


default search action
Journal of Computer Security, Volume 11
Volume 11, Number 1, 2003
- Charles Iheagwara, Andrew Blyth, Mukesh Singhal:

A Comparative Experimental Evaluation Study of Intrusion Detection System Performance in a Gigabit Environment. 1-33 - Ninghui Li, William H. Winsborough, John C. Mitchell:

Distributed Credential Chain Discovery in Trust Management. 35-86 - Giampaolo Bella

:
Inductive Verification of Smart Card Protocols. 87-132
Volume 11, Number 2, 2003
- Peter Sewell

, Jan Vitek:
Secure Composition of Untrusted Code: Box pi, Wrappers, and Causality. 135-188 - Ernie Cohen:

First-order Verification of Cryptographic Protocols. 189-216 - James Heather, Gavin Lowe, Steve A. Schneider:

How to Prevent Type Flaw Attacks on Security Protocols. 217-244 - Pankaj Kakkar, Carl A. Gunter, Martín Abadi:

Reasoning About Secrecy for Active Networks. 245-287
Volume 11, Number 3, 2003
- Steve Kremer, Jean-François Raskin:

A Game-based Verification of Non-repudiation and Fair Exchange Protocols. 399-430 - Katherine Campbell, Lawrence A. Gordon, Martin P. Loeb, Lei Zhou:

The Economic Cost of Publicly Announced Information Security Breaches: Empirical Evidence from the Stock Market. 431-448
- Premkumar T. Devanbu, Michael Gertz, Charles U. Martel, Stuart G. Stubblebine:

Authentic Data Publication Over the Internet. 291-314 - Daniel Barbará, Rajni Goel, Sushil Jajodia:

A Checksum-based Corruption Detection Technique. 315-330 - John Hale

, Mauricio Papa
, Sujeet Shenoi:
Programmable Access Control. 331-352 - Wouter Teepe, Reind P. van de Riet, Martin S. Olivier:

WorkFlow Analyzed for Security and Privacy in Using Databases. 353-364 - Christian Altenschmidt, Joachim Biskup, Ulrich Flegel, Yücel Karabulut:

Secure Mediation: Requirements, Design, and Architecture. 365-398
Volume 11, Number 4, 2003
- Andrew D. Gordon, Alan Jeffrey:

Authenticity by Typing for Security Protocols. 451-520 - Eijiro Sumii, Benjamin C. Pierce:

Logical Relations for Encryption. 521-554 - Olivier Pereira, Jean-Jacques Quisquater:

Some Attacks Upon Authenticated Group Key Agreement Protocols. 555-580 - Joseph Y. Halpern, Ron van der Meyden:

A Logical Reconstruction of SPKI. 581-614 - Heiko Mantel, Andrei Sabelfeld:

A Unifying Approach to the Security of Distributed and Multi-Threaded Programs. 615-676 - Nancy A. Durgin, John C. Mitchell, Dusko Pavlovic

:
A Compositional Logic for Proving Security Properties of Protocols. 677-722

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














