06:06:19 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00750-7",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Mangipudi:2024:PPM,
author = "Easwar Vivek Mangipudi and Krutarth Rao and Jeremy
Clark and Aniket Kate",
title = "{Pepal}: Penalizing multimedia breaches and partial
leakages",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "1",
pages = "447--465",
month = feb,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00744-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 27 06:06:19 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00744-5",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Elmiger:2024:STG,
author = "Marius Elmiger and Mouad Lemoudden and Nikolaos
Pitropakis and William J. Buchanan",
title = "Start thinking in graphs: using graphs to address
critical attack paths in a {Microsoft} cloud tenant",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "1",
pages = "467--485",
month = feb,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00751-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 27 06:06:19 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00751-6",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Chakraborty:2024:BBA,
author = "Partha Sarathi Chakraborty and Somanath Tripathy and
Sanjeet Kumar Nayak",
title = "{BASPED}: Blockchain assisted searchable public key
encryption over outsourced data",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "1",
pages = "487--503",
month = feb,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00753-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 27 06:06:19 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00753-4",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Adnan:2024:ISE,
author = "Muhammad Adnan and Muhammad Osama Imam and Muhammad
Furqan Javed and Iqbal Murtza",
title = "Improving spam email classification accuracy using
ensemble techniques: a stacking approach",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "1",
pages = "505--517",
month = feb,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00756-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 27 06:06:19 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00756-1",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Chanal:2024:BBD,
author = "Poornima M. Chanal and Mahabaleshwar S. Kakkasageri",
title = "Blockchain-based data integrity framework for
{Internet of Things}",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "1",
pages = "519--532",
month = feb,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00719-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 27 06:06:19 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00719-6",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Ayub:2024:RSI,
author = "Md. Ahsan Ayub and Ambareen Siraj and Bobby Filar and
Maanak Gupta",
title = "{RWArmor}: a static-informed dynamic analysis approach
for early detection of cryptographic windows
ransomware",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "1",
pages = "533--556",
month = feb,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00758-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 27 06:06:19 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00758-z",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Jain:2024:IDL,
author = "Vikas Kumar Jain and Meenakshi Tripathi",
title = "An integrated deep learning model for {Ethereum} smart
contract vulnerability detection",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "1",
pages = "557--575",
month = feb,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00752-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 27 06:06:19 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00752-5",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Anjum:2024:HST,
author = "Anjum and Rahul Katarya",
title = "Hate speech, toxicity detection in online social
media: a recent survey of state of the art and
opportunities",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "1",
pages = "577--608",
month = feb,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00755-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 27 06:06:19 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00755-2",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Triakosia:2024:SOM,
author = "Aikaterini Triakosia and Panagiotis Rizomiliotis and
Cecilia Tonelli and Fabio Federici and Valerio Senni",
title = "Secure outsourcing of manufacturing compliance
checks",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "1",
pages = "609--627",
month = feb,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00747-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 27 06:06:19 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00747-2",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Hayata:2024:PIR,
author = "Junichiro Hayata and Jacob C. N. Schuldt and Goichiro
Hanaoka and Kanta Matsuura",
title = "On private information retrieval supporting range
queries",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "1",
pages = "629--647",
month = feb,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00743-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 27 06:06:19 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00743-6",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Bansal:2024:MPP,
author = "Vidhi Bansal and Niyati Baliyan and Mohona Ghosh",
title = "{MLChain}: a privacy-preserving model learning
framework using blockchain",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "1",
pages = "649--677",
month = feb,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00754-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 27 06:06:19 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00754-3",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Patruni:2024:PMP,
author = "Muralidhara Rao Patruni and Abdul Gaffar Humayun",
title = "{PPAM-mIoMT}: a privacy-preserving authentication with
device verification for securing healthcare systems in
{5G} networks",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "1",
pages = "679--698",
month = feb,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00762-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 27 06:06:19 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00762-3",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Patsakis:2024:CCS,
author = "Constantinos Patsakis and Eugenia Politou and
Efthimios Alepis and Julio Hernandez-Castro",
title = "Cashing out crypto: state of practice in ransom
payments",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "2",
pages = "699--712",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00766-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 27 06:06:20 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00766-z",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Hamdi:2024:VAA,
author = "Ahlem Hamdi and Lamia Fourati and Samiha Ayed",
title = "Vulnerabilities and attacks assessments in blockchain
1.0, 2.0 and 3.0: tools, analysis and countermeasures",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "2",
pages = "713--757",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00765-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 27 06:06:20 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00765-0",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Zouhri:2024:EIF,
author = "Houssam Zouhri and Ali Idri and Ahmed Ratnani",
title = "Evaluating the impact of filter-based feature
selection in intrusion detection systems",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "2",
pages = "759--785",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00767-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 27 06:06:20 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00767-y",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Olivero:2024:SMS,
author = "Miguel Angel Olivero and Antonia Bertolino and
Francisco Jos{\'e} Dominguez-Mayo and Mar{\'\i}a
Jos{\'e} Escalona and Ilaria Matteucci",
title = "A systematic mapping study on security for systems of
systems",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "2",
pages = "787--817",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00757-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 27 06:06:20 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00757-0",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Goenka:2024:CSP,
author = "Richa Goenka and Meenu Chawla and Namita Tiwari",
title = "A comprehensive survey of phishing: mediums, intended
targets, attack and defence techniques and a novel
taxonomy",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "2",
pages = "819--848",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00768-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 27 06:06:20 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00768-x",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Maddu:2024:NID,
author = "Mamatha Maddu and Yamarthi Narasimha Rao",
title = "Network intrusion detection and mitigation in {SDN}
using deep learning models",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "2",
pages = "849--862",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00771-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 27 06:06:20 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00771-2",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Ali:2024:RSP,
author = "Auwal Shehu Ali and Zarul Fitri Zaaba and Manmeet
Mahinderjit Singh",
title = "The rise of ``security and privacy'': bibliometric
analysis of computer privacy research",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "2",
pages = "863--885",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00761-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 27 06:06:20 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00761-4",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Alkhateeb:2024:SRT,
author = "Ehab Alkhateeb and Ali Ghorbani and Arash Habibi
Lashkari",
title = "A survey on run-time packers and mitigation
techniques",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "2",
pages = "887--913",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00759-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 27 06:06:20 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00759-y",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Bhale:2024:HID,
author = "Pradeepkumar Bhale and Santosh Biswas and Sukumar
Nandi",
title = "A hybrid {IDS} for detection and mitigation of
sinkhole attack in {6LoWPAN} networks",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "2",
pages = "915--934",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00763-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 27 06:06:20 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00763-2",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Tyagi:2024:EUA,
author = "Gaurav Tyagi and Rahul Kumar",
title = "An efficient user authentication and key agreement
scheme for wireless sensor networks using physically
unclonable function",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "2",
pages = "935--962",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00770-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 27 06:06:20 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00770-3",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Villalon-Huerta:2024:SCC,
author = "Antonio Villal{\'o}n-Huerta and Ismael Ripoll-Ripoll
and Hector Marco-Gisbert",
title = "A survey and characterization of {Close Access
Cyberspace Operations}",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "2",
pages = "963--980",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00772-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 27 06:06:20 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00772-1",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Toreini:2024:FSF,
author = "Ehsan Toreini and Maryam Mehrnezhad and Aad van
Moorsel",
title = "{Fairness as a Service} ({FaaS}): verifiable and
privacy-preserving fairness auditing of machine
learning systems",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "2",
pages = "981--997",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00774-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 27 06:06:20 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00774-z",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Xun:2024:LCA,
author = "Peng Xun and Ziyu Yang and Haoyang Zhu and Zhu Tang",
title = "Locating collaborative attack targets based on
physical invariants toward cyber-physical systems",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "2",
pages = "999--1017",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00773-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 27 06:06:20 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00773-0",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Patruni:2024:PCP,
author = "Muralidhara Rao Patruni and Abdul Gaffar Humayun",
title = "Publisher Correction: {PPAM-mIoMT}: a
privacy-preserving authentication with device
verification for securing healthcare systems in {5G}
networks",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "2",
pages = "1019--1019",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00775-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 27 06:06:20 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00775-y",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Goncalves:2024:OGC,
author = "Ricardo Martins Gon{\c{c}}alves and Miguel Mira da
Silva and Paulo Rupino da Cunha",
title = "{Olympus}: a {GDPR} compliant blockchain system",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "2",
pages = "1021--1036",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00782-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 27 06:06:20 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00782-z",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Saikam:2024:EAB,
author = "Jalaiah Saikam and Koteswararao Ch",
title = "An ensemble approach-based intrusion detection system
utilizing {ISHO--HBA} and {SE--ResNet152}",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "2",
pages = "1037--1054",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00777-w",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 27 06:06:20 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00777-w",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Ariyadasa:2024:SRL,
author = "Subhash Ariyadasa and Shantha Fernando and Subha
Fernando",
title = "{SmartiPhish}: a reinforcement learning-based
intelligent anti-phishing solution to detect spoofed
website attacks",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "2",
pages = "1055--1076",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00778-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 27 06:06:20 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00778-9",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Xu:2024:GAE,
author = "Lei Xu and Junhai Zhai",
title = "Generating adversarial examples with collaborative
generative models",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "2",
pages = "1077--1091",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00780-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 27 06:06:20 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00780-1",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Gomez:2024:IEC,
author = "Juan Manuel Castelo G{\'o}mez and Sergio
Ruiz-Villafranca",
title = "Integrating the edge computing paradigm into the
development of {IoT} forensic methodologies",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "2",
pages = "1093--1116",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00776-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 27 06:06:20 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00776-x",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Ince:2024:EPD,
author = "Kenan Ince",
title = "Exploring the potential of deep learning and machine
learning techniques for randomness analysis to enhance
security on {IoT}",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "2",
pages = "1117--1130",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00783-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 27 06:06:20 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00783-y",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Hamila:2024:ESF,
author = "Firas Hamila and Mohammad Hamad and Daniel Costa
Salgado and Sebastian Steinhorst",
title = "Enhancing security in {Fiat--Shamir}
transformation-based non-interactive zero-knowledge
protocols for {IoT} authentication",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "2",
pages = "1131--1148",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00779-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 27 06:06:20 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00779-8",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Prantl:2024:BHI,
author = "Thomas Prantl and Lukas Horn and Simon Engel and Lukas
Iffl{\"a}nder and Lukas Beierlieb and Christian
Krupitzer and Andr{\'e} Bauer and Mansi Sakarvadia and
Ian Foster and Samuel Kounev",
title = "{De Bello Homomorphico}: Investigation of the
extensibility of the {OpenFHE} library with basic
mathematical functions by means of common approaches
using the example of the {CKKS} cryptosystem",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "2",
pages = "1149--1169",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00781-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 27 06:06:20 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00781-0",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Heluany:2024:RDT,
author = "Jessica B. Heluany and Vasileios Gkioulos",
title = "A review on digital twins for power generation and
distribution",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "2",
pages = "1171--1195",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00784-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 27 06:06:20 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00784-x",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Ali:2024:FIS,
author = "Rao Faizan Ali and P. D. D. Dominic and Sadaf Hina and
Sheraz Naseer",
title = "Fostering information security policies compliance
with {ISA-95}-based framework: an empirical study of
oil and gas employees",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "2",
pages = "1197--1213",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00786-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 27 06:06:20 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00786-9",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Empl:2024:GIV,
author = "Philip Empl and Daniel Schlette and Lukas St{\"o}ger
and G{\"u}nther Pernul",
title = "Generating {ICS} vulnerability playbooks with open
standards",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "2",
pages = "1215--1230",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00760-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 27 06:06:20 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00760-5",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Amin:2024:BBM,
author = "Habib {El Amin} and Lina Oueidat and Maroun Chamoun
and Abed {Ellatif Samhat} and Antoine Feghali",
title = "Blockchain-based multi-organizational cyber risk
management framework for collaborative environments",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "2",
pages = "1231--1249",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00788-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 27 06:06:20 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00788-7",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Nandanwar:2024:TBI,
author = "Himanshu Nandanwar and Rahul Katarya",
title = "{TL-BILSTM IoT}: transfer learning model for
prediction of intrusion detection system in {IoT}
environment",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "2",
pages = "1251--1277",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00787-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 27 06:06:20 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00787-8",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Rao:2024:CDM,
author = "Dimmiti Srinivasa Rao and Ajith Jubilson Emerson",
title = "Cyberattack defense mechanism using deep learning
techniques in software-defined networks",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "2",
pages = "1279--1291",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00785-w",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 27 06:06:20 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00785-w",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Niktabe:2024:DCP,
author = "Sepideh Niktabe and Arash Habibi Lashkari and Dilli
Prasad Sharma",
title = "Detection, characterization, and profiling {DoH}
Malicious traffic using statistical pattern
recognition",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "2",
pages = "1293--1316",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00790-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 27 06:06:20 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00790-z",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Dasgupta:2024:IDP,
author = "Rupshali Dasgupta and Meghabriti Pramanik and Pabitra
Mitra and Dipanwita Roy Chowdhury",
title = "Intrusion detection for power grid: a review",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "2",
pages = "1317--1329",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00789-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 27 06:06:20 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00789-6",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Asad:2024:PRA,
author = "H. Asad and S. Adhikari and Ilir Gashi",
title = "A perspective-retrospective analysis of diversity in
signature-based open-source network intrusion detection
systems",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "2",
pages = "1331--1346",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00794-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 27 06:06:20 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00794-9",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Alqahtani:2024:SBR,
author = "Sultan S. Alqahtani",
title = "Security bug reports classification using {\em
fasttext}",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "2",
pages = "1347--1358",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00793-w",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 27 06:06:20 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00793-w",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{ElMendili:2024:EDM,
author = "Fatna {El Mendili} and Mohammed Fattah and Nisrine
Berros and Youness Filaly and Youn{\`e}s {El Bouzekri
El Idrissi}",
title = "Enhancing detection of malicious profiles and spam
tweets with an automated honeypot framework powered by
deep learning",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "2",
pages = "1359--1388",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00796-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 27 06:06:20 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00796-7",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Abbas:2024:RFF,
author = "Sohail Abbas and Manar Abu Talib and Qassim Nasir and
Sally Idhis and Mariam Alaboudi and Ali Mohamed",
title = "Radio frequency fingerprinting techniques for device
identification: a survey",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "2",
pages = "1389--1427",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00801-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 27 06:06:20 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00801-z",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Martinez:2024:MCP,
author = "Ferney Mart{\'\i}nez and Luis Enrique S{\`a}nchez and
Antonio Santos-Olmo and David G. Rosado and Eduardo
Fern{\`a}ndez-Medina",
title = "Maritime cybersecurity: protecting digital seas",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "2",
pages = "1429--1457",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00800-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 27 06:06:20 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00800-0",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Ukeje:2024:ISP,
author = "Ndukwe Ukeje and Jairo Gutierrez and Krassie Petrova",
title = "Information security and privacy challenges of cloud
computing for government adoption: a systematic
review",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "2",
pages = "1459--1475",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00797-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 27 06:06:20 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00797-6",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Oruc:2024:MCS,
author = "Aybars Oruc and Nabin Chowdhury and Vasileios
Gkioulos",
title = "A modular cyber security training programme for the
maritime domain",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "2",
pages = "1477--1512",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00799-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 27 06:06:20 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00799-4",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Zuo:2024:VDB,
author = "Fei Zuo and Junghwan Rhee",
title = "Vulnerability discovery based on source code patch
commit mining: a systematic literature review",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "2",
pages = "1513--1526",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00795-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 27 06:06:20 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00795-8",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Frati:2024:CTH,
author = "Fulvio Frati and Georgiana Darau and Nikos Salamanos
and Pantelitsa Leonidou and Costas Iordanou and
Dimitris Plachouris and Efstratios Syrmas and Evangelos
Floros and George Nikitakis and George Spanoudakis and
Konstantinos Kalais and Stella Tsichlaki and Ernesto
Damiani and George C. Kagadis and Jihane Najar and
Michael Sirivianos",
title = "Cybersecurity training and healthcare: the {AERAS}
approach",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "2",
pages = "1527--1539",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00802-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 27 06:06:20 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00802-y",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Kakisim:2024:DLA,
author = "Arzu Gorgulu Kakisim",
title = "A deep learning approach based on multi-view consensus
for {SQL} injection detection",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "2",
pages = "1541--1556",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00791-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Wed Mar 27 06:06:20 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00791-y",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Saheed:2024:VGW,
author = "Yakub Kayode Saheed and Sanjay Misra",
title = "A voting gray wolf optimizer-based ensemble learning
models for intrusion detection in the {Internet of
Things}",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "3",
pages = "1557--1581",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00803-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon May 27 07:56:49 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00803-x",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Ebrahimpour:2024:AIT,
author = "Elham Ebrahimpour and Shahram Babaie",
title = "Authentication in {Internet of Things}, protocols,
attacks, and open issues: a systematic literature
review",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "3",
pages = "1583--1602",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00806-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon May 27 07:56:49 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00806-8",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Yousaf:2024:SSM,
author = "Awais Yousaf and Jianying Zhou",
title = "From sinking to saving: {MITRE ATT\&CK} and {D3FEND}
frameworks for maritime cybersecurity",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "3",
pages = "1603--1618",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00812-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon May 27 07:56:49 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00812-4",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Kunang:2024:EEI,
author = "Yesi Novaria Kunang and Siti Nurmaini and Deris
Stiawan and Bhakti Yudho Suprapto",
title = "An end-to-end intrusion detection system with {IoT}
dataset using deep learning with unsupervised feature
extraction",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "3",
pages = "1619--1648",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00807-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon May 27 07:56:49 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00807-7",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Vishwakarma:2024:BBB,
author = "Lokendra Vishwakarma and Debasis Das",
title = "{BLISS}: blockchain-based integrated security system
for {Internet of Things} {(IoT)} applications",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "3",
pages = "1649--1665",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00808-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon May 27 07:56:49 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00808-6",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Singh:2024:BBB,
author = "Upendra Singh and Sumit Kumar Sharma and Mukul Shukla
and Preeti Jha",
title = "Blockchain-based {BATMAN} protocol using mobile ad hoc
network {(MANET)} with an ensemble algorithm",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "3",
pages = "1667--1677",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00804-w",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon May 27 07:56:49 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00804-w",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Angafor:2024:SRO,
author = "Giddeon Njamngang Angafor and Iryna Yevseyeva and
Leandros Maglaras",
title = "Securing the remote office: reducing cyber risks to
remote working through regular security awareness
education campaigns",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "3",
pages = "1679--1693",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00809-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon May 27 07:56:49 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00809-5",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Tzavara:2024:TEC,
author = "Vasiliki Tzavara and Savvas Vassiliadis",
title = "Tracing the evolution of cyber resilience: a
historical and conceptual review",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "3",
pages = "1695--1719",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00811-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon May 27 07:56:49 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00811-x",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Haugli-Sandvik:2024:MDM,
author = "Marie Haugli-Sandvik and Mass Soldal Lund and Fr{\o}y
Birte Bj{\o}rneseth",
title = "Maritime decision-makers and cyber security: deck
officers' perception of cyber risks towards {IT} and
{OT} systems",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "3",
pages = "1721--1739",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00810-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon May 27 07:56:49 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00810-y",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Leszczyna:2024:ABP,
author = "Rafa{\l} Leszczyna",
title = "Activity-based payments: alternative (anonymous)
online payment model",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "3",
pages = "1741--1759",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00816-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon May 27 07:56:49 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00816-0",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Andelic:2024:RPS,
author = "Nikola Andeli{\'c} and Sandi Baressi {\v{S}}egota and
Zlatan Car",
title = "Robust password security: a genetic programming
approach with imbalanced dataset handling",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "3",
pages = "1761--1786",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00814-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon May 27 07:56:49 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00814-2",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Saad:2024:NDP,
author = "Redhwan M. A. Saad and Mohammed Anbar and Selvakumar
Manickam and Samir I. Shaheen and Iznan H. Hasbullah",
title = "Neighbor discovery protocol anomaly-based detection
system using neural network algorithm",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "3",
pages = "1787--1803",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00815-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon May 27 07:56:49 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00815-1",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Pise:2024:PAV,
author = "Rohini G. Pise and Sonali Patil",
title = "Pioneering automated vulnerability detection for smart
contracts in blockchain using {KEVM}: Guardian
{ADRGAN}",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "3",
pages = "1805--1819",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00817-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon May 27 07:56:49 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00817-z",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Smyrlis:2024:RRA,
author = "Michail Smyrlis and Evangelos Floros and Ioannis
Basdekis and Dumitru-Bogdan Prelipcean and Aristeidis
Sotiropoulos and Herve Debar and Apostolis Zarras and
George Spanoudakis",
title = "{RAMA}: a risk assessment solution for healthcare
organizations",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "3",
pages = "1821--1838",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00820-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon May 27 07:56:49 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00820-4",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Chew:2024:RTS,
author = "Christopher Jun Wen Chew and Vimal Kumar and Panos
Patros and Robi Malik",
title = "Real-time system call-based ransomware detection",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "3",
pages = "1839--1858",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00819-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon May 27 07:56:49 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00819-x",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Hoglund:2024:APK,
author = "Joel H{\"o}glund and Simon Bouget and Martin Furuhed
and John Preu{\ss} Mattsson and G{\"o}ran Selander and
Shahid Raza",
title = "{AutoPKI}: public key infrastructure for {IoT} with
automated trust transfer",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "3",
pages = "1859--1875",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00825-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon May 27 07:56:49 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00825-z",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Sharma:2024:CRP,
author = "Yash Sharma and Anshul Arora",
title = "A comprehensive review on permissions-based {Android}
malware detection",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "3",
pages = "1877--1912",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00822-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon May 27 07:56:49 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00822-2",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Shah:2024:CHR,
author = "Rajiv Shah and Deniz Cemiloglu and Cagatay Yucel and
Raian Ali and Vasilis Katos",
title = "Is cyber hygiene a remedy to {IPTV} infringement? {A}
study of online streaming behaviours and cyber security
practices",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "3",
pages = "1913--1926",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00824-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon May 27 07:56:49 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00824-0",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Wijesundara:2024:SEF,
author = "W. M. A. B. Wijesundara and Joong-Sun Lee and Dara
Tith and Eleni Aloupogianni and Hiroyuki Suzuki and
Takashi Obi",
title = "Security-enhanced firmware management scheme for smart
home {IoT} devices using distributed ledger
technologies",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "3",
pages = "1927--1937",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00827-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon May 27 07:56:49 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00827-x",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Abdelkreem:2024:FEI,
author = "Eslam Abdelkreem and Sherif Hussein and Ashraf
Tammam",
title = "Feature engineering impact on position falsification
attacks detection in vehicular ad-hoc network",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "3",
pages = "1939--1961",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00830-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon May 27 07:56:49 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00830-2",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Ferrer-Gomila:2024:AFC,
author = "Josep-Llu{\'\i}s Ferrer-Gomila and M. Francisca
Hinarejos",
title = "Abuse-freeness in contract signing: a blockchain-based
proposal",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "3",
pages = "1963--1974",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00818-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon May 27 07:56:49 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00818-y",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Quincozes:2024:SIA,
author = "Vagner E. Quincozes and Silvio E. Quincozes and
Juliano F. Kazienko and Simone Gama and Omar
Cheikhrouhou and Anis Koubaa",
title = "A survey on {IoT} application layer protocols,
security challenges, and the role of explainable {AI}
in {IoT (XAIoT)}",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "3",
pages = "1975--2002",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00828-w",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon May 27 07:56:49 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00828-w",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Al-Aqrabi:2024:DAI,
author = "Hussain Al-Aqrabi and Ahmed M. Manasrah and Richard
Hill and Mohammed Q. Shatnawi and Mohammad Sh Daoud and
Hoda Alkhzaimi",
title = "Dynamic authentication for intelligent sensor clouds
in the {Internet of Things}",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "3",
pages = "2003--2021",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00829-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon May 27 07:56:49 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00829-9",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Petrean:2024:RFE,
author = "Diana-Elena Petrean and Rodica Potolea",
title = "Random forest evaluation using multi-key homomorphic
encryption and lookup tables",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "3",
pages = "2023--2041",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00823-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon May 27 07:56:49 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00823-1",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Chillara:2024:DSM,
author = "Anil Kumar Chillara and Paresh Saxena and Rajib Ranjan
Maiti and Manik Gupta and Raghu Kondapalli and Zhichao
Zhang and Krishnakumar Kesavan",
title = "Deceiving supervised machine learning models via
adversarial data poisoning attacks: a case study with
{USB} keyboards",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "3",
pages = "2043--2061",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00834-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon May 27 07:56:49 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00834-y",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Aliabadian:2024:SCG,
author = "Amir Aliabadian and Mohammadreza Zahabi and Majid
Mobini",
title = "Spatial de-correlation of generated keys from wireless
channels using adversarial deep learning",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "3",
pages = "2063--2073",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00831-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon May 27 07:56:49 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00831-1",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Hilario:2024:GAP,
author = "Eric Hilario and Sami Azam and Jawahar Sundaram and
Khwaja {Imran Mohammed} and Bharanidharan Shanmugam",
title = "Generative {AI} for pentesting: the good, the bad, the
ugly",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "3",
pages = "2075--2097",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00835-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon May 27 07:56:49 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00835-x",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Nasereddin:2024:NAD,
author = "Mohammed Nasereddin and Raad Al-Qassas",
title = "A new approach for detecting process injection attacks
using memory analysis",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "3",
pages = "2099--2121",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00836-w",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon May 27 07:56:49 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00836-w",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Mughaid:2024:ICA,
author = "Ala Mughaid and Ibrahim Obeidat and Laith Abualigah
and Shadi Alzubi and Mohammad Sh. Daoud and Hazem
Migdady",
title = "Intelligent cybersecurity approach for data protection
in cloud computing based {Internet of Things}",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "3",
pages = "2123--2137",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00832-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon May 27 07:56:49 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00832-0",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Talukder:2024:MWM,
author = "Md. Alamin Talukder and Selina Sharmin and Md Ashraf
Uddin and Md Manowarul Islam and Sunil Aryal",
title = "{MLSTL-WSN}: machine learning-based intrusion
detection using {SMOTETomek} in {WSNs}",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "3",
pages = "2139--2158",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00833-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon May 27 07:56:49 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00833-z",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Dwivedi:2024:IJI,
author = "Rahul Dwivedi",
title = "International journal of information security: a
bibliometric study, 2007--2023",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "3",
pages = "2159--2187",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00840-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon May 27 07:56:49 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00840-0",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Karagiannis:2024:MDP,
author = "Stylianos Karagiannis and Christoforos Ntantogian and
Emmanouil Magkos and Aggeliki Tsohou and Lu{\'\i}s
Landeiro Ribeiro",
title = "Mastering data privacy: leveraging {K}-anonymity for
robust health data sharing",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "3",
pages = "2189--2201",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00838-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon May 27 07:56:49 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00838-8",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Micale:2024:CAB,
author = "Davide Micale and Ilaria Matteucci and Florian Fenzl
and Roland Rieke and Giuseppe Patan{\`e}",
title = "A context-aware on-board intrusion detection system
for smart vehicles",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "3",
pages = "2203--2223",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00821-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon May 27 07:56:49 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00821-3",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Kwarteng:2024:MTM,
author = "Emmanuel Kwarteng and Mumin Cebe",
title = "{MEDICALHARM}: A threat modeling designed for modern
medical devices and a comprehensive study on
effectiveness, user satisfaction, and security
perspectives",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "3",
pages = "2225--2268",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00826-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon May 27 07:56:49 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00826-y",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Khorasgani:2024:AIP,
author = "Hossein Abedi Khorasgani and Noman Mohammed and Yang
Wang",
title = "Attribute inference privacy protection for pre-trained
models",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "3",
pages = "2269--2285",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00839-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon May 27 07:56:49 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00839-7",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Upreti:2024:TML,
author = "Ramesh Upreti and Pedro G. Lind and Ahmed Elmokashfi
and Anis Yazidi",
title = "Trustworthy machine learning in the context of
security and privacy",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "3",
pages = "2287--2314",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00813-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon May 27 07:56:49 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00813-3",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Navajas-Adan:2024:PDA,
author = "Joaqu{\'\i}n Navajas-Ad{\'a}n and Eul{\`a}lia
Badia-Gelabert and Laura Jim{\'e}nez-Saurina and
Ma. Jes{\'u}s Mariju{\'a}n-Mart{\'\i}n and Rafael
Mayo-Garc{\'\i}a",
title = "Perceptions and dilemmas around cyber-security in a
{Spanish} research center after a cyber-attack",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "3",
pages = "2315--2331",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00847-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon May 27 07:56:49 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00847-7",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Madhushanie:2024:SMA,
author = "Nadisha Madhushanie and Sugandima Vidanagamachchi and
Nalin Arachchilage",
title = "Selfish mining attack in blockchain: a systematic
literature review",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "3",
pages = "2333--2351",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00849-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon May 27 07:56:49 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00849-5",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Barik:2024:AAD,
author = "Kousik Barik and Sanjay Misra and Luis
Fernandez-Sanz",
title = "Adversarial attack detection framework based on
optimized weighted conditional stepwise adversarial
network",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "3",
pages = "2353--2376",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00844-w",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon May 27 07:56:49 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00844-w",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Almoqbil:2024:ADE,
author = "Abdullah Hamad N. Almoqbil",
title = "Anomaly detection for early ransomware and spyware
warning in nuclear power plant systems based on
{FusionGuard}",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "3",
pages = "2377--2394",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00841-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon May 27 07:56:49 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00841-z",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Amutha:2024:ESQ,
author = "M. Amutha and K. R. Kavitha",
title = "Enhancing security in {QCA}-based circuits using
optimal key gate placement",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "3",
pages = "2395--2405",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00842-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon May 27 07:56:49 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00842-y",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Far:2024:GFB,
author = "Saeed Banaeian Far and Maryam Rajabzadeh Asaar and
Afrooz Haghbin",
title = "A generic framework for blockchain-assisted on-chain
auditing for off-chain storage",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "3",
pages = "2407--2435",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00846-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon May 27 07:56:49 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00846-8",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Soumelidou:2024:VET,
author = "Aikaterini Soumelidou and Aggeliki Tsohou",
title = "Validation and extension of two domain-specific
information privacy competency models",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "3",
pages = "2437--2455",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00843-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon May 27 07:56:49 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00843-x",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Patel:2024:CED,
author = "N. D. Patel and B. M. Mehtre and Rajeev Wankar",
title = "A computationally efficient dimensionality reduction
and attack classification approach for network
intrusion detection",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "3",
pages = "2457--2487",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00792-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon May 27 07:56:49 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-023-00792-x",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Rabie:2024:CFP,
author = "Osama Bassam J. Rabie and Shitharth Selvarajan and
Tawfiq Hasanin and Gouse Baig Mohammed and Abddulrhman
M. Alshareef and Mueen Uddin",
title = "Correction: {A full privacy-preserving distributed
batch-based certificate-less aggregate signature
authentication scheme for healthcare wearable wireless
medical sensor networks (HWMSNs)}",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "3",
pages = "2489--2489",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-023-00798-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon May 27 07:56:49 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
note = "See \cite{Rabie:2024:FPP}.",
URL = "https://link.springer.com/article/10.1007/s10207-023-00798-5",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Qian:2024:OID,
author = "Guangyu Qian and Jinyuan Li and Wei He and Wei Zhang
and You Cao",
title = "An online intrusion detection method for industrial
control systems based on extended belief rule base",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "4",
pages = "2491--2514",
month = aug,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00845-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Aug 5 16:28:15 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00845-9",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Asfahani:2024:POR,
author = "Ahmed M. Asfahani",
title = "Perceptions of organizational responsibility for
cybersecurity in {Saudi Arabia}: a moderated mediation
analysis",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "4",
pages = "2515--2530",
month = aug,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00859-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Aug 5 16:28:15 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00859-3",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Haider:2024:CEF,
author = "Raja Zeeshan Haider and Baber Aslam and Haider Abbas
and Zafar Iqbal",
title = "{C2-Eye}: framework for detecting command and control
({C2}) connection of supply chain attacks",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "4",
pages = "2531--2545",
month = aug,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00850-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Aug 5 16:28:15 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00850-y",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Borah:2024:UCT,
author = "Parthajit Borah and Upasana Sarmah and D. K.
Bhattacharyya and J. K. Kalita",
title = "Unmasking the common traits: an ensemble approach for
effective malware detection",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "4",
pages = "2547--2557",
month = aug,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00854-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Aug 5 16:28:15 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00854-8",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Otokwala:2024:OCF,
author = "Uneneibotejit Otokwala and Andrei Petrovski and Harsha
Kalutarage",
title = "Optimized common features selection and
deep-autoencoder ({OCFSDA}) for lightweight intrusion
detection in {Internet of Things}",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "4",
pages = "2559--2581",
month = aug,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00855-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Aug 5 16:28:15 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00855-7",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Elberri:2024:CDS,
author = "Mustafa Ahmed Elberri and {\"U}mit Toke{\c{s}}er and
Javad Rahebi and Jose Manuel Lopez-Guede",
title = "A cyber defense system against phishing attacks with
deep learning game theory and {LSTM--CNN} with
{African} vulture optimization algorithm ({AVOA})",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "4",
pages = "2583--2606",
month = aug,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00851-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Aug 5 16:28:15 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00851-x",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Haverkamp:2024:EMC,
author = "Indy Haverkamp and Dipti K. Sarmah",
title = "Evaluating the merits and constraints of
cryptography-steganography fusion: a systematic
analysis",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "4",
pages = "2607--2635",
month = aug,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00853-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Aug 5 16:28:15 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00853-9",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Chen:2024:IEC,
author = "Tzer-Long Chen and Chia-Hui Liu and Ya-Hui Ou and
Yao-Min Huang and Zhen-Yu Wu",
title = "An improved and efficient coercion-resistant measure
for electronic voting system",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "4",
pages = "2637--2654",
month = aug,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00852-w",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Aug 5 16:28:15 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00852-w",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Cheimonidis:2024:DVS,
author = "Pavlos Cheimonidis and Konstantinos Rantos",
title = "Dynamic vulnerability severity calculator for
industrial control systems",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "4",
pages = "2655--2676",
month = aug,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00858-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Aug 5 16:28:15 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00858-4",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Bhandari:2024:IAE,
author = "Guru Prasad Bhandari and Gebremariam Assres and Nikola
Gavric and Andrii Shalaginov and Tor-Morten Gr{\o}nli",
title = "{IoTvulCode}: {AI}-enabled vulnerability detection in
software products designed for {IoT} applications",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "4",
pages = "2677--2690",
month = aug,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00848-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Aug 5 16:28:15 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00848-6",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Zacharis:2024:IAD,
author = "Alexandros Zacharis and Vasilios Katos and
Constantinos Patsakis",
title = "Integrating {AI}-driven threat intelligence and
forecasting in the cyber security exercise content
generation lifecycle",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "4",
pages = "2691--2710",
month = aug,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00860-w",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Aug 5 16:28:15 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00860-w",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Bajaj:2024:NAN,
author = "Ashish Bajaj and Dinesh Kumar Vishwakarma",
title = "Non-Alpha-Num: a novel architecture for generating
adversarial examples for bypassing {NLP}-based
clickbait detection mechanisms",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "4",
pages = "2711--2737",
month = aug,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00861-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Aug 5 16:28:15 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00861-9",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Akbarzadeh:2024:TSA,
author = "Aida Akbarzadeh and Laszlo Erdodi and Siv Hilde Houmb
and Tore Geir Soltvedt",
title = "Two-stage advanced persistent threat ({APT}) attack on
an {IEC 61850} power grid substation",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "4",
pages = "2739--2758",
month = aug,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00856-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Aug 5 16:28:15 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00856-6",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Shuhan:2024:DIF,
author = "Mirza Kamrul Bashar Shuhan and Syed Md. Hasnayeen and
Tanmoy Krishna Das and Md. Nazmus Sakib and Md Sadek
Ferdous",
title = "Decentralised identity federations using blockchain",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "4",
pages = "2759--2782",
month = aug,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00864-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Aug 5 16:28:15 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00864-6",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Madhushanie:2024:BFS,
author = "Nadisha Madhushanie and Sugandima Vidanagamachchi and
Nalin Arachchilage",
title = "{BA-flag}: a self-prevention mechanism of selfish
mining attacks in blockchain technology",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "4",
pages = "2783--2792",
month = aug,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00857-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Aug 5 16:28:15 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00857-5",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Paya:2024:SNS,
author = "Antonio Paya and Vicente-Garc{\'\i}a and Alberto
G{\'o}mez",
title = "{Securesdp}: a novel software-defined perimeter
implementation for enhanced network security and
scalability",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "4",
pages = "2793--2808",
month = aug,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00863-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Aug 5 16:28:15 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00863-7",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Chen:2024:MAU,
author = "Chun-Fu Chen and Bill Moriarty and Shaohan Hu and Sean
Moran and Marco Pistoia and Vincenzo Piuri and
Pierangela Samarati",
title = "Model-Agnostic Utility-Preserving Biometric
Information Anonymization",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "4",
pages = "2809--2826",
month = aug,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00862-8",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Aug 5 16:28:15 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00862-8",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Pirbhulal:2024:ICB,
author = "Sandeep Pirbhulal and Sabarathinam Chockalingam and
Ankur Shukla and Habtamu Abie",
title = "{IoT} cybersecurity in {5G} and beyond: a systematic
literature review",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "4",
pages = "2827--2879",
month = aug,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00865-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Aug 5 16:28:15 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00865-5",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Junaid:2024:CBR,
author = "Kashif Junaid and Muhammad Umar Janjua and Junaid
Qadir",
title = "A compliance-based ranking of certificate authorities
using probabilistic approaches",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "4",
pages = "2881--2910",
month = aug,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00867-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Aug 5 16:28:15 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00867-3",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Browne:2024:SRR,
author = "Thomas Oakley Browne and Mohammad Abedin and Mohammad
Jabed Morshed Chowdhury",
title = "A systematic review on research utilising artificial
intelligence for open source intelligence ({OSINT})
applications",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "4",
pages = "2911--2938",
month = aug,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00868-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Aug 5 16:28:15 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00868-2",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Shukla:2024:EBA,
author = "Sanjeev Shukla and Manoj Misra and Gaurav Varshney",
title = "Email bombing attack detection and mitigation using
machine learning",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "4",
pages = "2939--2949",
month = aug,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00871-7",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Aug 5 16:28:15 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00871-7",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Hatzivasilis:2024:SIM,
author = "George Hatzivasilis and Eftychia Lakka and Manos
Athanatos and Sotiris Ioannidis and Grigoris
Kalogiannis and Manolis Chatzimpyrros and George
Spanoudakis and Spyros Papastergiou and Stylianos
Karagiannis and Andreas Alexopoulos and Dimitry Amelin
and Stephan Kiefer",
title = "Swarm-intelligence for the modern {ICT} ecosystems",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "4",
pages = "2951--2975",
month = aug,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00869-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Aug 5 16:28:15 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00869-1",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Cui:2024:DCV,
author = "Beibei Cui and Wei He and Yan Cui",
title = "A dynamic {C-V2X} anonymous authentication and group
key agreement protocol",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "4",
pages = "2977--2989",
month = aug,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00876-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Aug 5 16:28:15 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00876-2",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Xiao:2024:AAT,
author = "Chong Xiao and Ming Tang",
title = "Acnn: arbitrary trace attacks based on leakage area
detection",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "4",
pages = "2991--3006",
month = aug,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00874-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Aug 5 16:28:15 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00874-4",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Vasilellis:2024:GST,
author = "Efstratios Vasilellis and Vasileios Botsos and Argiro
Anagnostopoulou and Dimitris Gritzalis",
title = "Gaming the system: tetromino-based covert channel and
its impact on mobile security",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "4",
pages = "3007--3027",
month = aug,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00875-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Aug 5 16:28:15 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00875-3",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{She:2024:MPC,
author = "Wei She and Haige Feng and Zhao Tian and Xinpeng Rong
and Tianxiang Ma and Wei Liu",
title = "Multi-party codebook distribution strategy based on
secret sharing",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "4",
pages = "3029--3042",
month = aug,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00873-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Aug 5 16:28:15 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00873-5",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Chimuco:2024:EDD,
author = "Francisco T. Chimuco and Jo{\=a}o B. F. Sequeiros and
Tiago M. C. Sim{\~o}es and M{\'a}rio M. Freire and
Pedro R. M. In{\'a}cio",
title = "Expediting the design and development of secure
cloud-based mobile apps",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "4",
pages = "3043--3064",
month = aug,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00880-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Aug 5 16:28:15 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00880-6",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Abbasi:2024:TMI,
author = "Shirin Abbasi and Navid Khaledian and Amir Masoud
Rahmani",
title = "Trust management in the internet of vehicles: a
systematic literature review of blockchain
integration",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "4",
pages = "3065--3088",
month = aug,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00878-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Aug 5 16:28:15 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00878-0",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Kalaria:2024:ACA,
author = "Rudri Kalaria and A. S. M. Kayes and Wenny Rahayu and
Eric Pardede and Ahmad Salehi Shahraki",
title = "Adaptive context-aware access control for {IoT}
environments leveraging fog computing",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "4",
pages = "3089--3107",
month = aug,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00866-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Aug 5 16:28:15 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00866-4",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Rasori:2024:UAF,
author = "Marco Rasori and Andrea Saracino and Paolo Mori and
Marco Tiloca",
title = "Using the {ACE} framework to enforce access and usage
control with notifications of revoked access rights",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "5",
pages = "3109--3133",
month = oct,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00877-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Sep 16 15:22:32 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00877-1",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Arikan:2024:ASC,
author = "S{\"u}leyman Muhammed Arikan and Aynur Ko{\c{c}}ak and
Mustafa Alkan",
title = "Automating shareable cyber threat intelligence
production for closed source software vulnerabilities:
a deep learning based detection system",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "5",
pages = "3135--3151",
month = oct,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00882-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Sep 16 15:22:32 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00882-4",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Moen:2024:SBA,
author = "Ivar Moen and Aybars Oruc and Ahmed Amro and Vasileios
Gkioulos and Georgios Kavallieratos",
title = "Survey-based analysis of cybersecurity awareness of
{Turkish} seafarers",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "5",
pages = "3153--3178",
month = oct,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00884-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Sep 16 15:22:32 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00884-2",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Masmoudi:2024:TAP,
author = "Mariam Masmoudi and Ikram Amous and Corinne Amel
Zayani and Florence S{\`e}des",
title = "Trust attack prevention based on Spark-blockchain in
social {IoT}: a survey",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "5",
pages = "3179--3198",
month = oct,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00885-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Sep 16 15:22:32 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00885-1",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Ahmad:2024:IFC,
author = "Zubair Ahmad and Stefano Calzavara and Samuele Casarin
and Ben Stock",
title = "Information flow control for comparative privacy
analyses",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "5",
pages = "3199--3216",
month = oct,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00886-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Sep 16 15:22:32 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00886-0",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Gerasimou:2024:SPS,
author = "Stylianos Gerasimou and Konstantinos Limniotis",
title = "A study on privacy and security aspects of
personalised apps",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "5",
pages = "3217--3239",
month = oct,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00887-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Sep 16 15:22:32 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00887-z",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Wang:2024:FSL,
author = "Yahui Wang and Zhiyong Zhang and Kejing Zhao and Peng
Wang and Ruirui Wu",
title = "A few-shot learning based method for industrial
internet intrusion detection",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "5",
pages = "3241--3252",
month = oct,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00889-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Sep 16 15:22:32 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00889-x",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Ofte:2024:AOG,
author = "H{\aa}vard Jakobsen Ofte",
title = "The awareness of operators: a goal-directed task
analysis in {SOCs} for critical infrastructure",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "5",
pages = "3253--3282",
month = oct,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00872-6",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Sep 16 15:22:32 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00872-6",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Mawla:2024:MAM,
author = "Tanjila Mawla and Maanak Gupta and Safwa Ameer and
Ravi Sandhu",
title = "The {ACAC$_D$} model for mutable activity control and
chain of dependencies in smart and connected systems",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "5",
pages = "3283--3310",
month = oct,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00881-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Sep 16 15:22:32 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00881-5",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Guo:2024:CAS,
author = "Yuejun Guo and Seifeddine Bettaieb and Fran Casino",
title = "A comprehensive analysis on software vulnerability
detection datasets: trends, challenges, and road
ahead",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "5",
pages = "3311--3327",
month = oct,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00888-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Sep 16 15:22:32 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00888-y",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Wardana:2024:CID,
author = "Aulia Arif Wardana and Grzegorz Ko{\l}aczek and
Arkadiusz Warzy{\'n}ski and Parman Sukarno",
title = "Collaborative intrusion detection using weighted
ensemble averaging deep neural network for coordinated
attack detection in heterogeneous network",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "5",
pages = "3329--3349",
month = oct,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00891-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Sep 16 15:22:32 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00891-3",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Kuzuno:2024:MPE,
author = "Hiroki Kuzuno and Toshihiro Yamauchi",
title = "Mitigation of privilege escalation attack using kernel
data relocation mechanism",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "5",
pages = "3351--3367",
month = oct,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00890-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Sep 16 15:22:32 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00890-4",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Vasilellis:2024:PPI,
author = "Efstratios Vasilellis and Grigoris Gkionis and
Dimitris Gritzalis",
title = "Press play, install malware: a study of rhythm
game-based malware dropping",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "5",
pages = "3369--3391",
month = oct,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00893-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Sep 16 15:22:32 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00893-1",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Enomoto:2024:EMC,
author = "Shuhei Enomoto and Hiroki Kuzuno and Hiroshi Yamada
and Yoshiaki Shiraishi and Masakatu Morii",
title = "Early mitigation of {CPU}-optimized ransomware using
monitoring encryption instructions",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "5",
pages = "3393--3413",
month = oct,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00892-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Sep 16 15:22:32 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00892-2",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Sheidani:2024:PPT,
author = "Sorour Sheidani and Alireza Zarei",
title = "Privacy-preserving two-party computation of line
segment intersection",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "5",
pages = "3415--3432",
month = oct,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00895-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Sep 16 15:22:32 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00895-z",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Yogesh:2024:DLB,
author = "Yogesh and Lalit Mohan Goyal",
title = "Deep learning based network intrusion detection
system: a systematic literature review and future
scopes",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "6",
pages = "3433--3463",
month = dec,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00896-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Oct 14 14:32:49 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00896-y",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Yigit:2024:USF,
author = "Beyt{\"u}llah Yi{\u{g}}it and G{\"u}rkan G{\"u}r and
Bernhard Tellenbach and Fatih Alag{\"o}z",
title = "Unmasking {SDN} flow table saturation: fingerprinting,
attacks and defenses",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "6",
pages = "3465--3479",
month = dec,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00897-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Oct 14 14:32:49 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00897-x",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Bistarelli:2024:TBC,
author = "Stefano Bistarelli and Andrea Imparato and Francesco
Santini",
title = "A {TCP}-based covert channel with integrity check and
retransmission",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "6",
pages = "3481--3512",
month = dec,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00879-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Oct 14 14:32:49 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00879-z",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Pham:2024:DSC,
author = "Van-Hau Pham and Do Thi Thu Hien and Hien Do Hoang and
Phan The Duy",
title = "Defect-scanner: a comparative empirical study on
language model and deep learning approach for software
vulnerability detection",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "6",
pages = "3513--3526",
month = dec,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00901-4",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Oct 14 14:32:49 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00901-4",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Thankappan:2024:DCS,
author = "Manesh Thankappan and Helena Rif{\`a}-Pous and Carles
Garrigues",
title = "A distributed and cooperative signature-based
intrusion detection system framework for multi-channel
man-in-the-middle attacks against protected {Wi--Fi}
networks",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "6",
pages = "3527--3546",
month = dec,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00899-9",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Oct 14 14:32:49 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00899-9",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Cook:2024:BSA,
author = "Stephen Cook and Maryam Mehrnezhad and Ehsan Toreini",
title = "{Bluetooth} security analysis of general and intimate
health {IoT} devices and apps: the case of {FemTech}",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "6",
pages = "3547--3567",
month = dec,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00883-3",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Oct 14 14:32:49 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00883-3",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Alnaim:2024:SVN,
author = "Abdulrahman K. Alnaim",
title = "Securing {5G} virtual networks: a critical analysis of
{SDN}, {NFV}, and network slicing security",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "6",
pages = "3569--3589",
month = dec,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00900-5",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Oct 14 14:32:49 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00900-5",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Antunes:2024:GID,
author = "Pedro Antunes and Nuno Guimar{\~a}es",
title = "Guiding the implementation of data privacy with
microservices",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "6",
pages = "3591--3608",
month = dec,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00907-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Oct 14 14:32:49 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00907-y",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Nakai:2024:SMP,
author = "Takeshi Nakai and Kazumasa Shinagawa",
title = "Secure multi-party computation with
legally-enforceable fairness",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "6",
pages = "3609--3623",
month = dec,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00898-w",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Oct 14 14:32:49 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00898-w",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Merzouk:2024:ARD,
author = "Mohamed Amine Merzouk and Christopher Neal and
Jos{\'e}phine Delas and Reda Yaich and Nora
Boulahia-Cuppens and Fr{\'e}d{\'e}ric Cuppens",
title = "Adversarial robustness of deep reinforcement
learning-based intrusion detection",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "6",
pages = "3625--3651",
month = dec,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00903-2",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Oct 14 14:32:49 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00903-2",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Khan:2024:SIE,
author = "Safiullah Khan and Kashif Inayat and Fahad {Bin
Muslim} and Yasir Ali Shah and Muhammad Atif Ur Rehman
and Ayesha Khalid and Malik Imran and Akmalbek
Abdusalomov",
title = "Securing the {IoT} ecosystem: {ASIC}-based hardware
realization of {Ascon} lightweight cipher",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "6",
pages = "3653--3664",
month = dec,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00904-1",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Oct 14 14:32:49 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00904-1",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Abomhara:2024:EPP,
author = "Mohamed Abomhara and Livinus Obiora Nweke and Sule
Yildirim Yayilgan and Debora Comparin and Kristel
Teyras and St{\'e}phanie de Labriolle",
title = "Enhancing privacy protections in national
identification systems: an examination of stakeholders'
knowledge, attitudes, and practices of privacy by
design",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "6",
pages = "3665--3689",
month = dec,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00905-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Oct 14 14:32:49 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00905-0",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Jebrane:2024:EVL,
author = "Jihane Jebrane and Saiida Lazaar",
title = "An enhanced and verifiable lightweight authentication
protocol for securing the {Internet of Medical Things
(IoMT)} based on {CP--ABE} encryption",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "6",
pages = "3691--3710",
month = dec,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00906-z",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Oct 14 14:32:49 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00906-z",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Miranda-Pascual:2024:OPT,
author = "{\`A}lex Miranda-Pascual and Patricia Guerra-Balboa
and Javier Parra-Arnau and Jordi Forn{\'e} and Thorsten
Strufe",
title = "An overview of proposals towards the
privacy-preserving publication of trajectory data",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "6",
pages = "3711--3747",
month = dec,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00894-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Oct 14 14:32:49 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00894-0",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Callejo:2024:AUN,
author = "Patricia Callejo and Ignacio G{\'o}mez Fern{\'a}ndez
and Marcelo Bagnulo",
title = "``{Animation}'' {URL} in {NFT} marketplaces considered
harmful for privacy",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "6",
pages = "3749--3763",
month = dec,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00908-x",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Oct 14 14:32:49 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00908-x",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Bedoya:2024:EDP,
author = "Martin Bedoya and Sara Palacios and Daniel
D{\'\i}az-L{\'o}pez and Estefania Laverde and
Pantaleone Nespoli",
title = "Enhancing {DevSecOps} practice with {Large Language
Models} and {Security Chaos Engineering}",
journal = j-INT-J-INFO-SEC,
volume = "23",
number = "6",
pages = "3765--3788",
month = dec,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00909-w",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Mon Oct 14 14:32:49 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00909-w",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Garg:2025:CAM,
author = "Manika Garg and Anita Goel",
title = "A comprehensive approach for mitigating impersonation
in online assessment: integrity policy and random
authentication",
journal = j-INT-J-INFO-SEC,
volume = "24",
number = "1",
pages = "??--??",
month = feb,
year = "2025",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00931-y",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Oct 29 07:22:38 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00931-y",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
articleno = "1",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}
@Article{Patil:2025:NMA,
author = "Shriniwas Patil and Keyur Parmar",
title = "Novel mechanism for anonymous reporting and anonymous
rewarding using blockchain technology",
journal = j-INT-J-INFO-SEC,
volume = "24",
number = "1",
pages = "??--??",
month = feb,
year = "2025",
CODEN = "????",
DOI = "https://doi.org/10.1007/s10207-024-00913-0",
ISSN = "1615-5262 (print), 1615-5270 (electronic)",
ISSN-L = "1615-5262",
bibdate = "Tue Oct 29 07:22:38 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib",
URL = "https://link.springer.com/article/10.1007/s10207-024-00913-0",
acknowledgement = ack-nhfb,
ajournal = "Int. J. Info. Sci.",
articleno = "2",
fjournal = "International Journal of Information Security",
journal-URL = "https://link.springer.com/journal/10207",
}