Journal of Internet Services and Information Security, Volume 2 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches



SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Volume 2, Numbers 1/2, February 2012

Marc Domingo-Prieto, Joan Arnedo-Moreno, Jordi Herrera-Joancomartí, Josep Prieto-Blázquez:
Towards secure mobile P2P applications using JXME. 1-21

Karl Andersson:
Interworking Techniques and Architectures for Heterogeneous Wireless Networks. 22-48

Jianfeng Wang, Xiaofeng Chen, Hua Ma, Qiang Tang
, Jin Li, Hui Zhu:
A Verifiable Fuzzy Keyword Search Scheme Over Encrypted Data. 49-58

Charles J. Zinsmeyer, Turgay Korkmaz:
A Comparative Review of Connectivity-Based Wireless Sensor Localization Techniques. 59-72

Manuel Mazzara, Nicola Dragoni, Mu Zhou:
Implementing Workflow Reconfiguration in WS-BPEL. 73-92

Atsuko Miyaji, Mohammad Shahriar Rahman:
Private Two-Party Set Intersection Protocol in Rational Model. 93-104

João Carneiro, João Laranjeira, Goreti Marreiros, Carlos Filipe Freitas, Ricardo Santos:
A Context-aware Model to Support Ubiquitous Group Decision Making. 105-118

Sang Min Lee, Dong Seong Kim, Jong Sou Park:
A Survey and Taxonomy of Lightweight Intrusion Detection Systems. 119-131
Volume 2, Numbers 3/4, November 2012

Kangbin Yim, Yoshiaki Hori:
Information Leakage Prevention in Emerging Technologies (MIST 2012 Volume 2). 1-2

Alessandro Armando, Gabriele Costa, Alessio Merlo, Luca Verderame:
Securing the "Bring Your Own Device" Policy. 3-17

Kazuki Chiba, Yoshiaki Hori, Kouichi Sakurai:
Detecting Information Leakage via a HTTP Request Based on the Edit Distance. 18-28

Yeongung Park, Chanhee Lee, Jonghwa Kim, Seong-je Cho, Jongmoo Choi:
An Android Security Extension to Protect Personal Information against Illegal Accesses and Privilege Escalation Attacks. 29-42

Ho-Seok Kang, Sung-Ryul Kim:
Design and Experiments of small DDoS Defense System using Traffic Deflecting in Autonomous System. 43-53

Chang Choi, Junho Choi, Byeongkyu Ko, Kunseok Oh, Pankoo Kim:
A Design of Onto-ACM(Ontology based Access Control Model) in Cloud Computing Environments. 54-64

Taerim Lee, Hun Kim, Kyung Hyune Rhee, Sang-Uk Shin:
A Study on Design and Implementation of E-Discovery Service based on Cloud Computing. 65-76

S. Sharmila Deva Selvi, S. Sree Vivek, Vivek Krishna Pradhan, C. Pandu Rangan:
Efficient Certificateless Online/Offline Signature. 77-92

Jeong-Soo Park, KiSeok Bae, YongJe Choi, Dooho Choi, JaeCheol Ha:
A Fault-Resistant AES Implementation Using Differential Characteristic of Input and Output. 93-109

Zhiwei Wang, Guozi Sun, Danwei Chen:
Short signature from factoring assumption in the standard model. 110-117

Kunwar Singh, C. Pandurangan, A. K. Banerjee:
Lattice Forward-Secure Identity Based Encryption Scheme. 118-128

Marek R. Ogiela, Lidia Ogiela, Urszula Ogiela:
Strategic Information Splitting Using Biometric Patterns. 129-133

Sungkwan Kim, Junyoung Park, Kyungroul Lee, Ilsun You, Kangbin Yim:
A Brief Survey on Rootkit Techniques in Malicious Codes. 134-147

Marek R. Ogiela, Lidia Ogiela:
Personal Identification Based on Cognitive Analysis of Selected Medical Visualization. 148-153

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:







