default search action
Journal of Computer Security, Volume 27
Volume 27, Number 1, 2019
- Matteo Maffei, Giulio Malavolta, Manuel Reinert, Dominique Schröder:
Group ORAM for privacy and access control in outsourced personal records. 1-47 - Sébastien Salva, Loukmen Regainia:
A catalogue associating security patterns and attack steps to design secure applications. 49-74 - Grégory Demay, Peter Gazi, Ueli Maurer, Björn Tackmann:
Per-session security: Password-based cryptography revisited. 75-111 - Frederik Armknecht, Zinaida Benenson, Philipp Morgner, Christian Müller, Christian Riess:
Privacy implications of room climate data. 113-136 - Sandrine Blazy, David Pichardie, Alix Trieu:
Verifying constant-time implementations by abstract interpretation. 137-163
Volume 27, Number 2, 2019
- Suryadipta Majumdar, Azadeh Tabiban, Yosr Jarraya, Momen Oqaily, Amir Alimohammadifar, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
Learning probabilistic dependencies among events for proactive security auditing in clouds. 165-202 - Cas Cremers, Martin Dehnel-Wild, Kevin Milner:
Secure authentication in the grid: A formal analysis of DNP3 SAv5. 203-232 - Stefano Calzavara, Alvise Rabitti, Michele Bugliesi:
Sub-session hijacking on the web: Root causes and prevention. 233-257 - Yangguang Tian, Yingjiu Li, Guomin Yang, Willy Susilo, Yi Mu, Hui Cui, Yinghui Zhang:
DABKE: Secure deniable attribute-based key exchange framework. 259-275
Volume 27, Number 3, 2019
- Lucca Hirschi, David Baelde, Stéphanie Delaune:
A method for unbounded verification of privacy-type properties. 277-342 - Matteo Zavatteri, Luca Viganò:
Last man standing: Static, decremental and dynamic resiliency via controller synthesis. 343-373 - Xingjie Yu, Michael Thang Shiwen, Yingjiu Li, Robert Huijie Deng:
Collusion attacks and fair time-locked deposits for fast-payment transactions in Bitcoin. 375-403
Volume 27, Number 4, 2019
- Kiran S. Balagani, Matteo Cardaioli, Mauro Conti, Paolo Gasti, Martin Georgiev, Tristan Gurtler, Daniele Lain, Charissa Miller, Kendall Molas, Nikita Samarin, Eugen Saraci, Gene Tsudik, Lynn Wu:
PILOT: Password and PIN information leakage from obfuscated typing videos. 405-425 - Nawaf Alhebaishi, Lingyu Wang, Sushil Jajodia, Anoop Singhal:
Mitigating the insider threat of remote administrators in clouds through maintenance task assignments. 427-458 - Tobias Urban, Dennis Tatang, Thorsten Holz, Norbert Pohlmann:
Analyzing leakage of personal information by malware. 459-481 - Gunjan Batra, Vijayalakshmi Atluri, Jaideep Vaidya, Shamik Sural:
Deploying ABAC policies using RBAC systems. 483-506
Volume 27, Number 5, 2019
- George Stergiopoulos, Georgia Chronopoulou, Evangelos Bitsikas, Nikolaos Tsalis, Dimitris Gritzalis:
Using side channel TCP features for real-time detection of malware connections. 507-520 - Juan E. Rubio, Rodrigo Roman, Cristina Alcaraz, Yan Zhang:
Tracking APTs in industrial ecosystems: A proof of concept. 521-546 - Ziqiang Ma, Quanwei Cai, Jingqiang Lin, Bo Luo, Jiwu Jing:
Towards the optimal performance of integrating Warm and Delay against remote cache timing side channels on block ciphers. 547-580
Volume 27, Number 6, 2019
- Rubia Fatima, Affan Yasin, Lin Liu, Jianmin Wang:
How persuasive is a phishing email? A phishing game for phishing awareness. 581-612 - Saed Alrabaee, Paria Shirani, Lingyu Wang, Mourad Debbabi, Aiman Hanna:
Decoupling coding habits from functionality for effective binary authorship attribution. 613-648 - Thang Hoang, Attila A. Yavuz, F. Betül Durak, Jorge Guajardo:
A multi-server oblivious dynamic searchable encryption framework. 649-676
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.