


default search action
Journal of Computer Security, Volume 30
Volume 30, Number 1, 2022
- Clemente Galdi, Vladimir Kolesnikov:

Special issue: Security and Cryptography for Networks - SCN 2020. 1-2 - Dario Catalano, Georg Fuchsbauer, Azam Soleimanian:

Double-authentication-preventing signatures in the standard model. 3-38 - Carsten Baum, Daniel Escudero, Alberto Pedrouzo-Ulloa

, Peter Scholl, Juan Ramón Troncoso-Pastoriza:
Efficient protocols for oblivious linear function evaluation from ring-LWE. 39-78 - Ben Kreuter, Sarvar Patel, Ben Terner:

Private identity agreement for private set functionalities. 79-107 - Lydia Garms, Siaw-Lynn Ng, Elizabeth A. Quaglia

, Giulia Traverso:
Anonymity and rewards in peer rating systems. 109-165 - Ivan Damgård, Thomas P. Jakobsen, Jesper Buus Nielsen, Jakob Illeborg Pagter, Michael Bæksvang Østergaard:

Fast threshold ECDSA with honest majority. 167-196 - Carmit Hazay, Mor Lilintal:

Gradual GRAM and secure computation for RAM programs. 197-229
Volume 30, Number 2, 2022
- Vikas Samarthrao Kadam

, Vandana Milind Rohokale
:
Enhancement of email spam detection using improved deep learning algorithms for cyber security. 231-264 - Antti Hakkala, Jani Koskinen

:
Personal data protection in the age of mass surveillance. 265-289 - Isaac Amankona Obiri, Qi Xia, Hu Xia, Eric Affum

, Abla Smahi
, Jianbin Gao:
Personal health records sharing scheme based on attribute based signcryption with data integrity verifiable. 291-324
Volume 30, Number 3, 2022
- Thomas Groß, Luca Viganò

:
Special issue on socio-technical aspects in security - editorial. 325-326 - Simon Parkin, Yi Ting Chua:

A cyber-risk framework for coordination of the prevention and preservation of behaviours. 327-356 - George Chatzisofroniou, Panayiotis Kotzanikolaou

:
Exploiting WiFi usability features for association attacks in IEEE 802.11: Attack analysis and mitigation controls. 357-380 - Wojciech Jamroga

, Damian Kurpiewski, Vadim Malvone
:
How to measure usable security: Natural strategies in voting protocols. 381-409 - Giampaolo Bella, Rosario Giustolisi

, Carsten Schürmann:
Modelling human threats in security ceremonies. 411-433 - Albesë Demjaha, Simon Parkin, David J. Pym:

The boundedly rational employee: Security economics for behaviour intervention support in organizations. 435-464 - Scott Harper, Maryam Mehrnezhad

, John C. Mace:
User Privacy Concerns in Commercial Smart Buildings. 465-497 - Imre Lendák, Balázs Indig, Gábor Palkó:

WARChain: Consensus-based trust in web archives via proof-of-stake blockchain technology. 499-515
Volume 30, Number 4, 2022
- Brian A. Powell:

Securing LSB embedding against structural steganalysis. 517-539 - Qingtian Zou

, Anoop Singhal, Xiaoyan Sun, Peng Liu:
Deep learning for detecting logic-flaw-exploiting network attacks: An end-to-end approach. 541-570 - Selected Papers From ESORICS 2020. 571

- Véronique Cortier, Stéphanie Delaune, Jannik Dreier, Elise Klein

:
Automatic generation of sources lemmas in Tamarin: Towards automatic proofs of security protocols. 573-598 - Fabio Aiolli, Mauro Conti

, Stjepan Picek, Mirko Polato:
On the feasibility of crawling-based attacks against recommender systems. 599-621 - Sebastian Paul, Patrik Scheible, Friedrich Wiemer:

Towards post-quantum security for cyber-physical systems: Integrating PQC into industrial M2M communication. 623-653
Volume 30, Number 5, 2022
- Jannik Dreier, Jean-Guillaume Dumas

, Pascal Lafourcade, Léo Robert:
Optimal threshold padlock systems. 655-688 - Michele De Donno, Xenofon Fafoutis

, Nicola Dragoni
:
AntibIoTic: The Fog-enhanced distributed security system to protect the (legacy) Internet of Things. 689-725 - Ryan Sheatsley, Nicolas Papernot, Michael J. Weisman, Gunjan Verma, Patrick D. McDaniel:

Adversarial examples for network intrusion detection systems. 727-752
Volume 30, Number 6, 2022
- Elisa Bertino, Haya Schulmann, Michael Waidner

:
Special issue ESORICS 2021. 753-755 - Zhelei Zhou

, Bingsheng Zhang, Yuan Chen, Jiaqi Li, Yajin Zhou, Yibiao Lu, Kui Ren, Phuc Thai, Hong-Sheng Zhou
:
Scriptable and composable SNARKs in the trusted hardware model. 757-793 - Xiaoning Liu, Yifeng Zheng, Xingliang Yuan, Xun Yi:

Deep learning-based medical diagnostic services: A secure, lightweight, and accurate realization. 795-827 - Shabnam Kasra Kermanshahi

, Rafael Dowsley, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Surya Nepal
, Xun Yi, Shangqi Lai:
Range search on encrypted spatial data with dynamic updates. 829-849 - Antonio Nappa, Aaron Úbeda-Portugués, Panagiotis Papadopoulos, Matteo Varvello, Juan Tapiador, Andrea Lanzi:

Scramblesuit: An effective timing side-channels framework for malware sandbox evasion. 851-876 - Liron David, Avishai Wool

:
PESrank: An Explainable online password strength estimator. 877-901

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














