


default search action
Journal of Computer Security, Volume 26
Volume 26, Number 1, 2018
- Tarik Moataz, Indrajit Ray, Indrakshi Ray, Abdullatif Shikfa

, Frédéric Cuppens, Nora Cuppens:
Substring search over encrypted data. 1-30 - Mila Dalla Preda, Isabella Mastroeni

:
Characterizing a property-driven obfuscation strategy. 31-69 - Christoph Sprenger

, David A. Basin:
Refining security protocols. 71-120 - Scott D. Stoller, Thang Bui:

Mining hierarchical temporal roles with multiple metrics. 121-142
Volume 26, Number 2, 2018
- Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi

, Pierangela Samarati:
Enforcing authorizations while protecting access confidentiality. 143-175 - Silvie Levy, Ehud Gudes, Nurit Gal-Oz

:
Sharing-habits based privacy control in social networks. 177-205 - Ultan Neville, Simon N. Foley

:
Reasoning about firewall policies through refinement and composition. 207-254 - Haritabh Gupta, Shamik Sural

, Vijayalakshmi Atluri
, Jaideep Vaidya:
A side-channel attack on smartphones: Deciphering key taps using built-in microphones. 255-281
Volume 26, Number 3, 2018
- Wenrui Diao, Rui Liu

, Xiangyu Liu, Zhe Zhou, Zhou Li
, Kehuan Zhang:
Accessing mobile user's privacy based on IME personalization: Understanding and practical attacks. 283-309 - Maliheh Shirvanian, Nitesh Saxena, Dibya Mukhopadhyay:

Short voice imitation man-in-the-middle attacks on Crypto Phones: Defeating humans and machines. 311-333 - Simon Bischof, Joachim Breitner, Jürgen Graf, Martin Hecker, Martin Mohr, Gregor Snelting:

Low-deterministic security for low-nondeterministic programs. 335-366 - Bruno Blanchet

, Ben Smyth:
Automated reasoning for equivalences in the applied pi calculus with barriers. 367-422
Volume 26, Number 4, 2018
- Silvio Ranise

, Anh Tuan Truong, Luca Viganò
:
Automated and efficient analysis of administrative temporal RBAC policies with role hierarchies. 423-458 - Thanh Binh Nguyen, Christoph Sprenger

, Cas Cremers:
Abstractions for security protocol verification. 459-508 - Rosario Giustolisi

, Giampaolo Bella
, Gabriele Lenzini:
Invalid certificates in modern browsers: A socio-technical analysis. 509-541 - Kiran S. Balagani, Paolo Gasti, Aaron Elliott, Azriel Richardson, Mike O'Neal:

The impact of application context on privacy and performance of keystroke authentication systems. 543-556 - Per A. Hallgren, Ravi Kishore

, Martín Ochoa, Andrei Sabelfeld:
Assuring BetterTimes. 557-587
Volume 26, Number 5, 2018
- Patrick Luckett, Jeffrey Todd McDonald, William Bradley Glisson

, Ryan Benton
, Joel A. Dawson
, Blair A. Doyle:
Identifying stealth malware using CPU power consumption and learning algorithms. 589-613 - Tanmoy Chakraborty

, Sushil Jajodia
, Noseong Park, Andrea Pugliese, Edoardo Serra
, V. S. Subrahmanian:
Hybrid adversarial defense: Merging honeypots and traditional security methods. 615-645 - Ling Chen, Ting Yu, Rada Chirkova:

k-Skyband query answering with differential privacy. 647-676 - Benny Fuhry

, Raad Bahmani, Ferdinand Brasser, Florian Hahn, Florian Kerschbaum, Ahmad-Reza Sadeghi:
HardIDX: Practical and secure index with SGX in a malicious environment. 677-706 - Jin Han, Wangyu Zang, Li Liu, Songqing Chen, Meng Yu:

Risk-aware multi-objective optimized virtual machine placement in the cloud. 707-730
Volume 26, Number 6, 2018
- David Lorenzi, Emre Uzun, Jaideep Vaidya, Shamik Sural

, Vijayalakshmi Atluri
:
Towards designing robust CAPTCHAs. 731-760 - Daniel Borbor, Lingyu Wang, Sushil Jajodia

, Anoop Singhal:
Surviving unpatchable vulnerabilities through heterogeneous network hardening options. 761-789 - Jun Zhang, Meiqi He, Gongxian Zeng, Siu-Ming Yiu:

Privacy-preserving verifiable elastic net among multiple institutions in the cloud. 791-815 - Alessandro Barenghi

, Nicholas Mainardi
, Gerardo Pelosi
:
Systematic parsing of X.509: Eradicating security issues with a parse tree. 817-849

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














