


default search action
International Journal of Information Security, Volume 4
Volume 4, Number 1-2, February 2005
- Serge Autexier

, Iliano Cervesato
, Heiko Mantel:
Preface to the special issue of selected papers from FCS/VERIFY 2002. 1 - Jay Ligatti, Lujo Bauer

, David Walker
:
Edit automata: enforcement mechanisms for run-time security policies. 2-16 - Giampaolo Bella

, Fabio Massacci
, Lawrence C. Paulson
:
An overview of the verification of SET. 17-28 - Joshua D. Guttman

, Amy L. Herzog:
Rigorous automated network security management. 29-48 - Ralf Küsters:

On the decidability of cryptographic protocols with open-ended data structures. 49-70 - Kong-wei Lye, Jeannette M. Wing:

Game strategies in network security. 71-86 - Christian Skalka, Scott F. Smith:

Static use-based object confinement. 87-104 - Kyung-suk Lhee, Steve J. Chapin:

Detection of file-based race conditions. 105-119 - Yun Bai, Yan Zhang, Vijay Varadharajan:

On the sequence of authorization policy transformations. 120-131
Volume 4, Number 3, June 2005
- Einar Snekkenes:

Preface to the special issue on ESORICS 2003. 133-134 - Michael Backes, Birgit Pfitzmann, Michael Waidner

:
Symmetric authentication in a simulatable Dolev-Yao-style cryptographic library. 135-154 - David von Oheimb, Volkmar Lotz, Georg Walter:

Analyzing SLE 88 memory management security using Interacting State Machines. 155-171 - Andrei Serjantov, Peter Sewell

:
Passive-attack analysis for connection-based anonymity systems. 172-180 - David A. Basin

, Sebastian Mödersheim
, Luca Viganò:
OFMC: A symbolic model checker for security protocols. 181-208 - Jonathan T. Trostle, Bill Gossman:

Techniques for improving the security and manageability of IPsec policy. 209-226
Volume 4, Number 4, October 2005
- Colin Boyd, Wenbo Mao:

Preface to the special issue on ISC 2003. 227-227 - David Galindo

, Sebastià Martín Molleví, Paz Morillo, Jorge Luis Villar
:
Fujisaki-Okamoto hybrid encryption revisited. 228-241 - Michael Backes, Birgit Pfitzmann, Michael Waidner

:
Reactively secure signature schemes. 242-252 - Sigrid Gürgens, Carsten Rudolph

, Holger Vogt:
On the security of fair non-repudiation protocols. 253-262 - Adrian Baldwin, Simon Shiu:

Enabling shared audit data. 263-276 - Mikhail J. Atallah, Jiangtao Li:

Secure outsourcing of sequence comparisons . 277-287 - Yukio Itakura, Shigeo Tsujii:

Proposal on a multifactor biometric authentication method based on cryptosystem keys containing biometric signatures. 288-296

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














