Heim
Forschungstrends
Wissenschaftliche Artikel
Zeitschriften
Wissenschaftliche Zeitschriften
Open Access Journals
Zeitschriftensuche
Kontakt
Melden Sie sich an
Login
Sprache
English
German
Journal of Computer Security
Titel
Veröffentlichungsdatum
Sprache
Zitate
Special issue: Security and Cryptography for Networks – SCN 2020
2022/01/20
Special issue on socio-technical aspects in security – editorial
2022/07/04
PESrank: An Explainable online password strength estimator1
2022/11/23
The boundedly rational employee: Security economics for behaviour intervention support in organizations1
2022/07/04
Strong watermark numbers encoded as reducible permutation graphs against edge modification attacks
2023/04/06
Deep learning-based medical diagnostic services: A secure, lightweight, and accurate realization1
2022/11/23
Resource and timing aspects of security protocols
2021/05/07
Scramblesuit: An effective timing side-channels framework for malware sandbox evasion1
2022/11/23
Towards verifiable web-based code review systems
2023/04/06
USBCaptchaIn: Preventing (un)conventional attacks from promiscuously used USB devices in industrial control systems1
2021/02/03
A large-scale analysis of HTTPS deployments: Challenges, solutions, and recommendations
2021/02/03
Research perspectives on fully homomorphic encryption models for cloud sector1
2021/03/29
A graph-based framework for malicious software detection and classification utilizing temporal-graphs
2021/10/27
Deep learning for detecting logic-flaw-exploiting network attacks: An end-to-end approach
2022/08/25
Privacy-preserving policy evaluation in multi-party access control
2022/05/25
Advances in spam detection for email spam, web spam, social network spam, and review spam: ML-based and nature-inspired-based techniques
2021/08/25
IsaNet: A framework for verifying secure data plane protocols
2023/05/29
A formal framework for security analysis of NFC mobile coupon protocols
2015/09/22
PCPOR: Public and constant-cost proofs of retrievability in cloud1
2015/07/02
Expected loss analysis for authentication in constrained channels
2015/07/02
Verifying layered security protocols
2015/07/02
Proved generation of implementations from computationally secure protocol specifications1
2015/07/02
What, indeed, is intransitive noninterference?1
2015/06/03
Practical and provably secure distance-bounding
2015/06/03
Accountable wiretapping – or – I know they can hear you now
2015/06/03
k-jump: A strategy to design publicly-known algorithms for privacy preserving micro-data disclosure
2015/06/03
Hybrid adversarial defense: Merging honeypots and traditional security methods1
2018/08/09
HardIDX: Practical and secure index with SGX in a malicious environment
2018/08/09
Low-deterministic security for low-nondeterministic programs1
2018/04/09
Mining hierarchical temporal roles with multiple metrics
2017/11/30
«
‹ Durchlässig
Nächste ›
»