default search action
ACM Transactions on Information and System Security (TISSEC), Volume 13
Volume 13, Number 1, October 2009
- Catherine Meadows:
Introduction to ACM TISSEC special issue on CCS 2005. 1:1-1:2 - Jiangtao Li, Ninghui Li, William H. Winsborough:
Automated trust negotiation using cryptographic credentials. 2:1-2:35 - Li Zhuang, Feng Zhou, J. D. Tygar:
Keyboard acoustic emanations revisited. 3:1-3:26 - Martín Abadi, Mihai Budiu, Úlfar Erlingsson, Jay Ligatti:
Control-flow integrity principles, implementations, and applications. 4:1-4:40 - Sandro Etalle, William H. Winsborough:
Maintaining control while delegating trust: Integrity constraints in trust management. 5:1-5:27 - Barbara Carminati, Elena Ferrari, Andrea Perego:
Enforcing access control in Web-based social networks. 6:1-6:38 - Ari Juels, Stephen A. Weis:
Defining strong privacy for RFID. 7:1-7:23 - Ye Zhu, Riccardo Bettati:
Compromising anonymous communication systems using blind source separation. 8:1-8:31 - Yingpeng Sang, Hong Shen:
Efficient and secure protocols for privacy-preserving set operations. 9:1-9:35 - Leo Dorrendorf, Zvi Gutterman, Benny Pinkas:
Cryptanalysis of the random number generator of the Windows operating system. 10:1-10:32
Volume 13, Number 2, February 2010
- Sabrina De Capitani di Vimercati, Paul F. Syverson:
Guest editorial: Special issue on computer and communications security. 11:1-11:2 - Xuxian Jiang, Xinyuan Wang, Dongyan Xu:
Stealthy malware detection and monitoring through VMM-based "out-of-the-box" semantic view reconstruction. 12:1-12:28 - Nicholas Hopper, Eugene Y. Vasserman, Eric Chan-Tin:
How much anonymity does network latency leak? 13:1-13:28 - Prithvi Bisht, Parthasarathy Madhusudan, V. N. Venkatakrishnan:
CANDID: Dynamic candidate evaluations for automatic prevention of SQL injection attacks. 14:1-14:39 - Miroslav Ponec, Paul Giura, Joel Wein, Hervé Brönnimann:
New payload attribution methods for network forensic investigations. 15:1-15:32 - Tal Moran, Moni Naor:
Split-ballot voting: Everlasting privacy with distributed trust. 16:1-16:43 - Anna Lysyanskaya, Roberto Tamassia, Nikos Triandopoulos:
Authenticated error-correcting codes with applications to multicast authentication. 17:1-17:34 - XiaoFeng Wang, Philippe Golle, Markus Jakobsson, Alex Tsow:
Deterring voluntary trace disclosure in re-encryption mix-networks. 18:1-18:24
Volume 13, Number 3, July 2010
- Joachim Biskup, Javier López:
Editorial ESORICS 2007. 19:1-19:2 - Moritz Y. Becker, Sebastian Nanz:
A logic for state-modifying authorization policies. 20:1-20:28 - Gilles Barthe, Tamara Rezk, Alejandro Russo, Andrei Sabelfeld:
Security of multithreaded programs by compilation. 21:1-21:32 - Valentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati:
Combining fragmentation and encryption to protect privacy in data storage. 22:1-22:33 - Bhavani Thuraisingham:
Editorial SACMAT 2007. 23:1-23:2 - Qun Ni, Elisa Bertino, Jorge Lobo, Carolyn Brodie, Clare-Marie Karat, John Karat, Alberto Trombetta:
Privacy-aware role-based access control. 24:1-24:31 - Adam J. Lee, Kazuhiro Minami, Marianne Winslett:
On the consistency of distributed proofs with hidden subtrees. 25:1-25:32 - Boniface Hicks, Sandra Julieta Rueda, Luke St. Clair, Trent Jaeger, Patrick D. McDaniel:
A logical specification and analysis for SELinux MLS policy. 26:1-26:31 - Jaideep Vaidya, Vijayalakshmi Atluri, Qi Guo:
The role mining problem: A formal perspective. 27:1-27:31 - Barbara Carminati, Elena Ferrari, Jianneng Cao, Kian-Lee Tan:
A framework to enforce access control over data streams. 28:1-28:31
Volume 13, Number 4, December 2010
- Aniket Kate, Gregory M. Zaverucha, Ian Goldberg:
Pairing-Based Onion Routing with Improved Forward Secrecy. 29:1-29:32 - Adam G. Pennington, John Linwood Griffin, John S. Bucy, John D. Strunk, Gregory R. Ganger:
Storage-Based Intrusion Detection. 30:1-30:27 - Rakeshbabu Bobba, Omid Fatemieh, Fariba Khan, Arindam Khan, Carl A. Gunter, Himanshu Khurana, Manoj Prabhakaran:
Attribute-Based Messaging: Access Control and Confidentiality. 31:1-31:35 - Feifei Li, Marios Hadjieleftheriou, George Kollios, Leonid Reyzin:
Authenticated Index Structures for Aggregation Queries. 32:1-32:35 - Palash Sarkar:
A Simple and Generic Construction of Authenticated Encryption with Associated Data. 33:1-33:16 - David A. Schultz, Barbara Liskov, Moses D. Liskov:
MPSS: Mobile Proactive Secret Sharing. 34:1-34:32 - Charles V. Wright, Lucas Ballard, Scott E. Coull, Fabian Monrose, Gerald M. Masson:
Uncovering Spoken Phrases in Encrypted Voice over IP Conversations. 35:1-35:30 - Ian M. Molloy, Hong Chen, Tiancheng Li, Qihua Wang, Ninghui Li, Elisa Bertino, Seraphin B. Calo, Jorge Lobo:
Mining Roles with Multiple Objectives. 36:1-36:35 - Benoît Libert, Jean-Jacques Quisquater, Moti Yung:
Key Evolution Systems in Untrusted Update Environments. 37:1-37:34 - David Zage, Cristina Nita-Rotaru:
Robust Decentralized Virtual Coordinate Systems in Adversarial Environments. 38:1-38:34 - Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. Smith:
BLAC: Revoking Repeatedly Misbehaving Anonymous Users without Relying on TTPs. 39:1-39:33 - Qihua Wang, Ninghui Li:
Satisfiability and Resiliency in Workflow Authorization Systems. 40:1-40:35 - Aybek Mukhamedov, Mark Dermot Ryan:
Identity Escrow Protocol and Anonymity Analysis in the Applied Pi-Calculus. 41:1-41:29
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.