


default search action
Journal of Computer Security, Volume 14
Volume 14, Number 1, 2006
- Véronique Cortier, Stéphanie Delaune, Pascal Lafourcade

:
A survey of algebraic properties used in cryptographic protocols. 1-43 - Stelvio Cimato, Antonella Cresti, Paolo D'Arco:

A unified model for unconditionally secure key distribution. 45-64 - Riccardo Focardi, Sabina Rossi:

Information flow security in dynamic contexts. 65-110
Volume 14, Number 2, 2006
- Riccardo Focardi:

Preface. 111 - Chiara Braghin, Daniele Gorla

, Vladimiro Sassone:
Role-based access control for a distributed calculus. 113-155 - Andrew C. Myers, Andrei Sabelfeld, Steve Zdancewic:

Enforcing Robust Declassification and Qualified Robustness. 157-196 - Olivier Pereira, Jean-Jacques Quisquater:

On the impossibility of building secure Cliques-type authenticated group key agreement protocols. 197-246
Volume 14, Number 3, 2006
- Atsuhiro Goto:

Preface. 247 - Thibault Candebat, David Gray:

Secure pseudonym management using mediated identity-based encryption. 249-267 - Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciarini

, Elisa Bertino:
Establishing and protecting digital identity in federation systems. 269-300
Volume 14, Number 4, 2006
- Sencun Zhu, Sanjeev Setia, Shouhuai Xu, Sushil Jajodia:

GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks. 301-325 - Arun K. Eamani, A. Prasad Sistla:

Language based policy analysis in a SPKI Trust Management System. 327-357 - Jianhong Xia, Sarma Vangala, Jiang Wu, Lixin Gao, Kevin A. Kwiat:

Effective worm detection for various scan techniques. 359-387
Volume 14, Number 5, 2006
- Jianying Zhou, Meng-Chow Kang:

Preface. 389-390 - Geraint Price:

Public Key Infrastructures: A research agenda. 391-417 - Marcus Lippert, Vangelis Karatsiolis, Alexander Wiesmaier

, Johannes Buchmann:
Life-cycle management of X.509 certificates based on LDAP directories. 419-439 - Guilin Wang:

Generic non-repudiation protocols supporting transparent off-line TTP. 441-467 - Javier López:

Unleashing public-key cryptography in wireless sensor networks. 469-482
Volume 14, Number 6, 2006
- Patrick D. McDaniel, Atul Prakash

:
Enforcing provisioning and authorization policy in the Antigone system. 483-511 - Andrew Blyth, Paula Thomas:

Performing real-time threat assessment of security incidents using data fusion of IDS logs. 513-534 - Esma Aïmeur, Gilles Brassard, Flavien Serge Mani Onana:

Blind Electronic Commerce. 535-559 - Gethin Norman, Vitaly Shmatikov:

Analysis of probabilistic contract signing. 561-589 - Geoffrey Smith:

Improved typings for probabilistic noninterference in a multi-threaded language. 591-623

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














