Journal of Computer Security

Titel Veröffentlichungsdatum Sprache Zitate
Special issue: Security and Cryptography for Networks – SCN 20202022/01/20
Special issue on socio-technical aspects in security – editorial2022/07/04
PESrank: An Explainable online password strength estimator12022/11/23
The boundedly rational employee: Security economics for behaviour intervention support in organizations12022/07/04
Strong watermark numbers encoded as reducible permutation graphs against edge modification attacks2023/04/06
Deep learning-based medical diagnostic services: A secure, lightweight, and accurate realization12022/11/23
Resource and timing aspects of security protocols2021/05/07
Scramblesuit: An effective timing side-channels framework for malware sandbox evasion12022/11/23
Towards verifiable web-based code review systems2023/04/06
USBCaptchaIn: Preventing (un)conventional attacks from promiscuously used USB devices in industrial control systems12021/02/03
A large-scale analysis of HTTPS deployments: Challenges, solutions, and recommendations2021/02/03
Research perspectives on fully homomorphic encryption models for cloud sector12021/03/29
A graph-based framework for malicious software detection and classification utilizing temporal-graphs2021/10/27
Deep learning for detecting logic-flaw-exploiting network attacks: An end-to-end approach2022/08/25
Privacy-preserving policy evaluation in multi-party access control2022/05/25
Advances in spam detection for email spam, web spam, social network spam, and review spam: ML-based and nature-inspired-based techniques2021/08/25
IsaNet: A framework for verifying secure data plane protocols2023/05/29
A formal framework for security analysis of NFC mobile coupon protocols2015/09/22
PCPOR: Public and constant-cost proofs of retrievability in cloud12015/07/02
Expected loss analysis for authentication in constrained channels2015/07/02
Verifying layered security protocols2015/07/02
Proved generation of implementations from computationally secure protocol specifications12015/07/02
What, indeed, is intransitive noninterference?12015/06/03
Practical and provably secure distance-bounding2015/06/03
Accountable wiretapping – or – I know they can hear you now2015/06/03
k-jump: A strategy to design publicly-known algorithms for privacy preserving micro-data disclosure2015/06/03
Hybrid adversarial defense: Merging honeypots and traditional security methods12018/08/09
HardIDX: Practical and secure index with SGX in a malicious environment2018/08/09
Low-deterministic security for low-nondeterministic programs12018/04/09
Mining hierarchical temporal roles with multiple metrics2017/11/30