Heim
Forschungstrends
Wissenschaftliche Artikel
Zeitschriften
Wissenschaftliche Zeitschriften
Open Access Journals
Zeitschriftensuche
Kontakt
Melden Sie sich an
Login
Sprache
English
German
Journal of Computer Security
Titel
Veröffentlichungsdatum
Sprache
Zitate
Substring search over encrypted data
2017/11/30
A side-channel attack on smartphones: Deciphering key taps using built-in microphones
2018/01/08
Reasoning about firewall policies through refinement and composition
2018/01/08
Enforcing authorizations while protecting access confidentiality1
2018/01/08
The bi-objective workflow satisfiability problem and workflow resiliency1
2017/03/16
An interpolation-based method for the verification of security protocols
2017/08/24
Detecting opinion spammer groups and spam targets through community discovery and sentiment analysis
2017/05/29
Automatically finding execution scenarios to deploy security-sensitive workflows
2017/05/29
On the security and usability of dynamic cognitive game CAPTCHAs
2017/05/29
Automated reasoning for equivalences in the applied pi calculus with barriers
2018/04/09
Prometheus: Analyzing WebInject-based information stealers
2017/05/02
Strategy analysis for cloud storage reliability management based on game theory
2017/05/02
Minimum cost rule enforcement for cooperative database access
2016/06/08
A severity-based quantification of data leakages in database systems
2016/06/08
Efficient integrity checks for join queries in the cloud1
2016/06/08
Provably secure memory isolation for Linux on ARM
2016/12/01
A formal analysis of the Norwegian E-voting protocol
2017/03/16
A verified information-flow architecture
2016/12/01
Model-checking trace-based information flow properties for infinite-state systems
2016/11/08
Exploring large scale security system reproducibility with the LESS simulator
2016/11/08
DRC-EDI: An integrity protection scheme based on data right confirmation for mobile edge computing
2024/03/08
Practical multi-party private set intersection cardinality and intersection-sum protocols under arbitrary collusion1
2024/04/04
Discriminative spatial-temporal feature learning for modeling network intrusion detection systems
2024/02/02
Accurate authentication based on ECG using deep learning
2024/01/16
Symbolic protocol verification with dice1
2023/10/13
Securing blockchain-based timed data release against adversarial attacks1
2023/11/10
Con2Mix: A semi-supervised method for imbalanced tabular security data1
2023/11/10
A formal model of Checked C1
2023/10/13
Robust, revocable, forward and backward adaptively secure attribute-based encryption with outsourced decryption1
2023/11/10
The intrinsic dimensionality of network datasets and its applications1
2023/11/10
«
‹ Durchlässig
Nächste ›
»