


default search action
Journal of Computer Security, Volume 27
Volume 27, Number 1, 2019
- Matteo Maffei, Giulio Malavolta

, Manuel Reinert, Dominique Schröder
:
Group ORAM for privacy and access control in outsourced personal records. 1-47 - Sébastien Salva, Loukmen Regainia:

A catalogue associating security patterns and attack steps to design secure applications. 49-74 - Grégory Demay, Peter Gazi, Ueli Maurer, Björn Tackmann:

Per-session security: Password-based cryptography revisited. 75-111 - Frederik Armknecht

, Zinaida Benenson, Philipp Morgner, Christian Müller
, Christian Riess:
Privacy implications of room climate data. 113-136 - Sandrine Blazy

, David Pichardie, Alix Trieu
:
Verifying constant-time implementations by abstract interpretation. 137-163
Volume 27, Number 2, 2019
- Suryadipta Majumdar, Azadeh Tabiban, Yosr Jarraya, Momen Oqaily, Amir Alimohammadifar, Makan Pourzandi, Lingyu Wang, Mourad Debbabi

:
Learning probabilistic dependencies among events for proactive security auditing in clouds. 165-202 - Cas Cremers, Martin Dehnel-Wild, Kevin Milner:

Secure authentication in the grid: A formal analysis of DNP3 SAv5. 203-232 - Stefano Calzavara

, Alvise Rabitti, Michele Bugliesi
:
Sub-session hijacking on the web: Root causes and prevention. 233-257 - Yangguang Tian, Yingjiu Li, Guomin Yang

, Willy Susilo
, Yi Mu, Hui Cui
, Yinghui Zhang:
DABKE: Secure deniable attribute-based key exchange framework. 259-275
Volume 27, Number 3, 2019
- Lucca Hirschi, David Baelde

, Stéphanie Delaune:
A method for unbounded verification of privacy-type properties. 277-342 - Matteo Zavatteri

, Luca Viganò
:
Last man standing: Static, decremental and dynamic resiliency via controller synthesis. 343-373 - Xingjie Yu, Michael Thang Shiwen, Yingjiu Li, Robert Huijie Deng

:
Collusion attacks and fair time-locked deposits for fast-payment transactions in Bitcoin. 375-403
Volume 27, Number 4, 2019
- Kiran S. Balagani, Matteo Cardaioli, Mauro Conti

, Paolo Gasti, Martin Georgiev
, Tristan Gurtler, Daniele Lain, Charissa Miller, Kendall Molas, Nikita Samarin
, Eugen Saraci, Gene Tsudik, Lynn Wu:
PILOT: Password and PIN information leakage from obfuscated typing videos. 405-425 - Nawaf Alhebaishi

, Lingyu Wang, Sushil Jajodia, Anoop Singhal:
Mitigating the insider threat of remote administrators in clouds through maintenance task assignments. 427-458 - Tobias Urban

, Dennis Tatang, Thorsten Holz, Norbert Pohlmann:
Analyzing leakage of personal information by malware. 459-481 - Gunjan Batra, Vijayalakshmi Atluri

, Jaideep Vaidya, Shamik Sural
:
Deploying ABAC policies using RBAC systems. 483-506
Volume 27, Number 5, 2019
- George Stergiopoulos

, Georgia Chronopoulou, Evangelos Bitsikas
, Nikolaos Tsalis, Dimitris Gritzalis:
Using side channel TCP features for real-time detection of malware connections. 507-520 - Juan E. Rubio, Rodrigo Roman, Cristina Alcaraz, Yan Zhang:

Tracking APTs in industrial ecosystems: A proof of concept. 521-546 - Ziqiang Ma, Quanwei Cai

, Jingqiang Lin, Bo Luo
, Jiwu Jing:
Towards the optimal performance of integrating Warm and Delay against remote cache timing side channels on block ciphers. 547-580
Volume 27, Number 6, 2019
- Rubia Fatima

, Affan Yasin
, Lin Liu, Jianmin Wang
:
How persuasive is a phishing email? A phishing game for phishing awareness. 581-612 - Saed Alrabaee, Paria Shirani

, Lingyu Wang, Mourad Debbabi
, Aiman Hanna:
Decoupling coding habits from functionality for effective binary authorship attribution. 613-648 - Thang Hoang, Attila A. Yavuz

, F. Betül Durak, Jorge Guajardo:
A multi-server oblivious dynamic searchable encryption framework. 649-676

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














