default search action
Journal of Computer Security, Volume 18
Volume 18, Number 1, 2010
- Mário Campolargo:
Foreword. - Jan Camenisch, Javier López, Fabio Massacci, Massimo Ciscato, Thomas Skordas:
JCS special issue on EU-funded ICT research on Trust and Security. 1-5 - André Bergholz, Jan De Beer, Sebastian Glahn, Marie-Francine Moens, Gerhard Paaß, Siehyun Strobel:
New filtering approaches for phishing email. 7-35 - Mads Dam, Bart Jacobs, Andreas Lundblad, Frank Piessens:
Provably correct inline monitoring for multithreaded Java-like programs. 37-59 - Louis Salvail, Momtchil Peev, Eleni Diamanti, Romain Alléaume, Norbert Lütkenhaus, Thomas Länger:
Security of trusted repeater quantum key distribution networks. 61-87 - Serdar Cabuk, Chris I. Dalton, Konrad Eriksson, Dirk Kuhlmann, HariGovind V. Ramasamy, Gianluca Ramunno, Ahmad-Reza Sadeghi, Matthias Schunter, Christian Stüble:
Towards automated security policy enforcement in multi-tenant virtual data centers. 89-121 - Claudio A. Ardagna, Jan Camenisch, Markulf Kohlweiss, Ronald Leenes, Gregory Neven, Bart Priem, Pierangela Samarati, Dieter Sommer, Mario Verdicchio:
Exploiting cryptography for privacy-enhanced access control: A result of the PRIME Project. 123-160 - Savvas Argyropoulos, Dimitrios Tzovaras, Dimosthenis Ioannidis, Ioannis G. Damousis, Michael G. Strintzis, Martin Braun, Serge Boverie:
Biometric template protection in multimodal authentication systems based on error correcting codes. 161-185
Volume 18, Number 2, 2010
- Sushil Jajodia, Jonathan K. Millen:
Editorial. 187 - Daniele Gorla, Catuscia Palamidessi:
Preface. 189 - Pasquale Malacaria:
Risk assessment of security threats for looping constructs. 191-228 - Chiara Bodei, Linda Brodo, Pierpaolo Degano, Han Gao:
Detecting and preventing type flaws at static time. 229-264 - Sardaouna Hamadou, John Mullins:
Calibrating the power of schedulers for probabilistic polynomial-time calculus. 265-316 - Stéphanie Delaune, Steve Kremer, Mark Dermot Ryan:
Symbolic bisimulation for the applied pi calculus. 317-377
Volume 18, Number 3, 2010
- Dimitrios Lekkas, Dimitris Gritzalis:
e-Passports as a means towards a Globally Interoperable Public Key Infrastructure. 379-396 - Massimiliano Pala, Sean W. Smith:
Finding the PKI needles in the Internet haystack. 397-420 - Jiguo Li, Xinyi Huang, Yi Mu, Willy Susilo, Qianhong Wu:
Constructions of certificate-based signature secure against key replacement attacks. 421-449 - Chung Ki Li, Guomin Yang, Duncan S. Wong, Xiaotie Deng, Sherman S. M. Chow:
An efficient signcryption scheme with key privacy and its extension to ring signcryption. 451-473 - David W. Chadwick, Sean Anthony, Rune Bjerk:
Instant certificate revocation and publication using WebDAV. 475-496
Volume 18, Number 4, 2010
- Atsuhiro Goto:
Preface. 497 - Samir Saklikar, Subir Saha:
Identity Federation for VoIP systems. 499-540 - Adrian Baldwin, Marco Casassa Mont, Yolanta Beres, Simon Shiu:
Assurance for federated identity management. 541-572 - Sebastian Mödersheim, Luca Viganò, David A. Basin:
Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols. 575-618 - Moritz Y. Becker, Cédric Fournet, Andrew D. Gordon:
SecPAL: Design and semantics of a decentralized authorization language. 619-665
Volume 18, Number 5, 2010
- James R. Conrad, Jim Alves-Foss, Sauchi Stephen Lee:
Analyzing uncertainty in TG protection graphs with TG/MC. 667-699 - Riccardo Pucella, Fred B. Schneider:
Independence from obfuscation: A semantic framework for diversity. 701-749 - Roberto Giacobazzi, Isabella Mastroeni:
Adjoining classified and unclassified information by abstract interpretation. 751-797 - Matthew Pirretti, Patrick Traynor, Patrick D. McDaniel, Brent Waters:
Secure attribute-based systems. 799-837 - Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei:
Hierarchies of keys in secure multicast communications. 839-860 - Nenad Jovanovic, Christopher Kruegel, Engin Kirda:
Static analysis for detecting taint-style vulnerabilities in web applications. 861-907 - Mathieu Baudet, Bogdan Warinschi, Martín Abadi:
Guessing attacks and the computational soundness of static equivalence. 909-968
Volume 18, Number 6, 2010
- Riccardo Focardi:
Editorial. 969 - Frédéric Besson, Guillaume Dufay, Thomas P. Jensen, David Pichardie:
Verifying resource access control on mobile interactive devices. 971-998 - Steve Kremer, Laurent Mazaré:
Computationally sound analysis of protocols using bilinear pairings. 999-1033 - Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell:
Inductive trace properties for computational security. 1035-1073 - Andrei Sabelfeld:
Preface. 1075 - Michael Backes, Dominique Unruh:
Computational soundness of symbolic zero-knowledge proofs. 1077-1155 - Michael R. Clarkson, Fred B. Schneider:
Hyperproperties. 1157-1210 - Stéphanie Delaune, Steve Kremer, Graham Steel:
Formal security analysis of PKCS#11 and proprietary extensions. 1211-1245 - Jean Goubault-Larrecq:
Finite models for formal security proofs. 1247-1299
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.