


default search action
ACM Transactions on Information and System Security, Volume 15
Volume 15, Number 1, March 2012
- Paul F. Syverson, Somesh Jha:

Guest Editorial: Special Issue on Computer and Communications Security. 1:1-1:2 - Ryan Roemer, Erik Buchanan, Hovav Shacham, Stefan Savage:

Return-Oriented Programming: Systems, Languages, and Applications. 2:1-2:34 - Karthikeyan Bhargavan, Cédric Fournet, Ricardo Corin, Eugen Zalinescu:

Verified Cryptographic Implementations for TLS. 3:1-3:32 - Jan Camenisch, Thomas Groß:

Efficient Attributes for Anonymous Credentials. 4:1-4:30 - Prateek Mittal, Nikita Borisov

:
Information Leaks in Structured Peer-to-Peer Anonymous Communication Systems. 5:1-5:28
Volume 15, Number 2, July 2012
- Yossi Gilad, Amir Herzberg

:
LOT: A Defense Against IP Spoofing and Flooding Attacks. 6:1-6:30 - Boris Danev, Srdjan Capkun, Ramya Jayaram Masti, Thomas S. Benjamin:

Towards Practical Identification of HF RFID Devices. 7:1-7:24 - Martín Abadi, Gordon D. Plotkin:

On Protection by Layout Randomization. 8:1-8:29 - Attila Altay Yavuz

, Peng Ning, Michael K. Reiter:
BAF and FI-BAF: Efficient and Publicly Verifiable Cryptographic Schemes for Secure Logging in Resource-Constrained Systems. 9:1-9:28 - Raphaël Khoury, Nadia Tawbi

:
Corrective Enforcement: A New Paradigm of Security Policy Enforcement by Monitors. 10:1-10:27
Volume 15, Number 3, November 2012
- Norman Danner, Sam DeFabbia-Kane, Danny Krizanc, Marc Liberatore:

Effectiveness and detection of denial-of-service attacks in tor. 11:1-11:25 - Michael Brennan, Sadia Afroz, Rachel Greenstadt:

Adversarial stylometry: Circumventing authorship recognition to preserve privacy and anonymity. 12:1-12:22 - David A. Basin, Samuel J. Burri, Günter Karjoth:

Dynamic enforcement of abstract separation of duty constraints. 13:1-13:30 - Joan Feigenbaum, Aaron Johnson, Paul F. Syverson:

Probabilistic analysis of onion routing in a black-box model. 14:1-14:28
Volume 15, Number 4, April 2013
- Mario Frank, Joachim M. Buhmann, David A. Basin:

Role Mining with Probabilistic Models. 15:1-15:28 - Yossi Gilad, Amir Herzberg

:
Fragmentation Considered Vulnerable. 16:1-16:31 - Muhammad Qasim Ali, Ehab Al-Shaer, Hassan Khan, Syed Ali Khayam:

Automated Anomaly Detector Adaptation using Adaptive Threshold Tuning. 17:1-17:30 - Karthick Jayaraman, Mahesh V. Tripunitara, Vijay Ganesh

, Martin C. Rinard, Steve J. Chapin:
Mohawk: Abstraction-Refinement and Bound-Estimation for Verifying Access Control Policies. 18:1-18:28

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














