![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Journal of Computer Security, Volume 24
Volume 24, Number 1, 2016
- Florian Böhl, Dominique Unruh:
Symbolic universal composability. 1-38 - Willard Rafnsson, Andrei Sabelfeld:
Secure multi-execution: Fine-grained, declassification-aware, and transparent. 39-90 - Zhengqin Luo, José Fragoso Santos
, Ana Almeida Matos
, Tamara Rezk:
Mashic compiler: Mashup sandboxing based on inter-frame communication. 91-136
Volume 24, Number 2, 2016
- Henry Carter
, Benjamin Mood, Patrick Traynor, Kevin R. B. Butler
:
Secure outsourced garbled circuit evaluation for mobile devices. 137-180 - Daniel Hedin, Luciano Bello, Andrei Sabelfeld:
Information-flow security for JavaScript and its APIs. 181-234 - Claudio Taglienti, James Cannady:
The user attribution problem and the challenge of persistent surveillance of user activity in complex networks. 235-288 - Yu Chen, Zongyang Zhang:
Publicly evaluable pseudorandom functions and their applications. 289-320
Volume 24, Number 3, 2016
- Sokratis Vavilis
, Milan Petkovic, Nicola Zannone
:
A severity-based quantification of data leakages in database systems. 321-345 - Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia
, Stefano Paraboschi, Pierangela Samarati
:
Efficient integrity checks for join queries in the cloud. 347-378 - Meixing Le, Krishna Kant, Malek Athamnah, Sushil Jajodia
:
Minimum cost rule enforcement for cooperative database access. 379-403
Volume 24, Number 4, 2016
- Yiming Jing, Gail-Joon Ahn
, Hongxin Hu, Haehyun Cho, Ziming Zhao:
TripleMon: A multi-layer security framework for mediating inter-process communication on Android. 405-426 - Chiara Bodei, Pierpaolo Degano, Letterio Galletta
, Francesco Salvatori:
Context-aware security: Linguistic mechanisms and static analysis. 427-477 - Giovanni Di Crescenzo, Debra L. Cook, Allen McIntosh, Euthimios Panagos:
Practical and privacy-preserving information retrieval from a database table. 479-506 - Debabrata Kar, Suvasini Panigrahi, Srikanth Sundararajan:
SQLiDDS: SQL injection detection using document similarity measure. 507-539
Volume 24, Number 5, 2016
- Martin Mariusz Lester
, Luke Ong
, Max Schäfer:
Information flow analysis for a dynamically typed language with staged metaprogramming. 541-582 - Steve Kremer, Robert Künnemann:
Automated analysis of security protocols with global state. 583-616 - Deepak D'Souza, R. K. Ramesh:
Model-checking trace-based information flow properties for infinite-state systems. 617-643 - John Sonchack, Adam J. Aviv:
Exploring large scale security system reproducibility with the LESS simulator. 645-665
Volume 24, Number 6, 2016
- Michal Davidson, Tamir Tassa, Ehud Gudes:
Content sharing schemes in DRM systems with enhanced performance and privacy preservation. 667-688 - Arthur Azevedo de Amorim, Nathan Collins, André DeHon, Delphine Demange, Catalin Hritcu, David Pichardie, Benjamin C. Pierce, Randy Pollack, Andrew Tolmach:
A verified information-flow architecture. 689-734 - Sushil Jajodia
, Noseong Park, Edoardo Serra
, V. S. Subrahmanian:
Using temporal probabilistic logic for optimal monitoring of security events with limited resources. 735-791 - Roberto Guanciale
, Hamed Nemati
, Mads Dam, Christoph Baumann:
Provably secure memory isolation for Linux on ARM. 793-837
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.