


default search action
Journal of Computer Security, Volume 29
Volume 29, Number 1, 2021
- Hossein Shirazi, Bruhadeshwar Bezawada, Indrakshi Ray, Chuck Anderson:

Directed adversarial sampling attacks on phishing detection. 1-23 - Qinwen Hu, Muhammad Rizwan Asghar

, Nevil Brownlee:
A large-scale analysis of HTTPS deployments: Challenges, solutions, and recommendations. 25-50 - Federico Griscioli, Maurizio Pizzonia:

USBCaptchaIn: Preventing (un)conventional attacks from promiscuously used USB devices in industrial control systems. 51-76 - Chiara Bodei, Lorenzo Ceragioli

, Pierpaolo Degano, Riccardo Focardi
, Letterio Galletta
, Flaminia L. Luccio
, Mauro Tempesta, Lorenzo Veronese:
FWS: Analyzing, maintaining and transcompiling firewalls. 77-134
Volume 29, Number 2, 2021
- Sonam Mittal

, K. R. Ramkumar:
Research perspectives on fully homomorphic encryption models for cloud sector. 135-160 - Zhiwu Xu, Hongxu Chen, Alwen Tiu, Yang Liu

, Kunal Sareen
:
A permission-dependent type system for secure information flow analysis. 161-228 - Panagiotis Grontas

, Aris Pagourtzis, Alexandros Zacharakis, Bingsheng Zhang:
Publicly auditable conditional blind signatures. 229-271
Volume 29, Number 3, 2021
- Yangguang Tian

, Yingjiu Li, Robert H. Deng
, Binanda Sengupta
, Guomin Yang
:
Lattice-based remote user authentication from reusable fuzzy signature. 273-298 - Abraão Aires Urquiza, Musab A. Alturki, Tajana Ban Kirigin

, Max I. Kanovich, Vivek Nigam
, Andre Scedrov, Carolyn L. Talcott:
Resource and timing aspects of security protocols. 299-340 - Ghandi Hessam

, Ghassan Saba, M. Iyad Alkhayat:
A new approach for detecting violation of data plane integrity in Software Defined Networks. 341-358 - Sonam Mittal

, K. R. Ramkumar:
Research perspectives on fully homomorphic encryption models for cloud sector. 359
Volume 29, Number 4, 2021
- Abhishek Bichhawat, Vineet Rajani

, Deepak Garg, Christian Hammer
:
Permissive runtime information flow control in the presence of exceptions. 361-401 - Jianguo Jiang, Boquan Li

, Baole Wei, Gang Li
, Chao Liu, Weiqing Huang, Meimei Li, Min Yu:
FakeFilter: A cross-distribution Deepfake detection system with domain adaptation. 403-421 - Md. Morshed Alam

, Weichao Wang:
A comprehensive survey on data provenance: State-of-the-art approaches and their deployments for IoT security enforcement. 423-446
Volume 29, Number 5, 2021
- Guangjun Li, Preetpal Sharma, Lei Pan, Sutharshan Rajasegarar

, Chandan K. Karmakar
, Nicholas Charles Patterson
:
Deep learning algorithms for cyber security applications: A survey. 447-471 - Andronicus Ayobami Akinyelu:

Advances in spam detection for email spam, web spam, social network spam, and review spam: ML-based and nature-inspired-based techniques. 473-529 - Himani Sharma

, Navdeep Kanwal:
Video interframe forgery detection: Classification, technique & new dataset. 531-550
Volume 29, Number 6, 2021
- Ben Smyth:

Ballot secrecy: Security definition, sufficient conditions, and analysis of Helios. 551-611 - Mina Sheikhalishahi, Ischa Stork, Nicola Zannone

:
Privacy-preserving policy evaluation in multi-party access control. 613-650

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














