Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/tissec/tissec12.bht:"
@article{DBLP:journals/tissec/AtallahBFF09, author = {Mikhail J. Atallah and Marina Blanton and Nelly Fazio and Keith B. Frikken}, title = {Dynamic and Efficient Key Management for Access Hierarchies}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {12}, number = {3}, pages = {18:1--18:43}, year = {2009}, url = {https://doi.org/10.1145/1455526.1455531}, doi = {10.1145/1455526.1455531}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/AtallahBFF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BethencourtSW09, author = {John Bethencourt and Dawn Xiaodong Song and Brent Waters}, title = {New Techniques for Private Stream Searching}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {12}, number = {3}, pages = {16:1--16:32}, year = {2009}, url = {https://doi.org/10.1145/1455526.1455529}, doi = {10.1145/1455526.1455529}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/BethencourtSW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BurmesterLMT09, author = {Mike Burmester and Tri Van Le and Breno de Medeiros and Gene Tsudik}, title = {Universally Composable {RFID} Identification and Authentication Protocols}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {12}, number = {4}, pages = {21:1--21:33}, year = {2009}, url = {https://doi.org/10.1145/1513601.1513603}, doi = {10.1145/1513601.1513603}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/BurmesterLMT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/CabukBS09, author = {Serdar Cabuk and Carla E. Brodley and Clay Shields}, title = {{IP} Covert Channel Detection}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {12}, number = {4}, pages = {22:1--22:29}, year = {2009}, url = {https://doi.org/10.1145/1513601.1513604}, doi = {10.1145/1513601.1513604}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/CabukBS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/CrosbyWR09, author = {Scott A. Crosby and Dan S. Wallach and Rudolf H. Riedi}, title = {Opportunities and Limits of Remote Timing Attacks}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {12}, number = {3}, pages = {17:1--17:29}, year = {2009}, url = {https://doi.org/10.1145/1455526.1455530}, doi = {10.1145/1455526.1455530}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/CrosbyWR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/LiWT09, author = {Ninghui Li and Qihua Wang and Mahesh V. Tripunitara}, title = {Resiliency Policies in Access Control}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {12}, number = {4}, pages = {20:1--20:34}, year = {2009}, url = {https://doi.org/10.1145/1513601.1513602}, doi = {10.1145/1513601.1513602}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/LiWT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/LiangSVS09, author = {Zhenkai Liang and Weiqing Sun and V. N. Venkatakrishnan and R. Sekar}, title = {Alcatraz: An Isolated Environment for Experimenting with Untrusted Software}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {12}, number = {3}, pages = {14:1--14:37}, year = {2009}, url = {https://doi.org/10.1145/1455526.1455527}, doi = {10.1145/1455526.1455527}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/LiangSVS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/LigattiBW09, author = {Jay Ligatti and Lujo Bauer and David Walker}, title = {Run-Time Enforcement of Nonsafety Policies}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {12}, number = {3}, pages = {19:1--19:41}, year = {2009}, url = {https://doi.org/10.1145/1455526.1455532}, doi = {10.1145/1455526.1455532}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/LigattiBW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/YaoT09, author = {Danfeng Yao and Roberto Tamassia}, title = {Compact and Anonymous Role-Based Authorization Chain}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {12}, number = {3}, pages = {15:1--15:27}, year = {2009}, url = {https://doi.org/10.1145/1455526.1455528}, doi = {10.1145/1455526.1455528}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/YaoT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/AntonatosALA08, author = {Spyros Antonatos and Periklis Akritidis and Vinh The Lam and Kostas G. Anagnostakis}, title = {Puppetnets: Misusing Web Browsers as a Distributed Attack Infrastructure}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {12}, number = {2}, pages = {12:1--12:38}, year = {2008}, url = {https://doi.org/10.1145/1455518.1477941}, doi = {10.1145/1455518.1477941}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/AntonatosALA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BarkerSW08, author = {Steve Barker and Marek J. Sergot and Duminda Wijesekera}, title = {Status-Based Access Control}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {12}, number = {1}, pages = {1:1--1:47}, year = {2008}, url = {https://doi.org/10.1145/1410234.1410235}, doi = {10.1145/1410234.1410235}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/BarkerSW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BoldyrevaGOY08, author = {Alexandra Boldyreva and Craig Gentry and Adam O'Neill and Dae Hyun Yum}, title = {New Multiparty Signature Schemes for Network Routing Applications}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {12}, number = {1}, pages = {3:1--3:39}, year = {2008}, url = {https://doi.org/10.1145/1410234.1410237}, doi = {10.1145/1410234.1410237}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/BoldyrevaGOY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/CadarGPDE08, author = {Cristian Cadar and Vijay Ganesh and Peter M. Pawlowski and David L. Dill and Dawson R. Engler}, title = {{EXE:} Automatically Generating Inputs of Death}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {12}, number = {2}, pages = {10:1--10:38}, year = {2008}, url = {https://doi.org/10.1145/1455518.1455522}, doi = {10.1145/1455518.1455522}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/CadarGPDE08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/GolleMM08, author = {Philippe Golle and Frank McSherry and Ilya Mironov}, title = {Data Collection with Self-Enforcing Privacy}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {12}, number = {2}, pages = {9:1--9:24}, year = {2008}, url = {https://doi.org/10.1145/1455518.1477940}, doi = {10.1145/1455518.1477940}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/GolleMM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/HalpernO08, author = {Joseph Y. Halpern and Kevin R. O'Neill}, title = {Secrecy in Multiagent Systems}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {12}, number = {1}, pages = {5:1--5:47}, year = {2008}, url = {https://doi.org/10.1145/1410234.1410239}, doi = {10.1145/1410234.1410239}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/HalpernO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/LeeW08, author = {Adam J. Lee and Marianne Winslett}, title = {Enforcing Safety and Consistency Constraints in Policy-Based Authorization Systems}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {12}, number = {2}, pages = {8:1--8:33}, year = {2008}, url = {https://doi.org/10.1145/1455518.1455520}, doi = {10.1145/1455518.1455520}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/LeeW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/WangD08, author = {Wei Wang and Thomas E. Daniels}, title = {A Graph Based Approach Toward Network Forensics Analysis}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {12}, number = {1}, pages = {4:1--4:33}, year = {2008}, url = {https://doi.org/10.1145/1410234.1410238}, doi = {10.1145/1410234.1410238}, timestamp = {Wed, 29 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/WangD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/WangLCXRK08, author = {XiaoFeng Wang and Zhuowei Li and Jong Youl Choi and Jun Xu and Michael K. Reiter and Chongkyung Kil}, title = {Fast and Black-box Exploit Detection and Signature Generation for Commodity Software}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {12}, number = {2}, pages = {11:1--11:35}, year = {2008}, url = {https://doi.org/10.1145/1455518.1455523}, doi = {10.1145/1455518.1455523}, timestamp = {Wed, 02 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/WangLCXRK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/WrightV08, author = {Rebecca N. Wright and Sabrina De Capitani di Vimercati}, title = {Guest Editorial: Special Issue on Computer and Communications Security}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {12}, number = {2}, pages = {7:1--7:2}, year = {2008}, url = {https://doi.org/10.1145/1455518.1455519}, doi = {10.1145/1455518.1455519}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/WrightV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/XieYW08, author = {Mengjun Xie and Heng Yin and Haining Wang}, title = {Thwarting E-mail Spam Laundering}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {12}, number = {2}, pages = {13:1--13:32}, year = {2008}, url = {https://doi.org/10.1145/1455518.1455525}, doi = {10.1145/1455518.1455525}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/XieYW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/XuC08, author = {Shouhuai Xu and Srdjan Capkun}, title = {Distributed and Secure Bootstrapping of Mobile Ad Hoc Networks: Framework and Constructions}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {12}, number = {1}, pages = {2:1--2:37}, year = {2008}, url = {https://doi.org/10.1145/1410234.1410236}, doi = {10.1145/1410234.1410236}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/XuC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/YaoFAT08, author = {Danfeng Yao and Keith B. Frikken and Mikhail J. Atallah and Roberto Tamassia}, title = {Private Information: To Reveal or not to Reveal}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {12}, number = {1}, pages = {6:1--6:27}, year = {2008}, url = {https://doi.org/10.1145/1410234.1410240}, doi = {10.1145/1410234.1410240}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/YaoFAT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.