default search action
Journal of Computer Security, Volume 19
Volume 19, Number 1, 2011
- Boris Köpf, David A. Basin:
Automatically deriving information-theoretic bounds for adaptive side-channel attacks. 1-31 - Lawrence A. Gordon, Martin P. Loeb, Lei Zhou:
The impact of information security breaches: Has there been a downward shift in costs? 33-56 - David DeAngelis, K. Suzanne Barber:
Security applications of trust in multi-agent systems. 57-99 - Deepak D'Souza, Raveendra Holla, K. R. Raghavendra, Barbara Sprick:
Model-checking trace-based information flow properties. 101-138 - Long Hoang Nguyen, A. W. Roscoe:
Authentication protocols based on low-bandwidth unspoofable channels: A comparative survey. 139-201 - Anshuman Sinha:
A survey of system security in contactless electronic passports. 203-226
Volume 19, Number 2, 2011
- Yingjiu Li, Jianying Zhou:
Guest editors' preface. 227-228 - Basel Alomair, Loukas Lazos, Radha Poovendran:
Securing low-cost RFID systems: An unconditionally secure approach. 229-257 - Gerhard P. Hancke:
Practical eavesdropping and skimming attacks on high-frequency RFID tokens. 259-288 - Gildas Avoine, Muhammed Ali Bingöl, Süleyman Kardas, Cédric Lauradoux, Benjamin Martin:
A framework for analyzing RFID distance bounding protocols. 289-317 - Ching Yu Ng, Willy Susilo, Yi Mu, Reihaneh Safavi-Naini:
Practical RFID ownership transfer scheme. 319-341 - Tzipora Halevi, Nitesh Saxena, Shai Halevi:
Tree-based HB protocols for privacy-preserving authentication of RFID tags. 343-363
Volume 19, Number 3, 2011
- Vijay Atluri:
Preface. 365 - Changyu Dong, Giovanni Russello, Naranker Dulay:
Shared and searchable encrypted data for untrusted servers. 367-397 - Manachai Toahchoodee, Indrakshi Ray:
On the formalization and analysis of a spatio-temporal role-based access control model. 399-452 - Xiaoyun He, Haibing Lu, Jaideep Vaidya, Nabil R. Adam:
Secure construction and publication of contingency tables from distributed data. 453-484 - Jaideep Vaidya, Ehud Gudes:
Introduction. 485-486 - Joachim Biskup, Christian Gogolin, Jens Seiler, Torben Weibert:
Inference-proof view update transactions with forwarded refreshments. 487-529 - Valentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati:
Selective data outsourcing for enforcing privacy. 531-566 - Simon N. Foley, William M. Fitzgerald:
Management of security policy configuration using a Semantic Threat Graph approach. 567-605 - Heechang Shin, Vijayalakshmi Atluri, June-Suh Cho:
Efficiently enforcing spatiotemporal access control under uncertain location information. 607-637
Volume 19, Number 4, 2011
- Konrad Rieck, Philipp Trinius, Carsten Willems, Thorsten Holz:
Automatic analysis of malware behavior using machine learning. 639-668 - Paul C. van Oorschot, Julie Thorpe:
Exploiting predictability in click-based graphical passwords. 669-702 - Mohammad Mannan, Paul C. van Oorschot:
Leveraging personal devices for stronger password authentication from untrusted computers. 703-750 - Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati:
Authorization enforcement in distributed query evaluation. 751-794
Volume 19, Number 5, 2011
- Heechang Shin, Jaideep Vaidya, Vijayalakshmi Atluri:
A profile anonymization model for location-based services. 795-833 - Dimitris Gritzalis, Giannis F. Marias, Yacine Rebahi, Yannis Soupionis, Sven Ehlert:
SPIDER: A platform for managing SIP-based Spam over Internet Telephony (SPIT). 835-867 - Francis Hsu, Hao Chen, Sridhar Machiraju:
WebCallerID: Leveraging cellular networks for Web authentication. 869-893 - Reza Curtmola, Juan A. Garay, Seny Kamara, Rafail Ostrovsky:
Searchable symmetric encryption: Improved definitions and efficient constructions. 895-934 - Rinku Dewri, Indrajit Ray, Indrakshi Ray, L. Darrell Whitley:
Exploring privacy versus data quality trade-offs in anonymization techniques using multi-objective optimization. 935-974 - Allaa Kamil, Gavin Lowe:
Analysing TLS in the strand spaces model. 975-1025
Volume 19, Number 6, 2011
- Dimitris Gritzalis:
Guest Editor's Preface. 1027-1028 - Hirotoshi Yasuoka, Tachio Terauchi:
On bounding problems of quantitative information flow. 1029-1082 - Chao Zhang, Wei Zou, Tielei Wang, Yu Chen, Tao Wei:
Using type analysis in compiler to mitigate integer-overflow-to-buffer-overflow threat. 1083-1107 - Robert H. Deng, Yingjiu Li, Moti Yung, Yunlei Zhao:
A zero-knowledge based framework for RFID privacy. 1109-1146 - Rishab Nithyanand, Gene Tsudik, Ersin Uzun:
User-aided reader revocation in PKI-based RFID systems. 1147-1172
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.