


default search action
Journal of Computer Security, Volume 12
Volume 12, Number 1, 2004
- Dominic J. D. Hughes, Vitaly Shmatikov:

Information Hiding, Anonymity and Privacy: a Modular Approach. 3-36 - Alessandra Di Pierro

, Chris Hankin
, Herbert Wiklicky:
Approximate Non-interference. 37-82 - Gavin Lowe:

Analysing Protocol Subject to Guessing Attacks. 83-98 - Daniele Micciancio

, Bogdan Warinschi:
Completeness Theorems for the Abadi-Rogaway Language of Encrypted Expressions. 99-130 - Ajay Chander, Drew Dean, John C. Mitchell:

Reconstructing Trust Management. 131-164
Volume 12, Number 2, 2004
- Dirk Ourston, Sara Matzner, William Stump, Bryan Hopkins:

Coordinated Internet attacks: responding to attack complexity. 165-190 - Alessandro Aldini

, Mario Bravetti, Roberto Gorrieri
:
A process-algebraic approach for the analysis of probabilistic noninterference. 191-245 - Nancy A. Durgin, Patrick Lincoln, John C. Mitchell:

Multiset rewriting and the complexity of bounded security protocols. 247-311
Volume 12, Numbers 3-4, 2004
- Somesh Jha, Thomas W. Reps:

Model checking SPKI/SDSI. 317-353 - Vitaly Shmatikov:

Probabilistic analysis of an anonymity system. 355-377 - Philippa J. Broadfoot, A. W. Roscoe:

Embedding agents within the intruder to detect parallel attacks. 379-408 - Joshua D. Guttman

:
Authentication tests and disjoint encryption: A design method for security protocols. 409-433 - Andrew D. Gordon, Alan Jeffrey:

Types and effects for asymmetric cryptographic protocols. 435-483 - Dominic Duggan:

Type-based cryptographic operations. 485-550 - Levente Buttyán, Jean-Pierre Hubaux, Srdjan Capkun:

A formal model of rational exchange and its application to the analysis of Syverson's protocol. 551-587 - Michael Backes, Birgit Pfitzmann, Michael Waidner

:
Polynomial liveness. 589-617 - Gavin Lowe:

Defining information flow quantity. 619-653
Volume 12, Number 5, 2004
- Lingyu Wang, Duminda Wijesekera, Sushil Jajodia:

Cardinality-based inference control in data cubes. 655-692 - Roberto Di Pietro

, Luigi V. Mancini, Alessandro Mei
:
Key management for high bandwidth secure multicast. 693-709 - Taenam Cho, Sang-Ho Lee, Won Kim:

A group key recovery mechanism based on logical key hierarchy. 711-736 - Jian Zhang, Jian Gong, Yong Ding:

Research on automated rollbackability of intrusion response. 737-751 - Florian P. Buchholz, Clay Shields:

Providing process origin information to aid in computer forensic investigations. 753-776 - Charles Iheagwara, Andrew Blyth, Mukesh Singhal:

Cost effective management frameworks for intrusion detection systems. 777-798
Volume 12, Number 6, 2004
- Vijayalakshmi Atluri

, Soon Ae Chun, Pietro Mazzoleni:
Chinese wall security for decentralized workflow management systems. 799-840 - Premkumar T. Devanbu, Michael Gertz, April Kwong:

Flexible authentication of XML documents. 841-864 - Joshua D. Guttman

, F. Javier Thayer, Lenore D. Zuck:
The faithfulness of abstract protocol analysis: Message authentication. 865-891 - Catherine Meadows, Paul F. Syverson, Iliano Cervesato:

Formal specification and analysis of the Group Domain Of Interpretation Protocol using NPATRL and the NRL Protocol Analyzer. 893-931

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














