Search dblp for Publications

export results for "toc:db/journals/jcs/jcs14.bht:"

 download as .bib file

@article{DBLP:journals/jcs/AimeurBO06,
  author       = {Esma A{\"{\i}}meur and
                  Gilles Brassard and
                  Flavien Serge Mani Onana},
  title        = {Blind Electronic Commerce},
  journal      = {J. Comput. Secur.},
  volume       = {14},
  number       = {6},
  pages        = {535--559},
  year         = {2006},
  url          = {https://doi.org/10.3233/jcs-2006-14603},
  doi          = {10.3233/JCS-2006-14603},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/AimeurBO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/Bhargav-SpantzelSB06,
  author       = {Abhilasha Bhargav{-}Spantzel and
                  Anna Cinzia Squicciarini and
                  Elisa Bertino},
  title        = {Establishing and protecting digital identity in federation systems},
  journal      = {J. Comput. Secur.},
  volume       = {14},
  number       = {3},
  pages        = {269--300},
  year         = {2006},
  url          = {https://doi.org/10.3233/jcs-2006-14303},
  doi          = {10.3233/JCS-2006-14303},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/Bhargav-SpantzelSB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/BlythT06,
  author       = {Andrew Blyth and
                  Paula Thomas},
  title        = {Performing real-time threat assessment of security incidents using
                  data fusion of {IDS} logs},
  journal      = {J. Comput. Secur.},
  volume       = {14},
  number       = {6},
  pages        = {513--534},
  year         = {2006},
  url          = {https://doi.org/10.3233/jcs-2006-14602},
  doi          = {10.3233/JCS-2006-14602},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/BlythT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/BraghinGS06,
  author       = {Chiara Braghin and
                  Daniele Gorla and
                  Vladimiro Sassone},
  title        = {Role-based access control for a distributed calculus},
  journal      = {J. Comput. Secur.},
  volume       = {14},
  number       = {2},
  pages        = {113--155},
  year         = {2006},
  url          = {https://doi.org/10.3233/jcs-2006-14202},
  doi          = {10.3233/JCS-2006-14202},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/BraghinGS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/CandebatG06,
  author       = {Thibault Candebat and
                  David Gray},
  title        = {Secure pseudonym management using mediated identity-based encryption},
  journal      = {J. Comput. Secur.},
  volume       = {14},
  number       = {3},
  pages        = {249--267},
  year         = {2006},
  url          = {https://doi.org/10.3233/jcs-2006-14302},
  doi          = {10.3233/JCS-2006-14302},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/CandebatG06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/CimatoCD06,
  author       = {Stelvio Cimato and
                  Antonella Cresti and
                  Paolo D'Arco},
  title        = {A unified model for unconditionally secure key distribution},
  journal      = {J. Comput. Secur.},
  volume       = {14},
  number       = {1},
  pages        = {45--64},
  year         = {2006},
  url          = {https://doi.org/10.3233/jcs-2006-14102},
  doi          = {10.3233/JCS-2006-14102},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/CimatoCD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/CortierDL06,
  author       = {V{\'{e}}ronique Cortier and
                  St{\'{e}}phanie Delaune and
                  Pascal Lafourcade},
  title        = {A survey of algebraic properties used in cryptographic protocols},
  journal      = {J. Comput. Secur.},
  volume       = {14},
  number       = {1},
  pages        = {1--43},
  year         = {2006},
  url          = {https://doi.org/10.3233/jcs-2006-14101},
  doi          = {10.3233/JCS-2006-14101},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/CortierDL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/EamaniS06,
  author       = {Arun K. Eamani and
                  A. Prasad Sistla},
  title        = {Language based policy analysis in a {SPKI} Trust Management System},
  journal      = {J. Comput. Secur.},
  volume       = {14},
  number       = {4},
  pages        = {327--357},
  year         = {2006},
  url          = {https://doi.org/10.3233/jcs-2006-14402},
  doi          = {10.3233/JCS-2006-14402},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/EamaniS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/Focardi06,
  author       = {Riccardo Focardi},
  title        = {Preface},
  journal      = {J. Comput. Secur.},
  volume       = {14},
  number       = {2},
  pages        = {111},
  year         = {2006},
  url          = {https://doi.org/10.3233/jcs-2006-14201},
  doi          = {10.3233/JCS-2006-14201},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/Focardi06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/FocardiR06,
  author       = {Riccardo Focardi and
                  Sabina Rossi},
  title        = {Information flow security in dynamic contexts},
  journal      = {J. Comput. Secur.},
  volume       = {14},
  number       = {1},
  pages        = {65--110},
  year         = {2006},
  url          = {https://doi.org/10.3233/jcs-2006-14103},
  doi          = {10.3233/JCS-2006-14103},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/FocardiR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/Goto06,
  author       = {Atsuhiro Goto},
  title        = {Preface},
  journal      = {J. Comput. Secur.},
  volume       = {14},
  number       = {3},
  pages        = {247},
  year         = {2006},
  url          = {https://doi.org/10.3233/jcs-2006-14301},
  doi          = {10.3233/JCS-2006-14301},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/Goto06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/LippertKWB06,
  author       = {Marcus Lippert and
                  Vangelis Karatsiolis and
                  Alexander Wiesmaier and
                  Johannes Buchmann},
  title        = {Life-cycle management of {X.509} certificates based on {LDAP} directories},
  journal      = {J. Comput. Secur.},
  volume       = {14},
  number       = {5},
  pages        = {419--439},
  year         = {2006},
  url          = {https://doi.org/10.3233/jcs-2006-14503},
  doi          = {10.3233/JCS-2006-14503},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/LippertKWB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/Lopez06,
  author       = {Javier L{\'{o}}pez},
  title        = {Unleashing public-key cryptography in wireless sensor networks},
  journal      = {J. Comput. Secur.},
  volume       = {14},
  number       = {5},
  pages        = {469--482},
  year         = {2006},
  url          = {https://doi.org/10.3233/jcs-2006-14505},
  doi          = {10.3233/JCS-2006-14505},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/Lopez06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/McDanielP06,
  author       = {Patrick D. McDaniel and
                  Atul Prakash},
  title        = {Enforcing provisioning and authorization policy in the Antigone system},
  journal      = {J. Comput. Secur.},
  volume       = {14},
  number       = {6},
  pages        = {483--511},
  year         = {2006},
  url          = {https://doi.org/10.3233/jcs-2006-14601},
  doi          = {10.3233/JCS-2006-14601},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcs/McDanielP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/MyersSZ06,
  author       = {Andrew C. Myers and
                  Andrei Sabelfeld and
                  Steve Zdancewic},
  title        = {Enforcing Robust Declassification and Qualified Robustness},
  journal      = {J. Comput. Secur.},
  volume       = {14},
  number       = {2},
  pages        = {157--196},
  year         = {2006},
  url          = {https://doi.org/10.3233/jcs-2006-14203},
  doi          = {10.3233/JCS-2006-14203},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/MyersSZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/NormanS06,
  author       = {Gethin Norman and
                  Vitaly Shmatikov},
  title        = {Analysis of probabilistic contract signing},
  journal      = {J. Comput. Secur.},
  volume       = {14},
  number       = {6},
  pages        = {561--589},
  year         = {2006},
  url          = {https://doi.org/10.3233/jcs-2006-14604},
  doi          = {10.3233/JCS-2006-14604},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/NormanS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/PereiraQ06,
  author       = {Olivier Pereira and
                  Jean{-}Jacques Quisquater},
  title        = {On the impossibility of building secure Cliques-type authenticated
                  group key agreement protocols},
  journal      = {J. Comput. Secur.},
  volume       = {14},
  number       = {2},
  pages        = {197--246},
  year         = {2006},
  url          = {https://doi.org/10.3233/jcs-2006-14204},
  doi          = {10.3233/JCS-2006-14204},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/PereiraQ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/Price06,
  author       = {Geraint Price},
  title        = {Public Key Infrastructures: {A} research agenda},
  journal      = {J. Comput. Secur.},
  volume       = {14},
  number       = {5},
  pages        = {391--417},
  year         = {2006},
  url          = {https://doi.org/10.3233/jcs-2006-14502},
  doi          = {10.3233/JCS-2006-14502},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/Price06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/Smith06,
  author       = {Geoffrey Smith},
  title        = {Improved typings for probabilistic noninterference in a multi-threaded
                  language},
  journal      = {J. Comput. Secur.},
  volume       = {14},
  number       = {6},
  pages        = {591--623},
  year         = {2006},
  url          = {https://doi.org/10.3233/jcs-2006-14605},
  doi          = {10.3233/JCS-2006-14605},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/Smith06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/Wang06,
  author       = {Guilin Wang},
  title        = {Generic non-repudiation protocols supporting transparent off-line
                  {TTP}},
  journal      = {J. Comput. Secur.},
  volume       = {14},
  number       = {5},
  pages        = {441--467},
  year         = {2006},
  url          = {https://doi.org/10.3233/jcs-2006-14504},
  doi          = {10.3233/JCS-2006-14504},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/Wang06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/XiaVWGK06,
  author       = {Jianhong Xia and
                  Sarma Vangala and
                  Jiang Wu and
                  Lixin Gao and
                  Kevin A. Kwiat},
  title        = {Effective worm detection for various scan techniques},
  journal      = {J. Comput. Secur.},
  volume       = {14},
  number       = {4},
  pages        = {359--387},
  year         = {2006},
  url          = {https://doi.org/10.3233/jcs-2006-14403},
  doi          = {10.3233/JCS-2006-14403},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/XiaVWGK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/ZhouK06,
  author       = {Jianying Zhou and
                  Meng{-}Chow Kang},
  title        = {Preface},
  journal      = {J. Comput. Secur.},
  volume       = {14},
  number       = {5},
  pages        = {389--390},
  year         = {2006},
  url          = {https://doi.org/10.3233/jcs-2006-14501},
  doi          = {10.3233/JCS-2006-14501},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/ZhouK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/ZhuSXJ06,
  author       = {Sencun Zhu and
                  Sanjeev Setia and
                  Shouhuai Xu and
                  Sushil Jajodia},
  title        = {{GKMPAN:} An Efficient Group Rekeying Scheme for Secure Multicast
                  in Ad-Hoc Networks},
  journal      = {J. Comput. Secur.},
  volume       = {14},
  number       = {4},
  pages        = {301--325},
  year         = {2006},
  url          = {https://doi.org/10.3233/jcs-2006-14401},
  doi          = {10.3233/JCS-2006-14401},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/ZhuSXJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics