default search action
Journal of Computer Security, Volume 13
Volume 13, Number 1, 2005
- Stefano Bistarelli, Iliano Cervesato, Gabriele Lenzini, Fabio Martinelli:
Relating multiset rewriting and process algebras for security protocol analysis. 3-47 - Chiara Bodei, Pierpaolo Degano, Corrado Priami:
Checking security policies through an enhanced Control Flow Analysis. 49-85 - Michele Bugliesi, Sabina Rossi:
Non-interference proof techniques for the analysis of cryptographic protocols. 87-113 - Joshua D. Guttman, Amy L. Herzog, John D. Ramsdell, Clement W. Skorupka:
Verifying information flow goals in Security-Enhanced Linux. 115-134 - Ramaswamy Ramanujam, S. P. Suresh:
Decidability of context-explicit security protocols. 135-165 - Vitaly Shmatikov, Carolyn L. Talcott:
Reputation-based trust management. 167-190
Volume 13, Number 2, 2005
- Elisa Bertino, Elena Ferrari, Giovanni Mella:
An approach to cooperative updates of XML documents in distributed systems. 191-242 - Andre Zuquete:
An efficient high quality random number generator for multi-programmed systems. 243-263 - Iliano Cervesato, Nancy A. Durgin, Patrick Lincoln:
A comparison between strand spaces and multiset rewriting for security protocol analysis. 265-316 - James Heather, Steve A. Schneider:
A decision procedure for the existence of a rank function. 317-344
Volume 13, Number 3, 2005
- Riccardo Focardi:
Guest editor's preface. 345- - Chiara Bodei, Mikael Buchholtz, Pierpaolo Degano, Flemming Nielson, Hanne Riis Nielson:
Static validation of security protocols. 347-390 - Annalisa Bossi, Damiano Macedonio, Carla Piazza, Sabina Rossi:
Information flow in secure contexts. 391-422 - Anupam Datta, Ante Derek, John C. Mitchell, Dusko Pavlovic:
A derivation system and compositional logic for security protocols. 423-482 - Joseph Y. Halpern, Kevin R. O'Neill:
Anonymity and information hiding in multiagent systems. 483-512 - Jonathan K. Millen, Vitaly Shmatikov:
Symbolic protocol analysis with an Abelian group operator or Diffie-Hellman exponentiation. 515-564 - Bogdan Warinschi:
A computational analysis of the Needham-Schroeder-(Lowe) protocol. 565-591
Volume 13, Number 4, 2005
- Jaideep Vaidya, Chris Clifton:
Secure set intersection cardinality with application to association rule mining. 593-622 - Meng Yu, Peng Liu, Wanyu Zang:
Specifying and using intrusion masking models to process distributed operations. 623-658 - Salvatore J. Stolfo, Frank Apap, Eleazar Eskin, Katherine A. Heller, Shlomo Hershkop, Andrew Honig, Krysta M. Svore:
A comparative evaluation of two algorithms for Windows Registry Anomaly Detection. 659-693
- Jonathan K. Millen, Vitaly Shmatikov:
Symbolic protocol analysis with an Abelian group operator or Diffie-Hellman exponentiation. 695-
Volume 13, Number 5, 2005
- Giampaolo Bella, Peter Y. A. Ryan:
Guest Editors' preface. 697- - Stefano Bistarelli, Simon N. Foley, Barry O'Sullivan:
A soft constraint-based approach to the cascade vulnerability problem. 699-720 - Christian S. Collberg, Tapas Ranjan Sahoo:
Software watermarking in the frequency domain: Implementation, analysis, and attacks. 721-755 - Aleksandra Nenadic, Ning Zhang, Qi Shi:
RSA-based Verifiable and Recoverable Encryption of Signatures and its application in certified e-mail delivery. 757-777 - Christos Siaterlis, Vasilis Maglaris:
One step ahead to multisensor data fusion for DDoS detection. 779-806
Volume 13, Number 6, 2005
- Jarmo Mölsä:
Mitigating denial of service attacks: A tutorial. 807-837 - Rob Sherwood, Bobby Bhattacharjee, Aravind Srinivasan:
P5: A protocol for scalable anonymous communication. 839-876 - Antonio Pescapè, Giorgio Ventre:
Experimental analysis of attacks against intradomain routing protocols. 877-903
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.