The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "Journal of Computer Security"( http://dblp.L3S.de/Venues/Journal_of_Computer_Security )

URL (DBLP): http://dblp.uni-trier.de/db/journals/csec

Publication years (Num. hits)
1992-1993 (31) 1995-1996 (27) 1997 (16) 1998-1999 (20) 2000-2001 (23) 2002 (15) 2003 (20) 2004 (27) 2005 (29) 2006 (23) 2007 (23) 2008 (28) 2009 (29) 2010 (40) 2011 (36) 2012 (23) 2013 (28) 2014 (25) 2015 (26) 2016 (22) 2017 (20) 2018 (26) 2019 (9)
Publication types (Num. hits)
article(566)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 566 publication records. Showing 566 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Suryadipta Majumdar, Azadeh Tabiban, Yosr Jarraya, Momen Oqaily, Amir Alimohammadifar, Makan Pourzandi, Lingyu Wang 0001, Mourad Debbabi Learning probabilistic dependencies among events for proactive security auditing in clouds. Search on Bibsonomy Journal of Computer Security The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Yangguang Tian, Yingjiu Li, Guomin Yang, Willy Susilo, Yi Mu 0001, Hui Cui, Yinghui Zhang DABKE: Secure deniable attribute-based key exchange framework. Search on Bibsonomy Journal of Computer Security The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Frederik Armknecht, Zinaida Benenson, Philipp Morgner, Christian Müller, Christian Riess Privacy implications of room climate data. Search on Bibsonomy Journal of Computer Security The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Sébastien Salva, Loukmen Regainia A catalogue associating security patterns and attack steps to design secure applications. Search on Bibsonomy Journal of Computer Security The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Grégory Demay, Peter Gazi, Ueli Maurer, Björn Tackmann Per-session security: Password-based cryptography revisited. Search on Bibsonomy Journal of Computer Security The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Sandrine Blazy, David Pichardie, Alix Trieu Verifying constant-time implementations by abstract interpretation. Search on Bibsonomy Journal of Computer Security The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Matteo Maffei, Giulio Malavolta, Manuel Reinert, Dominique Schröder Group ORAM for privacy and access control in outsourced personal records. Search on Bibsonomy Journal of Computer Security The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Cas Cremers, Martin Dehnel-Wild, Kevin Milner Secure authentication in the grid: A formal analysis of DNP3 SAv5. Search on Bibsonomy Journal of Computer Security The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Stefano Calzavara, Alvise Rabitti, Michele Bugliesi Sub-session hijacking on the web: Root causes and prevention. Search on Bibsonomy Journal of Computer Security The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Christoph Sprenger 0001, David A. Basin Refining security protocols. Search on Bibsonomy Journal of Computer Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Patrick Luckett, Jeffrey Todd McDonald, William Bradley Glisson, Ryan Benton, Joel A. Dawson, Blair A. Doyle Identifying stealth malware using CPU power consumption and learning algorithms. Search on Bibsonomy Journal of Computer Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Maliheh Shirvanian, Nitesh Saxena, Dibya Mukhopadhyay Short voice imitation man-in-the-middle attacks on Crypto Phones: Defeating humans and machines. Search on Bibsonomy Journal of Computer Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Mila Dalla Preda, Isabella Mastroeni Characterizing a property-driven obfuscation strategy. Search on Bibsonomy Journal of Computer Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ling Chen, Ting Yu, Rada Chirkova k-Skyband query answering with differential privacy. Search on Bibsonomy Journal of Computer Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Tarik Moataz, Indrajit Ray, Indrakshi Ray, Abdullatif Shikfa, Frédéric Cuppens, Nora Cuppens Substring search over encrypted data. Search on Bibsonomy Journal of Computer Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Wenrui Diao, Rui Liu 0002, Xiangyu Liu, Zhe Zhou, Zhou Li, Kehuan Zhang Accessing mobile user's privacy based on IME personalization: Understanding and practical attacks. Search on Bibsonomy Journal of Computer Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Thanh Binh Nguyen 0003, Christoph Sprenger 0001, Cas Cremers Abstractions for security protocol verification. Search on Bibsonomy Journal of Computer Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati Enforcing authorizations while protecting access confidentiality. Search on Bibsonomy Journal of Computer Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Kiran S. Balagani, Paolo Gasti, Aaron Elliott, Azriel Richardson, Mike O'Neal The impact of application context on privacy and performance of keystroke authentication systems. Search on Bibsonomy Journal of Computer Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Simon Bischof, Joachim Breitner, Jürgen Graf, Martin Hecker, Martin Mohr, Gregor Snelting Low-deterministic security for low-nondeterministic programs. Search on Bibsonomy Journal of Computer Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Daniel Borbor, Lingyu Wang 0001, Sushil Jajodia, Anoop Singhal Surviving unpatchable vulnerabilities through heterogeneous network hardening options. Search on Bibsonomy Journal of Computer Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jun Zhang, Meiqi He, Gongxian Zeng, Siu-Ming Yiu Privacy-preserving verifiable elastic net among multiple institutions in the cloud. Search on Bibsonomy Journal of Computer Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jin Han, Wangyu Zang, Li Liu, Songqing Chen, Meng Yu Risk-aware multi-objective optimized virtual machine placement in the cloud. Search on Bibsonomy Journal of Computer Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1David Lorenzi, Emre Uzun, Jaideep Vaidya, Shamik Sural, Vijayalakshmi Atluri Towards designing robust CAPTCHAs. Search on Bibsonomy Journal of Computer Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Silvio Ranise, Anh Tuan Truong, Luca Viganò 0001 Automated and efficient analysis of administrative temporal RBAC policies with role hierarchies. Search on Bibsonomy Journal of Computer Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Tanmoy Chakraborty 0002, Sushil Jajodia, Noseong Park, Andrea Pugliese 0001, Edoardo Serra, V. S. Subrahmanian Hybrid adversarial defense: Merging honeypots and traditional security methods. Search on Bibsonomy Journal of Computer Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Per A. Hallgren, Ravi Kishore, Martín Ochoa, Andrei Sabelfeld Assuring BetterTimes. Search on Bibsonomy Journal of Computer Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Alessandro Barenghi, Nicholas Mainardi, Gerardo Pelosi Systematic parsing of X.509: Eradicating security issues with a parse tree. Search on Bibsonomy Journal of Computer Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ultan Neville, Simon N. Foley Reasoning about firewall policies through refinement and composition. Search on Bibsonomy Journal of Computer Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Bruno Blanchet, Ben Smyth Automated reasoning for equivalences in the applied pi calculus with barriers. Search on Bibsonomy Journal of Computer Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Rosario Giustolisi, Giampaolo Bella, Gabriele Lenzini Invalid certificates in modern browsers: A socio-technical analysis. Search on Bibsonomy Journal of Computer Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Haritabh Gupta, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya A side-channel attack on smartphones: Deciphering key taps using built-in microphones. Search on Bibsonomy Journal of Computer Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Silvie Levy, Ehud Gudes, Nurit Gal-Oz Sharing-habits based privacy control in social networks. Search on Bibsonomy Journal of Computer Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Benny Fuhry, Raad Bahmani, Ferdinand Brasser, Florian Hahn 0001, Florian Kerschbaum, Ahmad-Reza Sadeghi HardIDX: Practical and secure index with SGX in a malicious environment. Search on Bibsonomy Journal of Computer Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Scott D. Stoller, Thang Bui Mining hierarchical temporal roles with multiple metrics. Search on Bibsonomy Journal of Computer Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jason Crampton, Naomi Farley, Gregory Z. Gutin, Mark Jones, Bertram Poettering Cryptographic enforcement of information flow policies without public information via tree partitions. Search on Bibsonomy Journal of Computer Security The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jason Crampton, Gregory Z. Gutin, Daniel Karapetyan, Rémi Watrigant The bi-objective workflow satisfiability problem and workflow resiliency. Search on Bibsonomy Journal of Computer Security The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Euijin Choo, Ting Yu, Min Chi Detecting opinion spammer groups and spam targets through community discovery and sentiment analysis. Search on Bibsonomy Journal of Computer Security The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Albert Guan, Wen-Guey Tzeng A secret key establishment protocol for wireless networks using noisy channels. Search on Bibsonomy Journal of Computer Security The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Daniel Migault, Tobias Guggemos, Sylvain Killian, Maryline Laurent, Guy Pujolle, Jean-Philippe Wary Diet-ESP: IP layer security for IoT. Search on Bibsonomy Journal of Computer Security The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Véronique Cortier, Cyrille Wiedling A formal analysis of the Norwegian E-voting protocol. Search on Bibsonomy Journal of Computer Security The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Andrea Continella, Michele Carminati, Mario Polino, Andrea Lanzi, Stefano Zanero, Federico Maggi Prometheus: Analyzing WebInject-based information stealers. Search on Bibsonomy Journal of Computer Security The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Daniel B. Giffin, Amit Levy, Deian Stefan, David Terei, David Mazières, John C. Mitchell, Alejandro Russo Hails: Protecting data privacy in untrusted web applications. Search on Bibsonomy Journal of Computer Security The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Chung-Yi Lin, Wen-Guey Tzeng Strategy analysis for cloud storage reliability management based on game theory. Search on Bibsonomy Journal of Computer Security The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Niklas Broberg, Bart van Delft, David Sands 0001 Paragon - Practical programming with information flow control. Search on Bibsonomy Journal of Computer Security The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Stefan Wüller, Daniel A. Mayer, Fabian Förg, Samuel Schüppen, Benjamin Assadsolimani, Ulrike Meyer, Susanne Wetzel Designing privacy-preserving interval operations based on homomorphic encryption and secret sharing techniques. Search on Bibsonomy Journal of Computer Security The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Toby C. Murray, Andrei Sabelfeld, Lujo Bauer Special issue on verified information flow security. Search on Bibsonomy Journal of Computer Security The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Max I. Kanovich, Tajana Ban Kirigin, Vivek Nigam, Andre Scedrov, Carolyn L. Talcott Time, computational complexity, and probability in the analysis of distance-bounding protocols. Search on Bibsonomy Journal of Computer Security The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jed Liu, Owen Arden, Michael D. George, Andrew C. Myers Fabric: Building open distributed systems securely by construction. Search on Bibsonomy Journal of Computer Security The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Bo Chen, Reza Curtmola Remote data integrity checking with server-side repair. Search on Bibsonomy Journal of Computer Security The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Joseph Y. Halpern From qualitative to quantitative proofs of security properties using first-order conditional logic. Search on Bibsonomy Journal of Computer Security The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Manar Mohamed, Song Gao 0010, Niharika Sachdeva, Nitesh Saxena, Chengcui Zhang, Ponnurangam Kumaraguru, Paul C. van Oorschot On the security and usability of dynamic cognitive game CAPTCHAs. Search on Bibsonomy Journal of Computer Security The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yao Cheng, Yingjiu Li, Robert H. Deng, Lingyun Ying, Wei He A study on a feasible no-root approach on Android. Search on Bibsonomy Journal of Computer Security The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Daniel Ricardo dos Santos, Silvio Ranise, Luca Compagna, Serena Elisa Ponta Automatically finding execution scenarios to deploy security-sensitive workflows. Search on Bibsonomy Journal of Computer Security The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Marco Rocchetto, Luca Viganò 0001, Marco Volpe 0001 An interpolation-based method for the verification of security protocols. Search on Bibsonomy Journal of Computer Security The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Roberto Guanciale, Hamed Nemati, Mads Dam, Christoph Baumann Provably secure memory isolation for Linux on ARM. Search on Bibsonomy Journal of Computer Security The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Chiara Bodei, Pierpaolo Degano, Letterio Galletta, Francesco Salvatori Context-aware security: Linguistic mechanisms and static analysis. Search on Bibsonomy Journal of Computer Security The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Arthur Azevedo de Amorim, Nathan Collins, André DeHon, Delphine Demange, Catalin Hritcu, David Pichardie, Benjamin C. Pierce, Randy Pollack, Andrew Tolmach A verified information-flow architecture. Search on Bibsonomy Journal of Computer Security The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Meixing Le, Krishna Kant, Malek Athamnah, Sushil Jajodia Minimum cost rule enforcement for cooperative database access. Search on Bibsonomy Journal of Computer Security The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Martin Mariusz Lester, Luke Ong, Max Schäfer Information flow analysis for a dynamically typed language with staged metaprogramming. Search on Bibsonomy Journal of Computer Security The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Sokratis Vavilis, Milan Petkovic, Nicola Zannone A severity-based quantification of data leakages in database systems. Search on Bibsonomy Journal of Computer Security The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Daniel Hedin, Luciano Bello, Andrei Sabelfeld Information-flow security for JavaScript and its APIs. Search on Bibsonomy Journal of Computer Security The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1John Sonchack, Adam J. Aviv Exploring large scale security system reproducibility with the LESS simulator. Search on Bibsonomy Journal of Computer Security The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yiming Jing, Gail-Joon Ahn, Hongxin Hu, Haehyun Cho, Ziming Zhao 0001 TripleMon: A multi-layer security framework for mediating inter-process communication on Android. Search on Bibsonomy Journal of Computer Security The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati Efficient integrity checks for join queries in the cloud. Search on Bibsonomy Journal of Computer Security The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Giovanni Di Crescenzo, Debra L. Cook, Allen McIntosh, Euthimios Panagos Practical and privacy-preserving information retrieval from a database table. Search on Bibsonomy Journal of Computer Security The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Michal Davidson, Tamir Tassa, Ehud Gudes Content sharing schemes in DRM systems with enhanced performance and privacy preservation. Search on Bibsonomy Journal of Computer Security The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yu Chen 0003, Zongyang Zhang Publicly evaluable pseudorandom functions and their applications. Search on Bibsonomy Journal of Computer Security The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Willard Rafnsson, Andrei Sabelfeld Secure multi-execution: Fine-grained, declassification-aware, and transparent. Search on Bibsonomy Journal of Computer Security The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Henry Carter, Benjamin Mood, Patrick Traynor, Kevin R. B. Butler Secure outsourced garbled circuit evaluation for mobile devices. Search on Bibsonomy Journal of Computer Security The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Debabrata Kar, Suvasini Panigrahi, Srikanth Sundararajan SQLiDDS: SQL injection detection using document similarity measure. Search on Bibsonomy Journal of Computer Security The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Zhengqin Luo, José Fragoso Santos, Ana Almeida Matos, Tamara Rezk Mashic compiler: Mashup sandboxing based on inter-frame communication. Search on Bibsonomy Journal of Computer Security The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Deepak D'Souza, Raghavendra K. Ramesh Model-checking trace-based information flow properties for infinite-state systems. Search on Bibsonomy Journal of Computer Security The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Steve Kremer, Robert Künnemann Automated analysis of security protocols with global state. Search on Bibsonomy Journal of Computer Security The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Sushil Jajodia, Noseong Park, Edoardo Serra, V. S. Subrahmanian Using temporal probabilistic logic for optimal monitoring of security events with limited resources. Search on Bibsonomy Journal of Computer Security The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Florian Böhl, Dominique Unruh Symbolic universal composability. Search on Bibsonomy Journal of Computer Security The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Claudio Taglienti, James Cannady The user attribution problem and the challenge of persistent surveillance of user activity in complex networks. Search on Bibsonomy Journal of Computer Security The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Abdullah Ali Alshehri 0001, Steve Schneider A formal framework for security analysis of NFC mobile coupon protocols. Search on Bibsonomy Journal of Computer Security The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Luca Spalazzi, Luca Viganò 0001 Special issue on security and high performance computing systems. Search on Bibsonomy Journal of Computer Security The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Adam Bates 0001, Kevin R. B. Butler, Micah Sherr, Clay Shields, Patrick Traynor, Dan S. Wallach Accountable wiretapping - or - I know they can hear you now. Search on Bibsonomy Journal of Computer Security The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Barsha Mitra, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya The generalized temporal role mining problem. Search on Bibsonomy Journal of Computer Security The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Alessio Merlo, Mauro Migliardi, Paolo Fontanelli Measuring and estimating power consumption in Android to support energy-based intrusion detection. Search on Bibsonomy Journal of Computer Security The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Mário S. Alvim, Miguel E. Andrés, Konstantinos Chatzikokolakis 0001, Pierpaolo Degano, Catuscia Palamidessi On the information leakage of differentially-private mechanisms. Search on Bibsonomy Journal of Computer Security The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yannis Mallios, Lujo Bauer, Dilsun Kirli Kaynar, Fabio Martinelli, Charles Morisset Probabilistic cost enforcement of security policies. Search on Bibsonomy Journal of Computer Security The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Shiuan-Tzuo Shen, Wen-Guey Tzeng Delegated integrity check for hierarchical cloud data. Search on Bibsonomy Journal of Computer Security The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Haibing Lu, Yuan Hong, Yanjiang Yang, Lian Duan, Nazia Badar Towards user-oriented RBAC model. Search on Bibsonomy Journal of Computer Security The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1David Cadé, Bruno Blanchet Proved generation of implementations from computationally secure protocol specifications. Search on Bibsonomy Journal of Computer Security The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Thomas Gibson-Robinson, Allaa Kamil, Gavin Lowe Verifying layered security protocols. Search on Bibsonomy Journal of Computer Security The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Christos Dimitrakakis, Aikaterini Mitrokotsa, Serge Vaudenay Expected loss analysis for authentication in constrained channels. Search on Bibsonomy Journal of Computer Security The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jiawei Yuan, Shucheng Yu PCPOR: Public and constant-cost proofs of retrievability in cloud. Search on Bibsonomy Journal of Computer Security The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ron van der Meyden What, indeed, is intransitive noninterference? Search on Bibsonomy Journal of Computer Security The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Wen Ming Liu, Lingyu Wang 0001, Lei Zhang 0004, Shunzhi Zhu k-jump: A strategy to design publicly-known algorithms for privacy preserving micro-data disclosure. Search on Bibsonomy Journal of Computer Security The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Sergey V. Belim, Nadezda F. Bogachenko, Evgeniy Ilushechkin An analysis of graphs that represent a role-based security policy hierarchy. Search on Bibsonomy Journal of Computer Security The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Piero A. Bonatti, Clemente Galdi, Davide Torres Event-driven RBAC. Search on Bibsonomy Journal of Computer Security The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jin Li 0002, Xiaofeng Chen 0001, Jingwei Li, Chunfu Jia, Jianfeng Ma, Wenjing Lou New access control systems based on outsourced attribute-based encryption. Search on Bibsonomy Journal of Computer Security The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ping Yang 0002, Mikhail I. Gofman, Scott D. Stoller, Zijiang Yang Policy analysis for administrative role based access control without separate administration. Search on Bibsonomy Journal of Computer Security The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ioana Boureanu, Aikaterini Mitrokotsa, Serge Vaudenay Practical and provably secure distance-bounding. Search on Bibsonomy Journal of Computer Security The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga, Stefano Paraboschi, Pierangela Samarati Loose associations to increase utility in data publishing. Search on Bibsonomy Journal of Computer Security The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Giampaolo Bella, Paul Curzon, Gabriele Lenzini Service security and privacy as a socio-technical problem. Search on Bibsonomy Journal of Computer Security The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jannik Dreier, Jean-Guillaume Dumas, Pascal Lafourcade 0001 Brandt's fully private auction protocol revisited. Search on Bibsonomy Journal of Computer Security The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 566 (100 per page; Change: )
Pages: [1][2][3][4][5][6][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license