Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/jcs/jcs22.bht:"
@article{DBLP:journals/jcs/0001VCBM14, author = {Johannes Braun and Florian Volk and Jiska Classen and Johannes Buchmann and Max M{\"{u}}hlh{\"{a}}user}, title = {{CA} trust management for the Web {PKI}}, journal = {J. Comput. Secur.}, volume = {22}, number = {6}, pages = {913--959}, year = {2014}, url = {https://doi.org/10.3233/JCS-140509}, doi = {10.3233/JCS-140509}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/0001VCBM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/Akinyele0HP14, author = {Joseph A. Akinyele and Matthew Green and Susan Hohenberger and Matthew W. Pagano}, title = {Machine-generated algorithms, proofs and software for the batch verification of digital signature schemes}, journal = {J. Comput. Secur.}, volume = {22}, number = {6}, pages = {867--912}, year = {2014}, url = {https://doi.org/10.3233/JCS-140507}, doi = {10.3233/JCS-140507}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/Akinyele0HP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/ArapinisPRR14, author = {Myrto Arapinis and Joshua Phillips and Eike Ritter and Mark Dermot Ryan}, title = {StatVerif: Verification of stateful processes}, journal = {J. Comput. Secur.}, volume = {22}, number = {5}, pages = {743--821}, year = {2014}, url = {https://doi.org/10.3233/JCS-140501}, doi = {10.3233/JCS-140501}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/ArapinisPRR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/BackesHM14, author = {Michael Backes and Catalin Hritcu and Matteo Maffei}, title = {Union, intersection and refinement types and reasoning about type disjointness for secure protocol implementations}, journal = {J. Comput. Secur.}, volume = {22}, number = {2}, pages = {301--353}, year = {2014}, url = {https://doi.org/10.3233/JCS-130493}, doi = {10.3233/JCS-130493}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/BackesHM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/BansalBDM14, author = {Chetan Bansal and Karthikeyan Bhargavan and Antoine Delignat{-}Lavaud and Sergio Maffeis}, title = {Discovering concrete attacks on website authorization by formal analysis}, journal = {J. Comput. Secur.}, volume = {22}, number = {4}, pages = {601--657}, year = {2014}, url = {https://doi.org/10.3233/JCS-140503}, doi = {10.3233/JCS-140503}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/BansalBDM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/BasinBK14, author = {David A. Basin and Samuel J. Burri and G{\"{u}}nter Karjoth}, title = {Obstruction-free authorization enforcement: Aligning security and business objectives}, journal = {J. Comput. Secur.}, volume = {22}, number = {5}, pages = {661--698}, year = {2014}, url = {https://doi.org/10.3233/JCS-140500}, doi = {10.3233/JCS-140500}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/BasinBK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/BishtHSV14, author = {Prithvi Bisht and Timothy L. Hinrichs and Nazari Skrupsky and V. N. Venkatakrishnan}, title = {Automated detection of parameter tampering opportunities and vulnerabilities in web applications}, journal = {J. Comput. Secur.}, volume = {22}, number = {3}, pages = {415--465}, year = {2014}, url = {https://doi.org/10.3233/JCS-140498}, doi = {10.3233/JCS-140498}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/BishtHSV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/BlundoCG14, author = {Carlo Blundo and Emiliano De Cristofaro and Paolo Gasti}, title = {EsPRESSO: Efficient privacy-preserving evaluation of sample set similarity}, journal = {J. Comput. Secur.}, volume = {22}, number = {3}, pages = {355--381}, year = {2014}, url = {https://doi.org/10.3233/JCS-130482}, doi = {10.3233/JCS-130482}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/BlundoCG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/BuchmannB14, author = {Nicolas Buchmann and Harald Baier}, title = {Towards a more secure and scalable verifying {PKI} of eMRTD}, journal = {J. Comput. Secur.}, volume = {22}, number = {6}, pages = {1025--1049}, year = {2014}, url = {https://doi.org/10.3233/JCS-140522}, doi = {10.3233/JCS-140522}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/BuchmannB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/ChenWT14, author = {Yen{-}Chung Chen and Yu{-}Sung Wu and Wen{-}Guey Tzeng}, title = {Preserving user query privacy in cloud-based security services}, journal = {J. Comput. Secur.}, volume = {22}, number = {6}, pages = {997--1024}, year = {2014}, url = {https://doi.org/10.3233/JCS-140520}, doi = {10.3233/JCS-140520}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/ChenWT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/DesmetJLS14, author = {Lieven Desmet and Martin Johns and Benjamin Livshits and Andrei Sabelfeld}, title = {Preface}, journal = {J. Comput. Secur.}, volume = {22}, number = {4}, pages = {467--468}, year = {2014}, url = {https://doi.org/10.3233/JCS-140506}, doi = {10.3233/JCS-140506}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/DesmetJLS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/DupressoirGJN14, author = {Fran{\c{c}}ois Dupressoir and Andrew D. Gordon and Jan J{\"{u}}rjens and David A. Naumann}, title = {Guiding a general-purpose {C} verifier to prove cryptographic protocols}, journal = {J. Comput. Secur.}, volume = {22}, number = {5}, pages = {823--866}, year = {2014}, url = {https://doi.org/10.3233/JCS-140508}, doi = {10.3233/JCS-140508}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/DupressoirGJN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/GroefDNP14, author = {Willem De Groef and Dominique Devriese and Nick Nikiforakis and Frank Piessens}, title = {Secure multi-execution of web scripts: Theory and practice}, journal = {J. Comput. Secur.}, volume = {22}, number = {4}, pages = {469--509}, year = {2014}, url = {https://doi.org/10.3233/JCS-130495}, doi = {10.3233/JCS-130495}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/GroefDNP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/Guttman14, author = {Joshua D. Guttman}, title = {Establishing and preserving protocol security goals}, journal = {J. Comput. Secur.}, volume = {22}, number = {2}, pages = {203--267}, year = {2014}, url = {https://doi.org/10.3233/JCS-140499}, doi = {10.3233/JCS-140499}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/Guttman14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/HeiderichNSHS14, author = {Mario Heiderich and Marcus Niemietz and Felix Schuster and Thorsten Holz and J{\"{o}}rg Schwenk}, title = {Scriptless attacks: Stealing more pie without touching the sill}, journal = {J. Comput. Secur.}, volume = {22}, number = {4}, pages = {567--599}, year = {2014}, url = {https://doi.org/10.3233/JCS-130494}, doi = {10.3233/JCS-130494}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/HeiderichNSHS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/LuVA14, author = {Haibing Lu and Jaideep Vaidya and Vijayalakshmi Atluri}, title = {An optimization framework for role mining}, journal = {J. Comput. Secur.}, volume = {22}, number = {1}, pages = {1--31}, year = {2014}, url = {https://doi.org/10.3233/JCS-130484}, doi = {10.3233/JCS-130484}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/LuVA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/NgoSH14, author = {Tri Minh Ngo and Mari{\"{e}}lle Stoelinga and Marieke Huisman}, title = {Effective verification of confidentiality for multi-threaded programs}, journal = {J. Comput. Secur.}, volume = {22}, number = {2}, pages = {269--300}, year = {2014}, url = {https://doi.org/10.3233/JCS-130492}, doi = {10.3233/JCS-130492}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/NgoSH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/NiuRW14, author = {Jianwei Niu and Mark Reith and William H. Winsborough}, title = {Formal verification of security properties in trust management policy}, journal = {J. Comput. Secur.}, volume = {22}, number = {1}, pages = {69--153}, year = {2014}, url = {https://doi.org/10.3233/JCS-130490}, doi = {10.3233/JCS-130490}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/NiuRW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/PeddintiS14, author = {Sai Teja Peddinti and Nitesh Saxena}, title = {Web search query privacy: Evaluating query obfuscation and anonymizing networks}, journal = {J. Comput. Secur.}, volume = {22}, number = {1}, pages = {155--199}, year = {2014}, url = {https://doi.org/10.3233/JCS-130491}, doi = {10.3233/JCS-130491}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/PeddintiS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/PolitzGK14, author = {Joe Gibbs Politz and Arjun Guha and Shriram Krishnamurthi}, title = {Typed-based verification of Web sandboxes}, journal = {J. Comput. Secur.}, volume = {22}, number = {4}, pages = {511--565}, year = {2014}, url = {https://doi.org/10.3233/JCS-140504}, doi = {10.3233/JCS-140504}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/PolitzGK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/SchlesingerPSWZ14, author = {Cole Schlesinger and Karthik Pattabiraman and Nikhil Swamy and David Walker and Benjamin G. Zorn}, title = {Modular protections against non-control data attacks}, journal = {J. Comput. Secur.}, volume = {22}, number = {5}, pages = {699--742}, year = {2014}, url = {https://doi.org/10.3233/JCS-140502}, doi = {10.3233/JCS-140502}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/SchlesingerPSWZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/SoupionisKEG14, author = {Yannis Soupionis and Remous{-}Aris Koutsiamanis and Pavlos S. Efraimidis and Dimitris Gritzalis}, title = {A game-theoretic analysis of preventing spam over Internet Telephony via audio CAPTCHA-based authentication}, journal = {J. Comput. Secur.}, volume = {22}, number = {3}, pages = {383--413}, year = {2014}, url = {https://doi.org/10.3233/JCS-140496}, doi = {10.3233/JCS-140496}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/SoupionisKEG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/UzunAVSFPM14, author = {Emre Uzun and Vijayalakshmi Atluri and Jaideep Vaidya and Shamik Sural and Anna Lisa Ferrara and Gennaro Parlato and P. Madhusudan}, title = {Security analysis for temporal role based access control}, journal = {J. Comput. Secur.}, volume = {22}, number = {6}, pages = {961--996}, year = {2014}, url = {https://doi.org/10.3233/JCS-140510}, doi = {10.3233/JCS-140510}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/UzunAVSFPM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/X14, title = {Foundational aspects of security}, journal = {J. Comput. Secur.}, volume = {22}, number = {2}, pages = {201--202}, year = {2014}, url = {https://doi.org/10.3233/JCS-140497}, doi = {10.3233/JCS-140497}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/X14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/YuenSM14, author = {Tsz Hon Yuen and Willy Susilo and Yi Mu}, title = {Towards a cryptographic treatment of publish/subscribe systems}, journal = {J. Comput. Secur.}, volume = {22}, number = {1}, pages = {33--67}, year = {2014}, url = {https://doi.org/10.3233/JCS-130486}, doi = {10.3233/JCS-130486}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/YuenSM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.