Search dblp for Publications

export results for "toc:db/journals/tissec/tissec21.bht:"

 download as .bib file

@article{DBLP:journals/tissec/AbdouO18,
  author       = {AbdelRahman Abdou and
                  Paul C. van Oorschot},
  title        = {Server Location Verification {(SLV)} and Server Location Pinning:
                  Augmenting {TLS} Authentication},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {21},
  number       = {1},
  pages        = {1:1--1:26},
  year         = {2018},
  url          = {https://doi.org/10.1145/3139294},
  doi          = {10.1145/3139294},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/AbdouO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/AlrabaeeSWD18,
  author       = {Saed Alrabaee and
                  Paria Shirani and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {\emph{FOSSIL}: {A} Resilient and Efficient System for Identifying
                  {FOSS} Functions in Malware Binaries},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {21},
  number       = {2},
  pages        = {8:1--8:34},
  year         = {2018},
  url          = {https://doi.org/10.1145/3175492},
  doi          = {10.1145/3175492},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/AlrabaeeSWD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BhattacharyaM18,
  author       = {Sarani Bhattacharya and
                  Debdeep Mukhopadhyay},
  title        = {Utilizing Performance Counters for Compromising Public Key Ciphers},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {21},
  number       = {1},
  pages        = {5:1--5:31},
  year         = {2018},
  url          = {https://doi.org/10.1145/3156015},
  doi          = {10.1145/3156015},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/BhattacharyaM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BotacinGG18,
  author       = {Marcus Botacin and
                  Paulo L{\'{\i}}cio de Geus and
                  Andr{\'{e}} Gr{\'{e}}gio},
  title        = {Enhancing Branch Monitoring for Security Purposes: From Control Flow
                  Integrity to Malware Analysis and Debugging},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {21},
  number       = {1},
  pages        = {4:1--4:30},
  year         = {2018},
  url          = {https://doi.org/10.1145/3152162},
  doi          = {10.1145/3152162},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/BotacinGG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/CarminatiPCLMZ18,
  author       = {Michele Carminati and
                  Mario Polino and
                  Andrea Continella and
                  Andrea Lanzi and
                  Federico Maggi and
                  Stefano Zanero},
  title        = {Security Evaluation of a Banking Fraud Analysis System},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {21},
  number       = {3},
  pages        = {11:1--11:31},
  year         = {2018},
  url          = {https://doi.org/10.1145/3178370},
  doi          = {10.1145/3178370},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/CarminatiPCLMZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/FarrisSCGJ18,
  author       = {Katheryn A. Farris and
                  Ankit Shah and
                  George Cybenko and
                  Rajesh Ganesan and
                  Sushil Jajodia},
  title        = {{VULCON:} {A} System for Vulnerability Prioritization, Mitigation,
                  and Management},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {21},
  number       = {4},
  pages        = {16:1--16:28},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196884},
  doi          = {10.1145/3196884},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/FarrisSCGJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/GiacobazziM18,
  author       = {Roberto Giacobazzi and
                  Isabella Mastroeni},
  title        = {Abstract Non-Interference: {A} Unifying Framework for Weakening Information-flow},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {21},
  number       = {2},
  pages        = {9:1--9:31},
  year         = {2018},
  url          = {https://doi.org/10.1145/3175660},
  doi          = {10.1145/3175660},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/GiacobazziM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/GongL18,
  author       = {Neil Zhenqiang Gong and
                  Bin Liu},
  title        = {Attribute Inference Attacks in Online Social Networks},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {21},
  number       = {1},
  pages        = {3:1--3:30},
  year         = {2018},
  url          = {https://doi.org/10.1145/3154793},
  doi          = {10.1145/3154793},
  timestamp    = {Mon, 31 Oct 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/GongL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/KelbertP18,
  author       = {Florian Kelbert and
                  Alexander Pretschner},
  title        = {Data Usage Control for Distributed Systems},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {21},
  number       = {3},
  pages        = {12:1--12:32},
  year         = {2018},
  url          = {https://doi.org/10.1145/3183342},
  doi          = {10.1145/3183342},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/KelbertP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/KimKKYSK18,
  author       = {Jinsu Kim and
                  Dongyoung Koo and
                  Yuna Kim and
                  Hyunsoo Yoon and
                  Junbum Shin and
                  Sungwook Kim},
  title        = {Efficient Privacy-Preserving Matrix Factorization for Recommendation
                  via Fully Homomorphic Encryption},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {21},
  number       = {4},
  pages        = {17:1--17:30},
  year         = {2018},
  url          = {https://doi.org/10.1145/3212509},
  doi          = {10.1145/3212509},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/KimKKYSK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/LevesqueCSF18,
  author       = {Fanny Lalonde L{\'{e}}vesque and
                  Sonia Chiasson and
                  Anil Somayaji and
                  Jos{\'{e}} M. Fernandez},
  title        = {Technological and Human Factors of Malware Attacks: {A} Computer Security
                  Clinical Trial Approach},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {21},
  number       = {4},
  pages        = {18:1--18:30},
  year         = {2018},
  url          = {https://doi.org/10.1145/3210311},
  doi          = {10.1145/3210311},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/LevesqueCSF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/PinkasSZ18,
  author       = {Benny Pinkas and
                  Thomas Schneider and
                  Michael Zohner},
  title        = {Scalable Private Set Intersection Based on {OT} Extension},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {21},
  number       = {2},
  pages        = {7:1--7:35},
  year         = {2018},
  url          = {https://doi.org/10.1145/3154794},
  doi          = {10.1145/3154794},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/PinkasSZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ShiMA18,
  author       = {Hao Shi and
                  Jelena Mirkovic and
                  Abdulla Alwabel},
  title        = {Handling Anti-Virtual Machine Techniques in Malicious Software},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {21},
  number       = {1},
  pages        = {2:1--2:31},
  year         = {2018},
  url          = {https://doi.org/10.1145/3139292},
  doi          = {10.1145/3139292},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/ShiMA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/SonNCK18,
  author       = {Yunmok Son and
                  Juhwan Noh and
                  Jaeyeong Choi and
                  Yongdae Kim},
  title        = {GyrosFinger: Fingerprinting Drones for Location Tracking Based on
                  the Outputs of {MEMS} Gyroscopes},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {21},
  number       = {2},
  pages        = {10:1--10:25},
  year         = {2018},
  url          = {https://doi.org/10.1145/3177751},
  doi          = {10.1145/3177751},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/SonNCK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/StobertB18,
  author       = {Elizabeth Stobert and
                  Robert Biddle},
  title        = {The Password Life Cycle},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {21},
  number       = {3},
  pages        = {13:1--13:32},
  year         = {2018},
  url          = {https://doi.org/10.1145/3183341},
  doi          = {10.1145/3183341},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/StobertB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/WeiROR18,
  author       = {Fengguo Wei and
                  Sankardas Roy and
                  Xinming Ou and
                  Robby},
  title        = {Amandroid: {A} Precise and General Inter-component Data Flow Analysis
                  Framework for Security Vetting of Android Apps},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {21},
  number       = {3},
  pages        = {14:1--14:32},
  year         = {2018},
  url          = {https://doi.org/10.1145/3183575},
  doi          = {10.1145/3183575},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/WeiROR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/YeTFCWAW18,
  author       = {Guixin Ye and
                  Zhanyong Tang and
                  Dingyi Fang and
                  Xiaojiang Chen and
                  Willy Wolff and
                  Adam J. Aviv and
                  Zheng Wang},
  title        = {A Video-based Attack for Android Pattern Lock},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {21},
  number       = {4},
  pages        = {19:1--19:31},
  year         = {2018},
  url          = {https://doi.org/10.1145/3230740},
  doi          = {10.1145/3230740},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/YeTFCWAW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ZhangBA18,
  author       = {Yihua Zhang and
                  Marina Blanton and
                  Ghada Almashaqbeh},
  title        = {Implementing Support for Pointers to Private Data in a General-Purpose
                  Secure Multi-Party Compiler},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {21},
  number       = {2},
  pages        = {6:1--6:34},
  year         = {2018},
  url          = {https://doi.org/10.1145/3154600},
  doi          = {10.1145/3154600},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/ZhangBA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ZhangPK18,
  author       = {Yupeng Zhang and
                  Charalampos Papamanthou and
                  Jonathan Katz},
  title        = {Verifiable Graph Processing},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {21},
  number       = {4},
  pages        = {20:1--20:23},
  year         = {2018},
  url          = {https://doi.org/10.1145/3233181},
  doi          = {10.1145/3233181},
  timestamp    = {Thu, 29 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/ZhangPK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ZhaoD18,
  author       = {Siqi Zhao and
                  Xuhua Ding},
  title        = {{FIMCE:} {A} Fully Isolated Micro-Computing Environment for Multicore
                  Systems},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {21},
  number       = {3},
  pages        = {15:1--15:30},
  year         = {2018},
  url          = {https://doi.org/10.1145/3195181},
  doi          = {10.1145/3195181},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/ZhaoD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}