default search action
Journal of Computer Security, Volume 25
Volume 25, Number 1, 2017
- Joseph Y. Halpern:
From qualitative to quantitative proofs of security properties using first-order conditional logic. 1-19 - Véronique Cortier, Cyrille Wiedling:
A formal analysis of the Norwegian E-voting protocol. 21-57 - Stefan Wüller, Daniel A. Mayer, Fabian Förg, Samuel Schüppen, Benjamin Assadsolimani, Ulrike Meyer, Susanne Wetzel:
Designing privacy-preserving interval operations based on homomorphic encryption and secret sharing techniques. 59-81 - Jason Crampton, Gregory Z. Gutin, Daniel Karapetyan, Rémi Watrigant:
The bi-objective workflow satisfiability problem and workflow resiliency. 83-115
Volume 25, Number 2, 2017
- Andrea Continella, Michele Carminati, Mario Polino, Andrea Lanzi, Stefano Zanero, Federico Maggi:
Prometheus: Analyzing WebInject-based information stealers. 117-137 - Albert Guan, Wen-Guey Tzeng:
A secret key establishment protocol for wireless networks using noisy channels. 139-151 - Chung-Yi Lin, Wen-Guey Tzeng:
Strategy analysis for cloud storage reliability management based on game theory. 153-171 - Daniel Migault, Tobias Guggemos, Sylvain Killian, Maryline Laurent, Guy Pujolle, Jean-Philippe Wary:
Diet-ESP: IP layer security for IoT. 173-203
Volume 25, Number 3, 2017
- Manar Mohamed, Song Gao, Niharika Sachdeva, Nitesh Saxena, Chengcui Zhang, Ponnurangam Kumaraguru, Paul C. van Oorschot:
On the security and usability of dynamic cognitive game CAPTCHAs. 205-230 - Yao Cheng, Yingjiu Li, Robert H. Deng, Lingyun Ying, Wei He:
A study on a feasible no-root approach on Android. 231-253 - Daniel Ricardo dos Santos, Silvio Ranise, Luca Compagna, Serena Elisa Ponta:
Automatically finding execution scenarios to deploy security-sensitive workflows. 255-282 - Euijin Choo, Ting Yu, Min Chi:
Detecting opinion spammer groups and spam targets through community discovery and sentiment analysis. 283-318
Volume 25, Numbers 4-5, 2017
- Toby C. Murray, Andrei Sabelfeld, Lujo Bauer:
Special issue on verified information flow security. 319-321 - Niklas Broberg, Bart van Delft, David Sands:
Paragon - Practical programming with information flow control. 323-365 - Jed Liu, Owen Arden, Michael D. George, Andrew C. Myers:
Fabric: Building open distributed systems securely by construction. 367-426 - Daniel B. Giffin, Amit Levy, Deian Stefan, David Terei, David Mazières, John C. Mitchell, Alejandro Russo:
Hails: Protecting data privacy in untrusted web applications. 427-461
Volume 25, Number 6, 2017
- Marco Rocchetto, Luca Viganò, Marco Volpe:
An interpolation-based method for the verification of security protocols. 463-510 - Jason Crampton, Naomi Farley, Gregory Z. Gutin, Mark Jones, Bertram Poettering:
Cryptographic enforcement of information flow policies without public information via tree partitions. 511-535 - Bo Chen, Reza Curtmola:
Remote data integrity checking with server-side repair. 537-584 - Max I. Kanovich, Tajana Ban Kirigin, Vivek Nigam, Andre Scedrov, Carolyn L. Talcott:
Time, computational complexity, and probability in the analysis of distance-bounding protocols. 585-630
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.