


default search action
Journal of Computer Security, Volume 15
Volume 15, Number 1, 2007
- Message from the Guest Editors. 1-2

- Charikleia Zouridaki, Brian L. Mark, Marek Hejmo, Roshan K. Thomas:

Hermes: A quantitative trust establishment framework for reliable data packet delivery in MANETs. 3-38 - Maxim Raya, Jean-Pierre Hubaux:

Securing vehicular ad hoc networks. 39-68 - Haowen Chan, Adrian Perrig, Bartosz Przydatek, Dawn Xiaodong Song:

SIA: Secure information aggregation in sensor networks. 69-102 - Svetlana Radosavac, Alvaro A. Cárdenas, John S. Baras, George V. Moustakides:

Detecting IEEE 802.11 MAC layer misbehavior in ad hoc networks: Robust strategies against individual and colluding attackers. 103-128 - Shouhuai Xu:

On the security of group communication schemes. 129-169 - Giorgio Zanin, Roberto Di Pietro

, Luigi V. Mancini:
Robust RSA distributed signatures for large-scale long-lived ad hoc networks. 171-196
Volume 15, Number 2, 2007
- Valentina Casola

, Antonino Mazzeo, Nicola Mazzocca
, Valeria Vittorini:
A policy-based methodology for security evaluation: A Security Metric for Public Key Infrastructures. 197-229 - Mahesh V. Tripunitara, Ninghui Li:

A theory for comparing the expressive power of access control models. 231-272 - Victor A. Skormin, Alexander Volynkin, Douglas H. Summerville, James Moronski:

Prevention of information attacks by run-time detection of self-replication in computer codes. 273-302
Volume 15, Number 3, 2007
- Stephanie Wehner:

Analyzing worms and network traffic using compression. 303-320 - David Clark

, Sebastian Hunt
, Pasquale Malacaria:
A static analysis for quantifying information flow in a simple imperative language. 321-371 - Annalisa Bossi, Carla Piazza, Sabina Rossi:

Compositional information flow security for concurrent programs. 373-416
Volume 15, Number 4, 2007
- Lingyu Wang, Yingjiu Li, Sushil Jajodia, Duminda Wijesekera:

Parity-based inference control for multi-dimensional range sum queries. 417-445 - Christian Skalka, Xiaoyang Sean Wang, Peter C. Chapin:

Risk management for distributed authorization. 447-489
Volume 15, Number 5, 2007
- Atsuhiro Goto:

Preface. 491 - Abhilasha Bhargav-Spantzel, Jan Camenisch, Thomas Gross

, Dieter Sommer:
User centricity: A taxonomy and open issues. 493-527 - Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciarini

, Shimon K. Modi, Matthew Young, Elisa Bertino, Stephen J. Elliott:
Privacy preserving multi-factor authentication with biometrics. 529-560
Volume 15, Number 6, 2007
- Michael Backes, David A. Basin, Michael Waidner

:
Preface. 561 - Michele Bugliesi

, Riccardo Focardi, Matteo Maffei:
Dynamic types for authentication. 563-617 - Ricardo Corin, Sandro Etalle, Pieter H. Hartel, Angelika Mader

:
Timed analysis of security protocols. 619-645 - Gilles Barthe, Leonor Prensa Nieto:

Secure information flow for a concurrent language with scheduling. 647-689 - Tomás E. Uribe, Steven Cheung:

Automatic analysis of firewall and network intrusion detection system configurations. 691-715

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














