


default search action
Journal of Computer Security, Volume 18
Volume 18, Number 1, 2010
- Mário Campolargo:

Foreword. - Jan Camenisch, Javier López

, Fabio Massacci
, Massimo Ciscato, Thomas Skordas:
JCS special issue on EU-funded ICT research on Trust and Security. 1-5 - André Bergholz, Jan De Beer, Sebastian Glahn, Marie-Francine Moens, Gerhard Paaß, Siehyun Strobel:

New filtering approaches for phishing email. 7-35 - Mads Dam, Bart Jacobs

, Andreas Lundblad, Frank Piessens:
Provably correct inline monitoring for multithreaded Java-like programs. 37-59 - Louis Salvail, Momtchil Peev

, Eleni Diamanti, Romain Alléaume
, Norbert Lütkenhaus, Thomas Länger:
Security of trusted repeater quantum key distribution networks. 61-87 - Serdar Cabuk, Chris I. Dalton, Konrad Eriksson, Dirk Kuhlmann, HariGovind V. Ramasamy, Gianluca Ramunno, Ahmad-Reza Sadeghi, Matthias Schunter, Christian Stüble:

Towards automated security policy enforcement in multi-tenant virtual data centers. 89-121 - Claudio A. Ardagna

, Jan Camenisch, Markulf Kohlweiss
, Ronald Leenes, Gregory Neven, Bart Priem, Pierangela Samarati
, Dieter Sommer, Mario Verdicchio:
Exploiting cryptography for privacy-enhanced access control: A result of the PRIME Project. 123-160 - Savvas Argyropoulos, Dimitrios Tzovaras

, Dimosthenis Ioannidis
, Ioannis G. Damousis, Michael G. Strintzis, Martin Braun, Serge Boverie:
Biometric template protection in multimodal authentication systems based on error correcting codes. 161-185
Volume 18, Number 2, 2010
- Sushil Jajodia

, Jonathan K. Millen:
Editorial. 187 - Daniele Gorla

, Catuscia Palamidessi
:
Preface. 189 - Pasquale Malacaria:

Risk assessment of security threats for looping constructs. 191-228 - Chiara Bodei

, Linda Brodo, Pierpaolo Degano, Han Gao:
Detecting and preventing type flaws at static time. 229-264 - Sardaouna Hamadou, John Mullins:

Calibrating the power of schedulers for probabilistic polynomial-time calculus. 265-316 - Stéphanie Delaune, Steve Kremer

, Mark Dermot Ryan
:
Symbolic bisimulation for the applied pi calculus. 317-377
Volume 18, Number 3, 2010
- Dimitrios Lekkas, Dimitris Gritzalis:

e-Passports as a means towards a Globally Interoperable Public Key Infrastructure. 379-396 - Massimiliano Pala, Sean W. Smith:

Finding the PKI needles in the Internet haystack. 397-420 - Jiguo Li, Xinyi Huang, Yi Mu, Willy Susilo

, Qianhong Wu:
Constructions of certificate-based signature secure against key replacement attacks. 421-449 - Chung Ki Li, Guomin Yang

, Duncan S. Wong, Xiaotie Deng
, Sherman S. M. Chow
:
An efficient signcryption scheme with key privacy and its extension to ring signcryption. 451-473 - David W. Chadwick

, Sean Anthony, Rune Bjerk:
Instant certificate revocation and publication using WebDAV. 475-496
Volume 18, Number 4, 2010
- Atsuhiro Goto:

Preface. 497 - Samir Saklikar, Subir Saha:

Identity Federation for VoIP systems. 499-540 - Adrian Baldwin, Marco Casassa Mont

, Yolanta Beres, Simon Shiu:
Assurance for federated identity management. 541-572 - Sebastian Mödersheim

, Luca Viganò
, David A. Basin:
Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols. 575-618 - Moritz Y. Becker, Cédric Fournet, Andrew D. Gordon:

SecPAL: Design and semantics of a decentralized authorization language. 619-665
Volume 18, Number 5, 2010
- James R. Conrad, Jim Alves-Foss, Sauchi Stephen Lee:

Analyzing uncertainty in TG protection graphs with TG/MC. 667-699 - Riccardo Pucella, Fred B. Schneider:

Independence from obfuscation: A semantic framework for diversity. 701-749 - Roberto Giacobazzi, Isabella Mastroeni

:
Adjoining classified and unclassified information by abstract interpretation. 751-797 - Matthew Pirretti, Patrick Traynor, Patrick D. McDaniel, Brent Waters:

Secure attribute-based systems. 799-837 - Roberto Di Pietro

, Luigi V. Mancini
, Alessandro Mei
:
Hierarchies of keys in secure multicast communications. 839-860 - Nenad Jovanovic, Christopher Kruegel, Engin Kirda:

Static analysis for detecting taint-style vulnerabilities in web applications. 861-907 - Mathieu Baudet, Bogdan Warinschi, Martín Abadi:

Guessing attacks and the computational soundness of static equivalence. 909-968
Volume 18, Number 6, 2010
- Riccardo Focardi

:
Editorial. 969 - Frédéric Besson, Guillaume Dufay, Thomas P. Jensen, David Pichardie:

Verifying resource access control on mobile interactive devices. 971-998 - Steve Kremer

, Laurent Mazaré:
Computationally sound analysis of protocols using bilinear pairings. 999-1033 - Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell

:
Inductive trace properties for computational security. 1035-1073 - Andrei Sabelfeld:

Preface. 1075 - Michael Backes, Dominique Unruh

:
Computational soundness of symbolic zero-knowledge proofs. 1077-1155 - Michael R. Clarkson, Fred B. Schneider:

Hyperproperties. 1157-1210 - Stéphanie Delaune, Steve Kremer

, Graham Steel:
Formal security analysis of PKCS#11 and proprietary extensions. 1211-1245 - Jean Goubault-Larrecq:

Finite models for formal security proofs. 1247-1299

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














