Home
Research Trends
Scientific Articles
Journals
Scientific Journals
Open Access Journals
Journals Search
Contact
Sign Up
Login
Language
English
German
Journal of Computer Security
Title
Publication Date
Language
Citations
The economic cost of publicly announced information security breaches: empirical evidence from the stock market*
2003/07/01
34
Securing vehicular ad hoc networks
2007/01/01
25
Searchable symmetric encryption: Improved definitions and efficient constructions
2011/11/04
23
The impact of information security breaches: Has there been a downward shift in costs?
2011/02/14
11
Intrusion detection using sequences of system calls
1998/07/01
11
Automatic analysis of malware behavior using machine learning
2011/06/20
8
Practical automated detection of stealthy portscans
2002/01/01
6
Distributed credential chain discovery in trust management*
2003/01/01
5
Secure attribute-based systems
2010/08/16
4
New filtering approaches for phishing email
2010/01/01
4
Toward cost-sensitive modeling for intrusion detection and response
2002/01/01
4
Certificate chain discovery in SPKI/SDSI
2001/10/01
3
Secure set intersection cardinality with application to association rule mining
2005/10/04
3
Reducing Timing Channels with Fuzzy Time
1992/10/01
2
Security of trusted repeater quantum key distribution networks
2010/01/01
2
Practical eavesdropping and skimming attacks on high-frequency RFID tokens
2011/03/14
2
Strand spaces: proving security protocols correct
1999/04/01
2
Automatic verification of correspondences for security protocols*
2009/07/02
2
Constructions of certificate-based signature secure against key replacement attacks*
2010/06/01
2
CookiExt: Patching the browser against session hijacking attacks
2015/09/16
2
Software watermarking in the frequency domain: Implementation, analysis, and attacks
2005/12/06
2
Preserving user query privacy in cloud-based security services
2014/12/16
1
WebCallerID: Leveraging cellular networks for Web authentication
2011/11/04
1
STATL: An attack language for state-based intrusion detection
2002/01/01
1
GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks*
2006/10/20
1
Neural network Trojan
2013/03/01
1
P 5 : A protocol for scalable anonymous communication
2005/12/22
1
Exploiting open functionality in SMS-capable cellular networks
2008/11/03
1
Towards Operational Measures of Computer Security
1993/04/01
1
Process algebra and non-interference
2001/01/01
1
«
‹ Pervious
Next ›
»