


default search action
Journal of Computer Security, Volume 24
Volume 24, Number 1, 2016
- Florian Böhl, Dominique Unruh:

Symbolic universal composability. 1-38 - Willard Rafnsson, Andrei Sabelfeld:

Secure multi-execution: Fine-grained, declassification-aware, and transparent. 39-90 - Zhengqin Luo, José Fragoso Santos

, Ana Almeida Matos
, Tamara Rezk:
Mashic compiler: Mashup sandboxing based on inter-frame communication. 91-136
Volume 24, Number 2, 2016
- Henry Carter

, Benjamin Mood, Patrick Traynor, Kevin R. B. Butler
:
Secure outsourced garbled circuit evaluation for mobile devices. 137-180 - Daniel Hedin, Luciano Bello, Andrei Sabelfeld:

Information-flow security for JavaScript and its APIs. 181-234 - Claudio Taglienti, James Cannady:

The user attribution problem and the challenge of persistent surveillance of user activity in complex networks. 235-288 - Yu Chen, Zongyang Zhang:

Publicly evaluable pseudorandom functions and their applications. 289-320
Volume 24, Number 3, 2016
- Sokratis Vavilis

, Milan Petkovic, Nicola Zannone
:
A severity-based quantification of data leakages in database systems. 321-345 - Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia

, Stefano Paraboschi, Pierangela Samarati
:
Efficient integrity checks for join queries in the cloud. 347-378 - Meixing Le, Krishna Kant, Malek Athamnah

, Sushil Jajodia
:
Minimum cost rule enforcement for cooperative database access. 379-403
Volume 24, Number 4, 2016
- Yiming Jing, Gail-Joon Ahn

, Hongxin Hu, Haehyun Cho, Ziming Zhao:
TripleMon: A multi-layer security framework for mediating inter-process communication on Android. 405-426 - Chiara Bodei, Pierpaolo Degano, Letterio Galletta

, Francesco Salvatori:
Context-aware security: Linguistic mechanisms and static analysis. 427-477 - Giovanni Di Crescenzo, Debra L. Cook, Allen McIntosh, Euthimios Panagos:

Practical and privacy-preserving information retrieval from a database table. 479-506 - Debabrata Kar, Suvasini Panigrahi, Srikanth Sundararajan:

SQLiDDS: SQL injection detection using document similarity measure. 507-539
Volume 24, Number 5, 2016
- Martin Mariusz Lester

, Luke Ong
, Max Schäfer:
Information flow analysis for a dynamically typed language with staged metaprogramming. 541-582 - Steve Kremer

, Robert Künnemann:
Automated analysis of security protocols with global state. 583-616 - Deepak D'Souza, R. K. Ramesh:

Model-checking trace-based information flow properties for infinite-state systems. 617-643 - John Sonchack, Adam J. Aviv:

Exploring large scale security system reproducibility with the LESS simulator. 645-665
Volume 24, Number 6, 2016
- Michal Davidson, Tamir Tassa, Ehud Gudes:

Content sharing schemes in DRM systems with enhanced performance and privacy preservation. 667-688 - Arthur Azevedo de Amorim, Nathan Collins, André DeHon, Delphine Demange

, Catalin Hritcu, David Pichardie, Benjamin C. Pierce, Randy Pollack, Andrew Tolmach:
A verified information-flow architecture. 689-734 - Sushil Jajodia

, Noseong Park, Edoardo Serra
, V. S. Subrahmanian:
Using temporal probabilistic logic for optimal monitoring of security events with limited resources. 735-791 - Roberto Guanciale

, Hamed Nemati
, Mads Dam, Christoph Baumann:
Provably secure memory isolation for Linux on ARM. 793-837

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














