default search action
ACM Transactions on Information and System Security, Volume 16
Volume 16, Number 1, June 2013
- Pieter Philippaerts, Yves Younan, Stijn Muylle, Frank Piessens, Sven Lachmund, Thomas Walter:
CPM: Masking Code Pointers to Prevent Code Injection Attacks. 1 - William E. Cobb, Rusty O. Baldwin, Eric D. Laspe:
Leakage Mapping: A Systematic Methodology for Assessing the Side-Channel Information Leakage of Cryptographic Implementations. 2 - David A. Basin, Vincent Jugé, Felix Klaedtke, Eugen Zalinescu:
Enforceable Security Policies Revisited. 3 - Jason Crampton, Gregory Z. Gutin, Anders Yeo:
On the Parameterized Complexity and Kernelization of the Workflow Satisfiability Problem. 4
Volume 16, Number 2, September 2013
- Thomas Leonard, Martin Hall-May, Mike Surridge:
Modelling Access Propagation in Dynamic Systems. 5 - Yueqiang Cheng, Xuhua Ding, Robert H. Deng:
DriverGuard: Virtualization-Based Fine-Grained Protection on I/O Flows. 6 - Yangchun Fu, Zhiqiang Lin:
Bridging the Semantic Gap in Virtual Machine Introspection via Online Kernel Data Redirection. 7 - Abdul Serwadda, Vir V. Phoha:
Examining a Large Keystroke Biometrics Dataset for Statistical-Attack Openings. 8
Volume 16, Number 3, November 2013
- Mengtao Sun, Gang Tan, Joseph Siefers, Bin Zeng, Greg Morrisett:
Bringing java's wild native world under control. 9 - Benedikt Driessen, Ralf Hund, Carsten Willems, Christof Paar, Thorsten Holz:
An experimental security analysis of two satphone standards. 10 - Marina Blanton, Yihua Zhang, Keith B. Frikken:
Secure and verifiable outsourcing of large-scale biometric computations. 11 - Peter Williams, Radu Sion:
Access privacy and correctness on untrusted storage. 12
Volume 16, Number 4, April 2014
- Yossi Gilad, Amir Herzberg:
Off-Path TCP Injection Attacks. 13 - Leyla Bilge, Sevil Sen, Davide Balzarotti, Engin Kirda, Christopher Kruegel:
Exposure: A Passive DNS Analysis Service to Detect and Report Malicious Domains. 14 - Liqun Chen, Hoon Wei Lim, Guomin Yang:
Cross-Domain Password-Based Authenticated Key Exchange Revisited. 15 - Teh-Chung Chen, Torin Stepan, Scott Dick, James Miller:
An Anti-Phishing System Employing Diffused Information. 16 - Konstantine Arkoudas, Ritu Chadha, C. Jason Chiang:
Sophisticated Access Control via SMT and Logical Frameworks. 17
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.