


Остановите войну!
for scientists:


default search action
ACM Transactions on Information and System Security (TISSEC), Volume 7
Volume 7, Number 1, February 2004
- Giuseppe Ateniese:
Verifiable encryption of digital signatures and applications. 1-20 - Albert Levi
, M. Ufuk Çaglayan, Çetin Kaya Koç:
Use of nested certificates for efficient, dynamic, and trust preserving public key infrastructure. 21-59 - Yongdae Kim
, Adrian Perrig, Gene Tsudik:
Tree-based group key agreement. 60-96 - Gabriel Montenegro, Claude Castelluccia:
Crypto-based identifiers (CBIDs): Concepts and applications. 97-127 - Jaehong Park, Ravi S. Sandhu:
The UCONABC usage control model. 128-174
Volume 7, Number 2, May 2004
- Trent Jaeger, Antony Edwards, Xiaolan Zhang:
Consistency analysis of authorization hook placement in the Linux security modules framework. 175-205 - Mihir Bellare, Tadayoshi Kohno, Chanathip Namprempre:
Breaking and provably repairing the SSH authenticated encryption scheme: A case study of the Encode-then-Encrypt-and-MAC paradigm. 206-241 - William Aiello, Steven M. Bellovin, Matt Blaze, Ran Canetti, John Ioannidis, Angelos D. Keromytis, Omer Reingold:
Just fast keying: Key agreement in a hostile internet. 242-273 - Peng Ning, Yun Cui, Douglas S. Reeves, Dingbang Xu:
Techniques and tools for analyzing intrusion alerts. 274-318 - Adam Stubblefield, John Ioannidis, Aviel D. Rubin:
A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP). 319-332
Volume 7, Number 3, August 2004
- Brian D. Carrier, Clay Shields:
The session token protocol for forensics and traceback. 333-362 - Horst F. Wedde, Mario Lischka:
Modular authorization and administration. 363-391 - Mark Strembeck, Gustaf Neumann:
An integrated approach to engineer and enforce context constraints in RBAC environments. 392-427 - Adam Hess, Jason E. Holt, Jared Jacobson, Kent E. Seamons:
Content-triggered trust negotiation. 428-456 - Yair Amir, Yongdae Kim
, Cristina Nita-Rotaru, Gene Tsudik:
On the performance of group key agreement protocols. 457-488
Volume 7, Number 4, November 2004
- Matthew K. Wright
, Micah Adler, Brian Neil Levine, Clay Shields:
The predecessor attack: An analysis of a threat to anonymous communications systems. 489-522 - Dijiang Huang
, Deep Medhi:
A key-chain-based keying scheme for many-to-many secure group communication. 523-552 - Hovav Shacham, Dan Boneh, Eric Rescorla:
Client-side caching for TLS. 553-575 - Tom Walcott, Matt Bishop:
Traducement: A model for record security. 576-590 - Peng Ning, Dingbang Xu:
Hypothesizing and reasoning about attacks missed by intrusion detection systems. 591-627

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.