Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/jcs/jcs17.bht:"
@article{DBLP:journals/jcs/AdaoBHS09, author = {Pedro Ad{\~{a}}o and Gergei Bana and Jonathan Herzog and Andre Scedrov}, title = {Soundness and completeness of formal encryption: The cases of key cycles and partial information leakage}, journal = {J. Comput. Secur.}, volume = {17}, number = {5}, pages = {737--797}, year = {2009}, url = {https://doi.org/10.3233/JCS-2009-0358}, doi = {10.3233/JCS-2009-0358}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/AdaoBHS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/AzizFHS09, author = {Benjamin Aziz and Simon N. Foley and John Herbert and Garret Swart}, title = {Configuring storage-area networks using mandatory security}, journal = {J. Comput. Secur.}, volume = {17}, number = {2}, pages = {191--210}, year = {2009}, url = {https://doi.org/10.3233/JCS-2009-0337}, doi = {10.3233/JCS-2009-0337}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/AzizFHS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/BartolettiDF09, author = {Massimo Bartoletti and Pierpaolo Degano and Gian{-}Luigi Ferrari}, title = {Planning and verifying service composition}, journal = {J. Comput. Secur.}, volume = {17}, number = {5}, pages = {799--837}, year = {2009}, url = {https://doi.org/10.3233/JCS-2009-0357}, doi = {10.3233/JCS-2009-0357}, timestamp = {Fri, 23 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/BartolettiDF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/BellaR09, author = {Giampaolo Bella and Peter Y. A. Ryan}, title = {Journal of Computer SecuritySpecial Number devoted to the best papers of the Security Track at the 2006 {ACM} Symposium on Applied Computing}, journal = {J. Comput. Secur.}, volume = {17}, number = {3}, pages = {237}, year = {2009}, url = {https://doi.org/10.3233/JCS-2009-0346}, doi = {10.3233/JCS-2009-0346}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/BellaR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/BelsisFGS09, author = {Petros Belsis and Kostas Fragos and Stefanos Gritzalis and Christos Skourlas}, title = {Applying effective feature selection techniques with hierarchical mixtures of experts for spam classification}, journal = {J. Comput. Secur.}, volume = {17}, number = {3}, pages = {239--268}, year = {2009}, url = {https://doi.org/10.3233/JCS-2009-0377}, doi = {10.3233/JCS-2009-0377}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/BelsisFGS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/Blanchet09, author = {Bruno Blanchet}, title = {Automatic verification of correspondences for security protocols}, journal = {J. Comput. Secur.}, volume = {17}, number = {4}, pages = {363--434}, year = {2009}, url = {https://doi.org/10.3233/JCS-2009-0339}, doi = {10.3233/JCS-2009-0339}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/Blanchet09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/BottcherH09, author = {Stefan B{\"{o}}ttcher and Rita Hartel}, title = {Information disclosure by answers to XPath queries}, journal = {J. Comput. Secur.}, volume = {17}, number = {1}, pages = {69--99}, year = {2009}, url = {https://doi.org/10.3233/JCS-2009-0318}, doi = {10.3233/JCS-2009-0318}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/BottcherH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/ByunLBLS09, author = {Ji{-}Won Byun and Tiancheng Li and Elisa Bertino and Ninghui Li and Yonglak Sohn}, title = {Privacy-preserving incremental data dissemination}, journal = {J. Comput. Secur.}, volume = {17}, number = {1}, pages = {43--68}, year = {2009}, url = {https://doi.org/10.3233/JCS-2009-0316}, doi = {10.3233/JCS-2009-0316}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/ByunLBLS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/ChengT09, author = {Weiwei Cheng and Kian{-}Lee Tan}, title = {Query assurance verification for outsourced multi-dimensional databases}, journal = {J. Comput. Secur.}, volume = {17}, number = {1}, pages = {101--126}, year = {2009}, url = {https://doi.org/10.3233/JCS-2009-0315}, doi = {10.3233/JCS-2009-0315}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/ChengT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/ClarksonMS09, author = {Michael R. Clarkson and Andrew C. Myers and Fred B. Schneider}, title = {Quantifying information flow with beliefs}, journal = {J. Comput. Secur.}, volume = {17}, number = {5}, pages = {655--701}, year = {2009}, url = {https://doi.org/10.3233/JCS-2009-0353}, doi = {10.3233/JCS-2009-0353}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/ClarksonMS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/DainottiPV09, author = {Alberto Dainotti and Antonio Pescap{\`{e}} and Giorgio Ventre}, title = {A cascade architecture for DoS attacks detection based on the wavelet transform}, journal = {J. Comput. Secur.}, volume = {17}, number = {6}, pages = {945--968}, year = {2009}, url = {https://doi.org/10.3233/JCS-2009-0350}, doi = {10.3233/JCS-2009-0350}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcs/DainottiPV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/DelauneKR09, author = {St{\'{e}}phanie Delaune and Steve Kremer and Mark Ryan}, title = {Verifying privacy-type properties of electronic voting protocols}, journal = {J. Comput. Secur.}, volume = {17}, number = {4}, pages = {435--487}, year = {2009}, url = {https://doi.org/10.3233/JCS-2009-0340}, doi = {10.3233/JCS-2009-0340}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcs/DelauneKR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/DingTX09, author = {Xuhua Ding and Gene Tsudik and Shouhuai Xu}, title = {Leak-free mediated group signatures}, journal = {J. Comput. Secur.}, volume = {17}, number = {4}, pages = {489--514}, year = {2009}, url = {https://doi.org/10.3233/JCS-2009-0342}, doi = {10.3233/JCS-2009-0342}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/DingTX09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/GrothoffGSAA09, author = {Christian Grothoff and Krista Grothoff and Ryan Stutsman and Ludmila Alkhutova and Mikhail J. Atallah}, title = {Translation-based steganography}, journal = {J. Comput. Secur.}, volume = {17}, number = {3}, pages = {269--303}, year = {2009}, url = {https://doi.org/10.3233/JCS-2009-0320}, doi = {10.3233/JCS-2009-0320}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/GrothoffGSAA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/Guette09, author = {Gilles Guette}, title = {Automating trusted key rollover in {DNSSEC}}, journal = {J. Comput. Secur.}, volume = {17}, number = {6}, pages = {839--854}, year = {2009}, url = {https://doi.org/10.3233/JCS-2009-0343}, doi = {10.3233/JCS-2009-0343}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/Guette09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/Guttman09, author = {Joshua D. Guttman}, title = {Introduction}, journal = {J. Comput. Secur.}, volume = {17}, number = {5}, pages = {515}, year = {2009}, url = {https://doi.org/10.3233/JCS-2009-0396}, doi = {10.3233/JCS-2009-0396}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/Guttman09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/HarrisonH09, author = {William L. Harrison and James Hook}, title = {Achieving information flow security through monadic control of effects}, journal = {J. Comput. Secur.}, volume = {17}, number = {5}, pages = {599--653}, year = {2009}, url = {https://doi.org/10.3233/JCS-2009-0356}, doi = {10.3233/JCS-2009-0356}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/HarrisonH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/Herzberg09, author = {Amir Herzberg}, title = {Folklore, practice and theory of robust combiners}, journal = {J. Comput. Secur.}, volume = {17}, number = {2}, pages = {159--189}, year = {2009}, url = {https://doi.org/10.3233/JCS-2009-0336}, doi = {10.3233/JCS-2009-0336}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/Herzberg09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/HofheinzMU09, author = {Dennis Hofheinz and J{\"{o}}rn M{\"{u}}ller{-}Quade and Dominique Unruh}, title = {Polynomial runtime in simulatability definitions}, journal = {J. Comput. Secur.}, volume = {17}, number = {5}, pages = {703--735}, year = {2009}, url = {https://doi.org/10.3233/JCS-2009-0354}, doi = {10.3233/JCS-2009-0354}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/HofheinzMU09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/HuTML09, author = {Nan Hu and Giri Kumar Tayi and Chengyu Ma and Yingjiu Li}, title = {Certificate revocation release policies}, journal = {J. Comput. Secur.}, volume = {17}, number = {2}, pages = {127--157}, year = {2009}, url = {https://doi.org/10.3233/JCS-2009-0330}, doi = {10.3233/JCS-2009-0330}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/HuTML09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/JacobsH09, author = {Bart Jacobs and Ichiro Hasuo}, title = {Semantics and logic for security protocols}, journal = {J. Comput. Secur.}, volume = {17}, number = {6}, pages = {909--944}, year = {2009}, url = {https://doi.org/10.3233/JCS-2009-0348}, doi = {10.3233/JCS-2009-0348}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/JacobsH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/MatosB09, author = {Ana Almeida Matos and G{\'{e}}rard Boudol}, title = {On declassification and the non-disclosure policy}, journal = {J. Comput. Secur.}, volume = {17}, number = {5}, pages = {549--597}, year = {2009}, url = {https://doi.org/10.3233/JCS-2009-0355}, doi = {10.3233/JCS-2009-0355}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/MatosB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/PetkovicJ09, author = {Milan Petkovic and Willem Jonker}, title = {Preface}, journal = {J. Comput. Secur.}, volume = {17}, number = {1}, pages = {1--3}, year = {2009}, url = {https://doi.org/10.3233/JCS-2009-0326}, doi = {10.3233/JCS-2009-0326}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/PetkovicJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/PredaG09, author = {Mila Dalla Preda and Roberto Giacobazzi}, title = {Semantics-based code obfuscation by abstract interpretation}, journal = {J. Comput. Secur.}, volume = {17}, number = {6}, pages = {855--908}, year = {2009}, url = {https://doi.org/10.3233/JCS-2009-0345}, doi = {10.3233/JCS-2009-0345}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/PredaG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/SabelfeldS09, author = {Andrei Sabelfeld and David Sands}, title = {Declassification: Dimensions and principles}, journal = {J. Comput. Secur.}, volume = {17}, number = {5}, pages = {517--548}, year = {2009}, url = {https://doi.org/10.3233/JCS-2009-0352}, doi = {10.3233/JCS-2009-0352}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/SabelfeldS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/VaidyaAGL09, author = {Jaideep Vaidya and Vijayalakshmi Atluri and Qi Guo and Haibing Lu}, title = {Edge-RMP: Minimizing administrative assignments for role-based access control}, journal = {J. Comput. Secur.}, volume = {17}, number = {2}, pages = {211--235}, year = {2009}, url = {https://doi.org/10.3233/JCS-2009-0341}, doi = {10.3233/JCS-2009-0341}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/VaidyaAGL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/VignaVBRKK09, author = {Giovanni Vigna and Fredrik Valeur and Davide Balzarotti and William K. Robertson and Christopher Kruegel and Engin Kirda}, title = {Reducing errors in the anomaly-based detection of web-based attacks through the combined analysis of web requests and {SQL} queries}, journal = {J. Comput. Secur.}, volume = {17}, number = {3}, pages = {305--329}, year = {2009}, url = {https://doi.org/10.3233/JCS-2009-0321}, doi = {10.3233/JCS-2009-0321}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/VignaVBRKK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/XuC09, author = {Haizhi Xu and Steve J. Chapin}, title = {Address-space layout randomization using code islands}, journal = {J. Comput. Secur.}, volume = {17}, number = {3}, pages = {331--362}, year = {2009}, url = {https://doi.org/10.3233/JCS-2009-0322}, doi = {10.3233/JCS-2009-0322}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/XuC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/YaoWWBJ09, author = {Chao Yao and Lingyu Wang and Xiaoyang Sean Wang and Claudio Bettini and Sushil Jajodia}, title = {Evaluating privacy threats in released database views by symmetric indistinguishability}, journal = {J. Comput. Secur.}, volume = {17}, number = {1}, pages = {5--42}, year = {2009}, url = {https://doi.org/10.3233/JCS-2009-0317}, doi = {10.3233/JCS-2009-0317}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/YaoWWBJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.