default search action
Journal of Computer Security, Volume 12
Volume 12, Number 1, 2004
- Dominic J. D. Hughes, Vitaly Shmatikov:
Information Hiding, Anonymity and Privacy: a Modular Approach. 3-36 - Alessandra Di Pierro, Chris Hankin, Herbert Wiklicky:
Approximate Non-interference. 37-82 - Gavin Lowe:
Analysing Protocol Subject to Guessing Attacks. 83-98 - Daniele Micciancio, Bogdan Warinschi:
Completeness Theorems for the Abadi-Rogaway Language of Encrypted Expressions. 99-130 - Ajay Chander, Drew Dean, John C. Mitchell:
Reconstructing Trust Management. 131-164
Volume 12, Number 2, 2004
- Dirk Ourston, Sara Matzner, William Stump, Bryan Hopkins:
Coordinated Internet attacks: responding to attack complexity. 165-190 - Alessandro Aldini, Mario Bravetti, Roberto Gorrieri:
A process-algebraic approach for the analysis of probabilistic noninterference. 191-245 - Nancy A. Durgin, Patrick Lincoln, John C. Mitchell:
Multiset rewriting and the complexity of bounded security protocols. 247-311
Volume 12, Numbers 3-4, 2004
- Somesh Jha, Thomas W. Reps:
Model checking SPKI/SDSI. 317-353 - Vitaly Shmatikov:
Probabilistic analysis of an anonymity system. 355-377 - Philippa J. Broadfoot, A. W. Roscoe:
Embedding agents within the intruder to detect parallel attacks. 379-408 - Joshua D. Guttman:
Authentication tests and disjoint encryption: A design method for security protocols. 409-433 - Andrew D. Gordon, Alan Jeffrey:
Types and effects for asymmetric cryptographic protocols. 435-483 - Dominic Duggan:
Type-based cryptographic operations. 485-550 - Levente Buttyán, Jean-Pierre Hubaux, Srdjan Capkun:
A formal model of rational exchange and its application to the analysis of Syverson's protocol. 551-587 - Michael Backes, Birgit Pfitzmann, Michael Waidner:
Polynomial liveness. 589-617 - Gavin Lowe:
Defining information flow quantity. 619-653
Volume 12, Number 5, 2004
- Lingyu Wang, Duminda Wijesekera, Sushil Jajodia:
Cardinality-based inference control in data cubes. 655-692 - Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei:
Key management for high bandwidth secure multicast. 693-709 - Taenam Cho, Sang-Ho Lee, Won Kim:
A group key recovery mechanism based on logical key hierarchy. 711-736 - Jian Zhang, Jian Gong, Yong Ding:
Research on automated rollbackability of intrusion response. 737-751 - Florian P. Buchholz, Clay Shields:
Providing process origin information to aid in computer forensic investigations. 753-776 - Charles Iheagwara, Andrew Blyth, Mukesh Singhal:
Cost effective management frameworks for intrusion detection systems. 777-798
Volume 12, Number 6, 2004
- Vijayalakshmi Atluri, Soon Ae Chun, Pietro Mazzoleni:
Chinese wall security for decentralized workflow management systems. 799-840 - Premkumar T. Devanbu, Michael Gertz, April Kwong:
Flexible authentication of XML documents. 841-864 - Joshua D. Guttman, F. Javier Thayer, Lenore D. Zuck:
The faithfulness of abstract protocol analysis: Message authentication. 865-891 - Catherine Meadows, Paul F. Syverson, Iliano Cervesato:
Formal specification and analysis of the Group Domain Of Interpretation Protocol using NPATRL and the NRL Protocol Analyzer. 893-931
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.