


default search action
Journal of Computer Security, Volume 25
Volume 25, Number 1, 2017
- Joseph Y. Halpern:

From qualitative to quantitative proofs of security properties using first-order conditional logic. 1-19 - Véronique Cortier, Cyrille Wiedling:

A formal analysis of the Norwegian E-voting protocol. 21-57 - Stefan Wüller, Daniel A. Mayer, Fabian Förg, Samuel Schüppen, Benjamin Assadsolimani, Ulrike Meyer, Susanne Wetzel:

Designing privacy-preserving interval operations based on homomorphic encryption and secret sharing techniques. 59-81 - Jason Crampton, Gregory Z. Gutin, Daniel Karapetyan

, Rémi Watrigant:
The bi-objective workflow satisfiability problem and workflow resiliency. 83-115
Volume 25, Number 2, 2017
- Andrea Continella

, Michele Carminati
, Mario Polino, Andrea Lanzi, Stefano Zanero
, Federico Maggi:
Prometheus: Analyzing WebInject-based information stealers. 117-137 - Albert Guan

, Wen-Guey Tzeng:
A secret key establishment protocol for wireless networks using noisy channels. 139-151 - Chung-Yi Lin, Wen-Guey Tzeng:

Strategy analysis for cloud storage reliability management based on game theory. 153-171 - Daniel Migault, Tobias Guggemos, Sylvain Killian, Maryline Laurent

, Guy Pujolle, Jean-Philippe Wary:
Diet-ESP: IP layer security for IoT. 173-203
Volume 25, Number 3, 2017
- Manar Mohamed, Song Gao, Niharika Sachdeva, Nitesh Saxena, Chengcui Zhang, Ponnurangam Kumaraguru, Paul C. van Oorschot

:
On the security and usability of dynamic cognitive game CAPTCHAs. 205-230 - Yao Cheng, Yingjiu Li, Robert H. Deng

, Lingyun Ying, Wei He:
A study on a feasible no-root approach on Android. 231-253 - Daniel Ricardo dos Santos, Silvio Ranise

, Luca Compagna, Serena Elisa Ponta:
Automatically finding execution scenarios to deploy security-sensitive workflows. 255-282 - Euijin Choo, Ting Yu, Min Chi:

Detecting opinion spammer groups and spam targets through community discovery and sentiment analysis. 283-318
Volume 25, Numbers 4-5, 2017
- Toby C. Murray, Andrei Sabelfeld, Lujo Bauer:

Special issue on verified information flow security. 319-321 - Niklas Broberg, Bart van Delft, David Sands:

Paragon - Practical programming with information flow control. 323-365 - Jed Liu, Owen Arden, Michael D. George, Andrew C. Myers:

Fabric: Building open distributed systems securely by construction. 367-426 - Daniel B. Giffin, Amit Levy

, Deian Stefan, David Terei, David Mazières, John C. Mitchell
, Alejandro Russo
:
Hails: Protecting data privacy in untrusted web applications. 427-461
Volume 25, Number 6, 2017
- Marco Rocchetto

, Luca Viganò
, Marco Volpe:
An interpolation-based method for the verification of security protocols. 463-510 - Jason Crampton, Naomi Farley, Gregory Z. Gutin, Mark Jones, Bertram Poettering:

Cryptographic enforcement of information flow policies without public information via tree partitions. 511-535 - Bo Chen, Reza Curtmola:

Remote data integrity checking with server-side repair. 537-584 - Max I. Kanovich, Tajana Ban Kirigin

, Vivek Nigam
, Andre Scedrov, Carolyn L. Talcott:
Time, computational complexity, and probability in the analysis of distance-bounding protocols. 585-630

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














