Search dblp for Publications

export results for "toc:db/journals/jcs/jcs31.bht:"

 download as .bib file

@article{DBLP:journals/jcs/AfzaliTCC23,
  author       = {Hammad Afzali and
                  Santiago Torres{-}Arias and
                  Reza Curtmola and
                  Justin Cappos},
  title        = {Towards verifiable web-based code review systems},
  journal      = {J. Comput. Secur.},
  volume       = {31},
  number       = {2},
  pages        = {153--184},
  year         = {2023},
  url          = {https://doi.org/10.3233/JCS-210098},
  doi          = {10.3233/JCS-210098},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/AfzaliTCC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/Bkakria23,
  author       = {Anis Bkakria},
  title        = {Robust, revocable, forward and backward adaptively secure attribute-based
                  encryption with outsourced decryption},
  journal      = {J. Comput. Secur.},
  volume       = {31},
  number       = {6},
  pages        = {727--760},
  year         = {2023},
  url          = {https://doi.org/10.3233/JCS-220129},
  doi          = {10.3233/JCS-220129},
  timestamp    = {Thu, 21 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcs/Bkakria23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/CalzavaraFL23,
  author       = {Stefano Calzavara and
                  Pietro Ferrara and
                  Claudio Lucchese},
  title        = {Certifying machine learning models against evasion attacks by program
                  analysis},
  journal      = {J. Comput. Secur.},
  volume       = {31},
  number       = {1},
  pages        = {57--84},
  year         = {2023},
  url          = {https://doi.org/10.3233/JCS-210133},
  doi          = {10.3233/JCS-210133},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcs/CalzavaraFL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/CalzavaraN23,
  author       = {Stefano Calzavara and
                  David A. Naumann},
  title        = {Special issue: 35th {IEEE} Computer Security Symposium - {CSF} 2022},
  journal      = {J. Comput. Secur.},
  volume       = {31},
  number       = {5},
  pages        = {419--420},
  year         = {2023},
  url          = {https://doi.org/10.3233/JCS-230950},
  doi          = {10.3233/JCS-230950},
  timestamp    = {Fri, 03 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcs/CalzavaraN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/ChaudhariGR23,
  author       = {Ashish R. Chaudhari and
                  Bhavesh N. Gohil and
                  Udai Pratap Rao},
  title        = {A review on cloud security issues and solutions},
  journal      = {J. Comput. Secur.},
  volume       = {31},
  number       = {4},
  pages        = {365--391},
  year         = {2023},
  url          = {https://doi.org/10.3233/JCS-210140},
  doi          = {10.3233/JCS-210140},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/ChaudhariGR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/ChevalCK23,
  author       = {Vincent Cheval and
                  Rapha{\"{e}}lle Crubill{\'{e}} and
                  Steve Kremer},
  title        = {Symbolic protocol verification with dice},
  journal      = {J. Comput. Secur.},
  volume       = {31},
  number       = {5},
  pages        = {501--538},
  year         = {2023},
  url          = {https://doi.org/10.3233/JCS-230037},
  doi          = {10.3233/JCS-230037},
  timestamp    = {Fri, 03 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcs/ChevalCK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/CiucanuLLS23,
  author       = {Radu Ciucanu and
                  Pascal Lafourcade and
                  Marius Lombard{-}Platet and
                  Marta Soare},
  title        = {Secure protocols for cumulative reward maximization in stochastic
                  multi-armed bandits},
  journal      = {J. Comput. Secur.},
  volume       = {31},
  number       = {1},
  pages        = {1--27},
  year         = {2023},
  url          = {https://doi.org/10.3233/JCS-210051},
  doi          = {10.3233/JCS-210051},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/CiucanuLLS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/DraganDEGHRRS23,
  author       = {Constantin Catalin Dragan and
                  Fran{\c{c}}ois Dupressoir and
                  Ehsan Estaji and
                  Kristian Gj{\o}steen and
                  Thomas Haines and
                  Peter Y. A. Ryan and
                  Peter B. R{\o}nne and
                  Morten Rotvold Solberg},
  title        = {Machine-checked proofs of privacy against malicious boards for Selene
                  {\&} Co},
  journal      = {J. Comput. Secur.},
  volume       = {31},
  number       = {5},
  pages        = {469--499},
  year         = {2023},
  url          = {https://doi.org/10.3233/JCS-230045},
  doi          = {10.3233/JCS-230045},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcs/DraganDEGHRRS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/FernandesMPD23,
  author       = {Natasha Fernandes and
                  Annabelle McIver and
                  Catuscia Palamidessi and
                  Ming Ding},
  title        = {Universal optimality and robust utility bounds for metric differential
                  privacy},
  journal      = {J. Comput. Secur.},
  volume       = {31},
  number       = {5},
  pages        = {539--580},
  year         = {2023},
  url          = {https://doi.org/10.3233/JCS-230036},
  doi          = {10.3233/JCS-230036},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/FernandesMPD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/GorbettSSR23,
  author       = {Matt Gorbett and
                  Caspian Siebert and
                  Hossein Shirazi and
                  Indrakshi Ray},
  title        = {The intrinsic dimensionality of network datasets and its applications},
  journal      = {J. Comput. Secur.},
  volume       = {31},
  number       = {6},
  pages        = {679--704},
  year         = {2023},
  url          = {https://doi.org/10.3233/JCS-220131},
  doi          = {10.3233/JCS-220131},
  timestamp    = {Thu, 21 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcs/GorbettSSR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/HanYH23,
  author       = {Ziyang Han and
                  Qingqing Ye and
                  Haibo Hu},
  title        = {{OTKI-F:} An efficient memory-secure multi-keyword fuzzy search protocol},
  journal      = {J. Comput. Secur.},
  volume       = {31},
  number       = {2},
  pages        = {129--152},
  year         = {2023},
  url          = {https://doi.org/10.3233/JCS-210145},
  doi          = {10.3233/JCS-210145},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/HanYH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/HassaouiHK23,
  author       = {Mohamed Hassaoui and
                  Mohamed Hanini and
                  Said El Kafhali},
  title        = {Domain generated algorithms detection applying a combination of a
                  deep feature selection and traditional machine learning models},
  journal      = {J. Comput. Secur.},
  volume       = {31},
  number       = {1},
  pages        = {85--105},
  year         = {2023},
  url          = {https://doi.org/10.3233/JCS-210139},
  doi          = {10.3233/JCS-210139},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/HassaouiHK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/KlenzeSB23,
  author       = {Tobias Klenze and
                  Christoph Sprenger and
                  David A. Basin},
  title        = {IsaNet: {A} framework for verifying secure data plane protocols},
  journal      = {J. Comput. Secur.},
  volume       = {31},
  number       = {3},
  pages        = {217--259},
  year         = {2023},
  url          = {https://doi.org/10.3233/JCS-220021},
  doi          = {10.3233/JCS-220021},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/KlenzeSB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/LiKZWHT23,
  author       = {Xiaodi Li and
                  Latifur Khan and
                  Mahmoud Zamani and
                  Shamila Wickramasuriya and
                  Kevin W. Hamlen and
                  Bhavani Thuraisingham},
  title        = {Con2Mix: {A} semi-supervised method for imbalanced tabular security
                  data},
  journal      = {J. Comput. Secur.},
  volume       = {31},
  number       = {6},
  pages        = {705--726},
  year         = {2023},
  url          = {https://doi.org/10.3233/JCS-220130},
  doi          = {10.3233/JCS-220130},
  timestamp    = {Thu, 21 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcs/LiKZWHT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/LiLPLHH23,
  author       = {Liyi Li and
                  Yiyun Liu and
                  Deena L. Postol and
                  Leonidas Lampropoulos and
                  David Van Horn and
                  Michael Hicks},
  title        = {A formal model of Checked {C}},
  journal      = {J. Comput. Secur.},
  volume       = {31},
  number       = {5},
  pages        = {581--614},
  year         = {2023},
  url          = {https://doi.org/10.3233/JCS-230040},
  doi          = {10.3233/JCS-230040},
  timestamp    = {Fri, 10 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcs/LiLPLHH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/MestelMR23,
  author       = {David Mestel and
                  Johannes M{\"{u}}ller and
                  Pascal Reisert},
  title        = {How efficient are replay attacks against vote privacy? {A} formal
                  quantitative analysis},
  journal      = {J. Comput. Secur.},
  volume       = {31},
  number       = {5},
  pages        = {421--467},
  year         = {2023},
  url          = {https://doi.org/10.3233/JCS-230047},
  doi          = {10.3233/JCS-230047},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcs/MestelMR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/MondalAA23,
  author       = {Priyanka Mondal and
                  Maximilian Algehed and
                  Owen Arden},
  title        = {Flow-limited authorization for consensus, replication, and secret
                  sharing},
  journal      = {J. Comput. Secur.},
  volume       = {31},
  number       = {5},
  pages        = {615--645},
  year         = {2023},
  url          = {https://doi.org/10.3233/JCS-230048},
  doi          = {10.3233/JCS-230048},
  timestamp    = {Fri, 03 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcs/MondalAA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/MpantiNP23,
  author       = {Anna Mpanti and
                  Stavros D. Nikolopoulos and
                  Leonidas Palios},
  title        = {Strong watermark numbers encoded as reducible permutation graphs against
                  edge modification attacks},
  journal      = {J. Comput. Secur.},
  volume       = {31},
  number       = {2},
  pages        = {107--128},
  year         = {2023},
  url          = {https://doi.org/10.3233/JCS-210048},
  doi          = {10.3233/JCS-210048},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/MpantiNP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/NevesSSBG23,
  author       = {Fl{\'{a}}vio Neves and
                  Rafael Roque de Souza and
                  Juliana Sousa and
                  Michel S. Bonfim and
                  Vinicius C. Garcia},
  title        = {Data privacy in the Internet of Things based on anonymization: {A}
                  review},
  journal      = {J. Comput. Secur.},
  volume       = {31},
  number       = {3},
  pages        = {261--291},
  year         = {2023},
  url          = {https://doi.org/10.3233/JCS-210089},
  doi          = {10.3233/JCS-210089},
  timestamp    = {Sun, 24 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcs/NevesSSBG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/SalemSJ23,
  author       = {Asma Salem and
                  Ahmad Abdel{-}Aziz Sharieh and
                  Riad Jabri},
  title        = {Online User Authentication System Using Keystroke Dynamics},
  journal      = {J. Comput. Secur.},
  volume       = {31},
  number       = {3},
  pages        = {185--215},
  year         = {2023},
  url          = {https://doi.org/10.3233/JCS-210081},
  doi          = {10.3233/JCS-210081},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/SalemSJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/SempreboniV23,
  author       = {Diego Sempreboni and
                  Luca Vigan{\`{o}}},
  title        = {A mutation-based approach for the formal and automated analysis of
                  security ceremonies},
  journal      = {J. Comput. Secur.},
  volume       = {31},
  number       = {4},
  pages        = {293--364},
  year         = {2023},
  url          = {https://doi.org/10.3233/JCS-210075},
  doi          = {10.3233/JCS-210075},
  timestamp    = {Wed, 30 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/SempreboniV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/SuralL23,
  author       = {Shamik Sural and
                  Haibing Lu},
  title        = {Guest editors' introduction},
  journal      = {J. Comput. Secur.},
  volume       = {31},
  number       = {6},
  pages        = {647},
  year         = {2023},
  url          = {https://doi.org/10.3233/JCS-230960},
  doi          = {10.3233/JCS-230960},
  timestamp    = {Thu, 21 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcs/SuralL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/WangP23,
  author       = {Jingzhe Wang and
                  Balaji Palanisamy},
  title        = {Securing blockchain-based timed data release against adversarial attacks},
  journal      = {J. Comput. Secur.},
  volume       = {31},
  number       = {6},
  pages        = {649--677},
  year         = {2023},
  url          = {https://doi.org/10.3233/JCS-230001},
  doi          = {10.3233/JCS-230001},
  timestamp    = {Thu, 21 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcs/WangP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/Zenitani23,
  author       = {Kengo Zenitani},
  title        = {A scalable algorithm for network reachability analysis with cyclic
                  attack graphs},
  journal      = {J. Comput. Secur.},
  volume       = {31},
  number       = {1},
  pages        = {29--55},
  year         = {2023},
  url          = {https://doi.org/10.3233/JCS-210103},
  doi          = {10.3233/JCS-210103},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/Zenitani23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/ZhangZX23,
  author       = {Jianfeng Zhang and
                  Wensheng Zhang and
                  Jingdong Xu},
  title        = {StegEdge: Privacy protection of unknown sensitive attributes in edge
                  intelligence via deception},
  journal      = {J. Comput. Secur.},
  volume       = {31},
  number       = {4},
  pages        = {393--417},
  year         = {2023},
  url          = {https://doi.org/10.3233/JCS-220042},
  doi          = {10.3233/JCS-220042},
  timestamp    = {Sat, 02 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/ZhangZX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics