default search action
Journal of Computer Security, Volume 26
Volume 26, Number 1, 2018
- Tarik Moataz, Indrajit Ray, Indrakshi Ray, Abdullatif Shikfa, Frédéric Cuppens, Nora Cuppens:
Substring search over encrypted data. 1-30 - Mila Dalla Preda, Isabella Mastroeni:
Characterizing a property-driven obfuscation strategy. 31-69 - Christoph Sprenger, David A. Basin:
Refining security protocols. 71-120 - Scott D. Stoller, Thang Bui:
Mining hierarchical temporal roles with multiple metrics. 121-142
Volume 26, Number 2, 2018
- Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati:
Enforcing authorizations while protecting access confidentiality. 143-175 - Silvie Levy, Ehud Gudes, Nurit Gal-Oz:
Sharing-habits based privacy control in social networks. 177-205 - Ultan Neville, Simon N. Foley:
Reasoning about firewall policies through refinement and composition. 207-254 - Haritabh Gupta, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya:
A side-channel attack on smartphones: Deciphering key taps using built-in microphones. 255-281
Volume 26, Number 3, 2018
- Wenrui Diao, Rui Liu, Xiangyu Liu, Zhe Zhou, Zhou Li, Kehuan Zhang:
Accessing mobile user's privacy based on IME personalization: Understanding and practical attacks. 283-309 - Maliheh Shirvanian, Nitesh Saxena, Dibya Mukhopadhyay:
Short voice imitation man-in-the-middle attacks on Crypto Phones: Defeating humans and machines. 311-333 - Simon Bischof, Joachim Breitner, Jürgen Graf, Martin Hecker, Martin Mohr, Gregor Snelting:
Low-deterministic security for low-nondeterministic programs. 335-366 - Bruno Blanchet, Ben Smyth:
Automated reasoning for equivalences in the applied pi calculus with barriers. 367-422
Volume 26, Number 4, 2018
- Silvio Ranise, Anh Tuan Truong, Luca Viganò:
Automated and efficient analysis of administrative temporal RBAC policies with role hierarchies. 423-458 - Thanh Binh Nguyen, Christoph Sprenger, Cas Cremers:
Abstractions for security protocol verification. 459-508 - Rosario Giustolisi, Giampaolo Bella, Gabriele Lenzini:
Invalid certificates in modern browsers: A socio-technical analysis. 509-541 - Kiran S. Balagani, Paolo Gasti, Aaron Elliott, Azriel Richardson, Mike O'Neal:
The impact of application context on privacy and performance of keystroke authentication systems. 543-556 - Per A. Hallgren, Ravi Kishore, Martín Ochoa, Andrei Sabelfeld:
Assuring BetterTimes. 557-587
Volume 26, Number 5, 2018
- Patrick Luckett, Jeffrey Todd McDonald, William Bradley Glisson, Ryan Benton, Joel A. Dawson, Blair A. Doyle:
Identifying stealth malware using CPU power consumption and learning algorithms. 589-613 - Tanmoy Chakraborty, Sushil Jajodia, Noseong Park, Andrea Pugliese, Edoardo Serra, V. S. Subrahmanian:
Hybrid adversarial defense: Merging honeypots and traditional security methods. 615-645 - Ling Chen, Ting Yu, Rada Chirkova:
k-Skyband query answering with differential privacy. 647-676 - Benny Fuhry, Raad Bahmani, Ferdinand Brasser, Florian Hahn, Florian Kerschbaum, Ahmad-Reza Sadeghi:
HardIDX: Practical and secure index with SGX in a malicious environment. 677-706 - Jin Han, Wangyu Zang, Li Liu, Songqing Chen, Meng Yu:
Risk-aware multi-objective optimized virtual machine placement in the cloud. 707-730
Volume 26, Number 6, 2018
- David Lorenzi, Emre Uzun, Jaideep Vaidya, Shamik Sural, Vijayalakshmi Atluri:
Towards designing robust CAPTCHAs. 731-760 - Daniel Borbor, Lingyu Wang, Sushil Jajodia, Anoop Singhal:
Surviving unpatchable vulnerabilities through heterogeneous network hardening options. 761-789 - Jun Zhang, Meiqi He, Gongxian Zeng, Siu-Ming Yiu:
Privacy-preserving verifiable elastic net among multiple institutions in the cloud. 791-815 - Alessandro Barenghi, Nicholas Mainardi, Gerardo Pelosi:
Systematic parsing of X.509: Eradicating security issues with a parse tree. 817-849
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.