The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "J. Comput. Secur."( http://dblp.L3S.de/Venues/J._Comput._Secur. )

URL (DBLP): http://dblp.uni-trier.de/db/journals/csec

Publication years (Num. hits)
1992-1993 (31) 1995-1996 (27) 1997 (16) 1998-1999 (20) 2000-2001 (23) 2002 (15) 2003 (20) 2004 (27) 2005 (29) 2006 (23) 2007 (23) 2008 (28) 2009 (29) 2010 (40) 2011 (36) 2012 (23) 2013 (28) 2014 (25) 2015 (26) 2016 (22) 2017 (20) 2018 (26) 2019 (22) 2020 (20) 2021 (20) 2022 (33) 2023 (25) 2024 (3)
Publication types (Num. hits)
article(680)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 680 publication records. Showing 680 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Yubao Zhang, Haining Wang, Angelos Stavrou A multiview clustering framework for detecting deceptive reviews. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Vinod Ramesh Falmari, M. Brindha 0001 Secure authentication protocols to resist off-line attacks on authentication data table. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Stephen Kahara Wanjau, Geoffrey Mariga Wambugu, Aaron Mogeni Oirere, Geoffrey Muchiri Muketha Discriminative spatial-temporal feature learning for modeling network intrusion detection systems. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Matt Gorbett, Caspian Siebert, Hossein Shirazi, Indrakshi Ray The intrinsic dimensionality of network datasets and its applications. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Jingzhe Wang, Balaji Palanisamy Securing blockchain-based timed data release against adversarial attacks. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Radu Ciucanu, Pascal Lafourcade 0001, Marius Lombard-Platet, Marta Soare Secure protocols for cumulative reward maximization in stochastic multi-armed bandits. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Asma Salem, Ahmad Abdel-Aziz Sharieh, Riad Jabri Online User Authentication System Using Keystroke Dynamics. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Shamik Sural, Haibing Lu Guest editors' introduction. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Flávio Neves, Rafael Roque de Souza, Juliana Sousa, Michel S. Bonfim, Vinicius C. Garcia Data privacy in the Internet of Things based on anonymization: A review. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Diego Sempreboni, Luca Viganò 0001 A mutation-based approach for the formal and automated analysis of security ceremonies. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Hammad Afzali, Santiago Torres-Arias, Reza Curtmola, Justin Cappos Towards verifiable web-based code review systems. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Stefano Calzavara, Pietro Ferrara 0001, Claudio Lucchese Certifying machine learning models against evasion attacks by program analysis. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1David Mestel, Johannes Müller 0001, Pascal Reisert How efficient are replay attacks against vote privacy? A formal quantitative analysis. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Ziyang Han, Qingqing Ye 0001, Haibo Hu 0001 OTKI-F: An efficient memory-secure multi-keyword fuzzy search protocol. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Anna Mpanti, Stavros D. Nikolopoulos, Leonidas Palios Strong watermark numbers encoded as reducible permutation graphs against edge modification attacks. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Mohamed Hassaoui, Mohamed Hanini, Said El Kafhali Domain generated algorithms detection applying a combination of a deep feature selection and traditional machine learning models. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Jianfeng Zhang, Wensheng Zhang, Jingdong Xu StegEdge: Privacy protection of unknown sensitive attributes in edge intelligence via deception. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Tobias Klenze, Christoph Sprenger 0001, David A. Basin IsaNet: A framework for verifying secure data plane protocols. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Liyi Li 0002, Yiyun Liu, Deena L. Postol, Leonidas Lampropoulos, David Van Horn, Michael Hicks 0001 A formal model of Checked C. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Vincent Cheval, Raphaëlle Crubillé, Steve Kremer Symbolic protocol verification with dice. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Priyanka Mondal, Maximilian Algehed, Owen Arden Flow-limited authorization for consensus, replication, and secret sharing. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Natasha Fernandes, Annabelle McIver, Catuscia Palamidessi, Ming Ding 0001 Universal optimality and robust utility bounds for metric differential privacy. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Kengo Zenitani A scalable algorithm for network reachability analysis with cyclic attack graphs. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Constantin Catalin Dragan, François Dupressoir, Ehsan Estaji, Kristian Gjøsteen, Thomas Haines, Peter Y. A. Ryan, Peter B. Rønne, Morten Rotvold Solberg Machine-checked proofs of privacy against malicious boards for Selene & Co. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Ashish R. Chaudhari, Bhavesh N. Gohil, Udai Pratap Rao A review on cloud security issues and solutions. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Stefano Calzavara, David A. Naumann Special issue: 35th IEEE Computer Security Symposium - CSF 2022. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Anis Bkakria Robust, revocable, forward and backward adaptively secure attribute-based encryption with outsourced decryption. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Xiaodi Li, Latifur Khan, Mahmoud Zamani, Shamila Wickramasuriya, Kevin W. Hamlen, Bhavani Thuraisingham Con2Mix: A semi-supervised method for imbalanced tabular security data. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Antonio Nappa, Aaron Úbeda-Portugués, Panagiotis Papadopoulos, Matteo Varvello, Juan Tapiador, Andrea Lanzi Scramblesuit: An effective timing side-channels framework for malware sandbox evasion. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Antti Hakkala, Jani Koskinen Personal data protection in the age of mass surveillance. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Ryan Sheatsley, Nicolas Papernot, Michael J. Weisman, Gunjan Verma, Patrick D. McDaniel Adversarial examples for network intrusion detection systems. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Brian A. Powell Securing LSB embedding against structural steganalysis. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Shabnam Kasra Kermanshahi, Rafael Dowsley, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Surya Nepal, Xun Yi, Shangqi Lai Range search on encrypted spatial data with dynamic updates. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Carmit Hazay, Mor Lilintal Gradual GRAM and secure computation for RAM programs. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Ben Kreuter, Sarvar Patel, Ben Terner Private identity agreement for private set functionalities. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Michele De Donno, Xenofon Fafoutis, Nicola Dragoni AntibIoTic: The Fog-enhanced distributed security system to protect the (legacy) Internet of Things. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Véronique Cortier, Stéphanie Delaune, Jannik Dreier, Elise Klein 0002 Automatic generation of sources lemmas in Tamarin: Towards automatic proofs of security protocols. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Giampaolo Bella, Rosario Giustolisi, Carsten Schürmann 0001 Modelling human threats in security ceremonies. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Thomas Groß 0001, Luca Viganò 0001 Special issue on socio-technical aspects in security - editorial. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Albesë Demjaha, Simon Parkin, David J. Pym The boundedly rational employee: Security economics for behaviour intervention support in organizations. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Zhelei Zhou, Bingsheng Zhang, Yuan Chen, Jiaqi Li, Yajin Zhou, Yibiao Lu, Kui Ren 0001, Phuc Thai, Hong-Sheng Zhou Scriptable and composable SNARKs in the trusted hardware model. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Ivan Damgård, Thomas P. Jakobsen, Jesper Buus Nielsen, Jakob Illeborg Pagter, Michael Bæksvang Østergaard Fast threshold ECDSA with honest majority. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Wojciech Jamroga, Damian Kurpiewski, Vadim Malvone How to measure usable security: Natural strategies in voting protocols. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Carsten Baum, Daniel Escudero 0001, Alberto Pedrouzo-Ulloa, Peter Scholl, Juan Ramón Troncoso-Pastoriza Efficient protocols for oblivious linear function evaluation from ring-LWE. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1George Chatzisofroniou, Panayiotis Kotzanikolaou Exploiting WiFi usability features for association attacks in IEEE 802.11: Attack analysis and mitigation controls. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Simon Parkin, Yi Ting Chua 0001 A cyber-risk framework for coordination of the prevention and preservation of behaviours. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Jannik Dreier, Jean-Guillaume Dumas, Pascal Lafourcade 0001, Léo Robert Optimal threshold padlock systems. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Lydia Garms, Siaw-Lynn Ng, Elizabeth A. Quaglia, Giulia Traverso Anonymity and rewards in peer rating systems. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Imre Lendák, Balázs Indig, Gábor Palkó WARChain: Consensus-based trust in web archives via proof-of-stake blockchain technology. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Fabio Aiolli, Mauro Conti, Stjepan Picek, Mirko Polato On the feasibility of crawling-based attacks against recommender systems. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Sebastian Paul, Patrik Scheible, Friedrich Wiemer Towards post-quantum security for cyber-physical systems: Integrating PQC into industrial M2M communication. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Scott Harper, Maryam Mehrnezhad, John C. Mace User Privacy Concerns in Commercial Smart Buildings. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Isaac Amankona Obiri, Qi Xia, Hu Xia, Eric Affum, Abla Smahi, Jianbin Gao Personal health records sharing scheme based on attribute based signcryption with data integrity verifiable. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Qingtian Zou, Anoop Singhal, Xiaoyan Sun 0003, Peng Liu 0005 Deep learning for detecting logic-flaw-exploiting network attacks: An end-to-end approach. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1 Selected Papers From ESORICS 2020. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2022 DBLP  BibTeX  RDF
1Dario Catalano, Georg Fuchsbauer, Azam Soleimanian Double-authentication-preventing signatures in the standard model. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Liron David, Avishai Wool PESrank: An Explainable online password strength estimator. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Kadam Vikas Samarthrao, Vandana Milind Rohokale Enhancement of email spam detection using improved deep learning algorithms for cyber security. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Clemente Galdi, Vladimir Kolesnikov Special issue: Security and Cryptography for Networks - SCN 2020. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Elisa Bertino, Haya Schulmann, Michael Waidner Special issue ESORICS 2021. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Xiaoning Liu 0002, Yifeng Zheng, Xingliang Yuan, Xun Yi Deep learning-based medical diagnostic services: A secure, lightweight, and accurate realization. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Sonam Mittal, K. R. Ramkumar Research perspectives on fully homomorphic encryption models for cloud sector. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Chiara Bodei, Lorenzo Ceragioli, Pierpaolo Degano, Riccardo Focardi, Letterio Galletta, Flaminia L. Luccio, Mauro Tempesta, Lorenzo Veronese FWS: Analyzing, maintaining and transcompiling firewalls. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Sonam Mittal, K. R. Ramkumar Research perspectives on fully homomorphic encryption models for cloud sector. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Mina Sheikhalishahi, Ischa Stork, Nicola Zannone Privacy-preserving policy evaluation in multi-party access control. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Yangguang Tian, Yingjiu Li, Robert H. Deng, Binanda Sengupta, Guomin Yang Lattice-based remote user authentication from reusable fuzzy signature. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Guangjun Li, Preetpal Sharma, Lei Pan 0002, Sutharshan Rajasegarar, Chandan K. Karmakar, Nicholas Charles Patterson Deep learning algorithms for cyber security applications: A survey. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Ben Smyth Ballot secrecy: Security definition, sufficient conditions, and analysis of Helios. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Himani Sharma, Navdeep Kanwal Video interframe forgery detection: Classification, technique & new dataset. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Helen-Maria Dounavi, Anna Mpanti, Stavros D. Nikolopoulos, Iosif Polenakis A graph-based framework for malicious software detection and classification utilizing temporal-graphs. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Md. Morshed Alam, Weichao Wang A comprehensive survey on data provenance: State-of-the-art approaches and their deployments for IoT security enforcement. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Panagiotis Grontas, Aris Pagourtzis, Alexandros Zacharakis, Bingsheng Zhang Publicly auditable conditional blind signatures. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Qinwen Hu, Muhammad Rizwan Asghar, Nevil Brownlee A large-scale analysis of HTTPS deployments: Challenges, solutions, and recommendations. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Zhiwu Xu 0001, Hongxu Chen 0001, Alwen Tiu, Yang Liu 0003, Kunal Sareen A permission-dependent type system for secure information flow analysis. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Abraão Aires Urquiza, Musab A. Alturki, Tajana Ban Kirigin, Max I. Kanovich, Vivek Nigam, Andre Scedrov, Carolyn L. Talcott Resource and timing aspects of security protocols. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Andronicus Ayobami Akinyelu Advances in spam detection for email spam, web spam, social network spam, and review spam: ML-based and nature-inspired-based techniques. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Jianguo Jiang, Boquan Li 0002, Baole Wei, Gang Li 0009, Chao Liu 0020, Weiqing Huang, Meimei Li, Min Yu 0001 FakeFilter: A cross-distribution Deepfake detection system with domain adaptation. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Ghandi Hessam, Ghassan Saba, M. Iyad Alkhayat A new approach for detecting violation of data plane integrity in Software Defined Networks. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Hossein Shirazi, Bruhadeshwar Bezawada, Indrakshi Ray, Chuck Anderson 0001 Directed adversarial sampling attacks on phishing detection. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Abhishek Bichhawat, Vineet Rajani, Deepak Garg 0001, Christian Hammer 0001 Permissive runtime information flow control in the presence of exceptions. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Federico Griscioli, Maurizio Pizzonia USBCaptchaIn: Preventing (un)conventional attacks from promiscuously used USB devices in industrial control systems. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Yifang Wu, Jianjun Huang 0001, Bin Liang 0002, Wenchang Shi Do not jail my app: Detecting the Android plugin environments by time lag contradiction. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Jannik Dreier, Lucca Hirschi, Sasa Radomirovic, Ralf Sasse Verification of stateful cryptographic protocols with exclusive OR. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Xusheng Li, Zhisheng Hu, Haizhou Wang, Yiwei Fu, Ping Chen 0003, Minghui Zhu, Peng Liu 0005 DeepReturn: A deep neural network can learn how to detect previously-unseen ROP payloads without using any heuristics. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Mabin Joseph, Gautham Sekar, R. Balasubramanian Side channel analysis of SPECK. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Hammad Afzali, Santiago Torres-Arias, Reza Curtmola, Justin Cappos Towards adding verifiability to web-based Git repositories. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Yangguang Tian, Yingjiu Li, Robert H. Deng, Nan Li 0007, Pengfei Wu, Anyi Liu A new framework for privacy-preserving biometric-based remote user authentication. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Samuel Yeom, Irene Giacomelli, Alan Menaged, Matt Fredrikson, Somesh Jha Overfitting, robustness, and malicious algorithms: A study of potential causes of privacy risk in machine learning. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Phu H. Phung, Rakesh S. V. Reddy, Steven Cap, Anthony Pierce, Abhinav Mohanty, Meera Sridhar A multi-party, fine-grained permission and policy enforcement framework for hybrid mobile applications. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Kushal Babel, Vincent Cheval, Steve Kremer On the semantics of communications when verifying equivalence properties. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Sanjit Chatterjee, Shravan Kumar Parshuram Puria, Akash Shah Efficient backward private searchable encryption. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Hongcheng Li, Jianjun Huang 0001, Bin Liang 0002, Wenchang Shi, Yifang Wu, Shilei Bai Identifying parasitic malware as outliers by code clustering. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Diptendu Mohan Kar, Indrajit Ray, Jenna Gallegos, Jean Peccoud, Indrakshi Ray Synthesizing DNA molecules with identity-based digital signatures to prevent malicious tampering and enabling source attribution. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Federico De Meo, Luca Viganò 0001 A formal and automated approach to exploiting multi-stage attacks of web applications. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Miguel Ángel Díaz de León Guillén, Victor Morales-Rocha, Luis Felipe Fernández Martínez A systematic review of security threats and countermeasures in SaaS. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Christian Skalka, Sepehr Amir-Mohammadian, Samuel Clark Maybe tainted data: Theory and a case study. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Tachio Terauchi, Timos Antonopoulos Bucketing and information flow analysis for provable timing attack mitigation. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Vineet Rajani, Deepak Garg 0001 On the expressiveness and semantics of information flow types. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Elisavet Kozyri, Fred B. Schneider RIF: Reactive information flow labels. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Rui Liu, Jun Song 0003, Zhiming Huang 0002, Jianping Pan 0001 EQRC: A secure QR code-based E-coupon framework supporting online and offline transactions. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 680 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license