Journal of Computer Security

Titel Veröffentlichungsdatum Sprache Zitate
Substring search over encrypted data2017/11/30
A side-channel attack on smartphones: Deciphering key taps using built-in microphones2018/01/08
Reasoning about firewall policies through refinement and composition2018/01/08
Enforcing authorizations while protecting access confidentiality12018/01/08
The bi-objective workflow satisfiability problem and workflow resiliency12017/03/16
An interpolation-based method for the verification of security protocols2017/08/24
Detecting opinion spammer groups and spam targets through community discovery and sentiment analysis2017/05/29
Automatically finding execution scenarios to deploy security-sensitive workflows2017/05/29
On the security and usability of dynamic cognitive game CAPTCHAs2017/05/29
Automated reasoning for equivalences in the applied pi calculus with barriers2018/04/09
Prometheus: Analyzing WebInject-based information stealers2017/05/02
Strategy analysis for cloud storage reliability management based on game theory2017/05/02
Minimum cost rule enforcement for cooperative database access2016/06/08
A severity-based quantification of data leakages in database systems2016/06/08
Efficient integrity checks for join queries in the cloud12016/06/08
Provably secure memory isolation for Linux on ARM2016/12/01
A formal analysis of the Norwegian E-voting protocol2017/03/16
A verified information-flow architecture2016/12/01
Model-checking trace-based information flow properties for infinite-state systems2016/11/08
Exploring large scale security system reproducibility with the LESS simulator2016/11/08
DRC-EDI: An integrity protection scheme based on data right confirmation for mobile edge computing2024/03/08
Practical multi-party private set intersection cardinality and intersection-sum protocols under arbitrary collusion12024/04/04
Discriminative spatial-temporal feature learning for modeling network intrusion detection systems2024/02/02
Accurate authentication based on ECG using deep learning2024/01/16
Symbolic protocol verification with dice12023/10/13
Securing blockchain-based timed data release against adversarial attacks12023/11/10
Con2Mix: A semi-supervised method for imbalanced tabular security data12023/11/10
A formal model of Checked C12023/10/13
Robust, revocable, forward and backward adaptively secure attribute-based encryption with outsourced decryption12023/11/10
The intrinsic dimensionality of network datasets and its applications12023/11/10