


default search action
Journal of Computer Security, Volume 19
Volume 19, Number 1, 2011
- Boris Köpf, David A. Basin:

Automatically deriving information-theoretic bounds for adaptive side-channel attacks. 1-31 - Lawrence A. Gordon, Martin P. Loeb, Lei Zhou:

The impact of information security breaches: Has there been a downward shift in costs? 33-56 - David DeAngelis, K. Suzanne Barber:

Security applications of trust in multi-agent systems. 57-99 - Deepak D'Souza, Raveendra Holla, K. R. Raghavendra, Barbara Sprick:

Model-checking trace-based information flow properties. 101-138 - Long Hoang Nguyen, A. W. Roscoe:

Authentication protocols based on low-bandwidth unspoofable channels: A comparative survey. 139-201 - Anshuman Sinha:

A survey of system security in contactless electronic passports. 203-226
Volume 19, Number 2, 2011
- Yingjiu Li, Jianying Zhou

:
Guest editors' preface. 227-228 - Basel Alomair

, Loukas Lazos, Radha Poovendran
:
Securing low-cost RFID systems: An unconditionally secure approach. 229-257 - Gerhard P. Hancke

:
Practical eavesdropping and skimming attacks on high-frequency RFID tokens. 259-288 - Gildas Avoine, Muhammed Ali Bingöl

, Süleyman Kardas, Cédric Lauradoux, Benjamin Martin:
A framework for analyzing RFID distance bounding protocols. 289-317 - Ching Yu Ng, Willy Susilo

, Yi Mu, Reihaneh Safavi-Naini:
Practical RFID ownership transfer scheme. 319-341 - Tzipora Halevi, Nitesh Saxena, Shai Halevi:

Tree-based HB protocols for privacy-preserving authentication of RFID tags. 343-363
Volume 19, Number 3, 2011
- Vijay Atluri

:
Preface. 365 - Changyu Dong, Giovanni Russello, Naranker Dulay:

Shared and searchable encrypted data for untrusted servers. 367-397 - Manachai Toahchoodee, Indrakshi Ray:

On the formalization and analysis of a spatio-temporal role-based access control model. 399-452 - Xiaoyun He, Haibing Lu, Jaideep Vaidya, Nabil R. Adam:

Secure construction and publication of contingency tables from distributed data. 453-484 - Jaideep Vaidya, Ehud Gudes:

Introduction. 485-486 - Joachim Biskup, Christian Gogolin, Jens Seiler, Torben Weibert:

Inference-proof view update transactions with forwarded refreshments. 487-529 - Valentina Ciriani

, Sabrina De Capitani di Vimercati
, Sara Foresti
, Sushil Jajodia
, Stefano Paraboschi
, Pierangela Samarati
:
Selective data outsourcing for enforcing privacy. 531-566 - Simon N. Foley

, William M. Fitzgerald:
Management of security policy configuration using a Semantic Threat Graph approach. 567-605 - Heechang Shin, Vijayalakshmi Atluri

, June-Suh Cho:
Efficiently enforcing spatiotemporal access control under uncertain location information. 607-637
Volume 19, Number 4, 2011
- Konrad Rieck, Philipp Trinius, Carsten Willems, Thorsten Holz

:
Automatic analysis of malware behavior using machine learning. 639-668 - Paul C. van Oorschot

, Julie Thorpe
:
Exploiting predictability in click-based graphical passwords. 669-702 - Mohammad Mannan, Paul C. van Oorschot

:
Leveraging personal devices for stronger password authentication from untrusted computers. 703-750 - Sabrina De Capitani di Vimercati

, Sara Foresti
, Sushil Jajodia
, Stefano Paraboschi
, Pierangela Samarati
:
Authorization enforcement in distributed query evaluation. 751-794
Volume 19, Number 5, 2011
- Heechang Shin, Jaideep Vaidya, Vijayalakshmi Atluri

:
A profile anonymization model for location-based services. 795-833 - Dimitris Gritzalis, Giannis F. Marias, Yacine Rebahi, Yannis Soupionis, Sven Ehlert:

SPIDER: A platform for managing SIP-based Spam over Internet Telephony (SPIT). 835-867 - Francis Hsu, Hao Chen

, Sridhar Machiraju:
WebCallerID: Leveraging cellular networks for Web authentication. 869-893 - Reza Curtmola, Juan A. Garay, Seny Kamara, Rafail Ostrovsky

:
Searchable symmetric encryption: Improved definitions and efficient constructions. 895-934 - Rinku Dewri, Indrajit Ray, Indrakshi Ray, L. Darrell Whitley:

Exploring privacy versus data quality trade-offs in anonymization techniques using multi-objective optimization. 935-974 - Allaa Kamil, Gavin Lowe:

Analysing TLS in the strand spaces model. 975-1025
Volume 19, Number 6, 2011
- Dimitris Gritzalis:

Guest Editor's Preface. 1027-1028 - Hirotoshi Yasuoka, Tachio Terauchi

:
On bounding problems of quantitative information flow. 1029-1082 - Chao Zhang, Wei Zou, Tielei Wang, Yu Chen, Tao Wei:

Using type analysis in compiler to mitigate integer-overflow-to-buffer-overflow threat. 1083-1107 - Robert H. Deng

, Yingjiu Li, Moti Yung, Yunlei Zhao:
A zero-knowledge based framework for RFID privacy. 1109-1146 - Rishab Nithyanand, Gene Tsudik, Ersin Uzun

:
User-aided reader revocation in PKI-based RFID systems. 1147-1172

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














