Journal of Computer Security

Titel Veröffentlichungsdatum Sprache Zitate
A survey of algebraic properties used in cryptographic protocols2006/02/011
Towards cost-sensitive assessment of intrusion response selection2012/06/121
Establishing and protecting digital identity in federation systems2006/06/231
Digital payment systems with passive anonymity-revoking trustees*1997/01/011
Using sample size to limit exposure to data mining2000/10/011
Detecting IEEE 802.11 MAC layer misbehavior in ad hoc networks: Robust strategies against individual and colluding attackers2007/01/011
Exploiting predictability in click-based graphical passwords*2011/06/201
Privacy-preserving incremental data dissemination2009/03/161
Verifying privacy-type properties of electronic voting protocols2009/07/021
One step ahead to multisensor data fusion for DDoS detection2005/12/061
A Classification of Security Properties for Process Algebras11995/01/011
Secure outsourced garbled circuit evaluation for mobile devices2016/04/191
Per-session security: Password-based cryptography revisited2019/01/111
Fabric: Building open distributed systems securely by construction2017/07/101
User Privacy Concerns in Commercial Smart Buildings12022/07/041
Domain generated algorithms detection applying a combination of a deep feature selection and traditional machine learning models2023/01/261
Enhancement of email spam detection using improved deep learning algorithms for cyber security2022/03/021
Efficient backward private searchable encryption2020/03/171
NetSTAT: A network-based intrusion detection system1999/01/011
Some attacks upon authenticated group key agreement protocols2003/10/011
Side channel cryptanalysis of product ciphers2000/04/011
Intrusion confinement by isolation in information systems2000/10/011
Shared and searchable encrypted data for untrusted servers2011/05/301
Web search query privacy: Evaluating query obfuscation and anonymizing networks12014/01/241
Cost effective management frameworks for intrusion detection systems2004/09/011
Verifying information flow goals in Security-Enhanced Linux2005/01/201
A cascade architecture for DoS attacks detection based on the wavelet transform2009/11/251
Reputation-based trust management2005/01/201
Eliminating counterevidence with applications to accountable certificate management12002/07/011
Athena: a novel approach to efficient automatic security protocol analysis12001/01/011