JCS - volume 26 - 2018 论文列表 |
点击这里查看 Journal of Computer Security 的JCR分区、影响因子等信息 |
Alessandro Barenghi Nicholas Mainardi Gerardo Pelosi
Privacy-preserving verifiable elastic net among multiple institutions in the cloud.Jun Zhang Meiqi He Gongxian Zeng Siu-Ming Yiu
Surviving unpatchable vulnerabilities through heterogeneous network hardening options.Daniel Borbor Lingyu Wang Sushil Jajodia Anoop Singhal
Towards designing robust CAPTCHAs.David Lorenzi Emre Uzun Jaideep Vaidya Shamik Sural Vijayalakshmi Atluri
Jin Han Wangyu Zang Li Liu Songqing Chen Meng Yu
HardIDX: Practical and secure index with SGX in a malicious environment.Benny Fuhry Raad Bahmani Ferdinand Brasser Florian Hahn Florian Kerschbaum Ahmad-Reza Sadeghi
k-Skyband query answering with differential privacy.Ling Chen Ting Yu Rada Chirkova
Hybrid adversarial defense: Merging honeypots and traditional security methods.Tanmoy Chakraborty Sushil Jajodia Noseong Park Andrea Pugliese Edoardo Serra V. S. Subrahmanian
Identifying stealth malware using CPU power consumption and learning algorithms.Patrick Luckett Jeffrey Todd McDonald William Bradley Glisson Ryan Benton Joel A. Dawson Blair A. Doyle
Per A. Hallgren Ravi Kishore Martín Ochoa Andrei Sabelfeld
The impact of application context on privacy and performance of keystroke authentication systems.Kiran S. Balagani Paolo Gasti Aaron Elliott Azriel Richardson Mike O'Neal
Invalid certificates in modern browsers: A socio-technical analysis.Rosario Giustolisi Giampaolo Bella Gabriele Lenzini
Abstractions for security protocol verification. Automated and efficient analysis of administrative temporal RBAC policies with role hierarchies.Simon Bischof Joachim Breitner Jürgen Graf Martin Hecker Martin Mohr Gregor Snelting
Short voice imitation man-in-the-middle attacks on Crypto Phones: Defeating humans and machines.Maliheh Shirvanian Nitesh Saxena Dibya Mukhopadhyay
Accessing mobile user's privacy based on IME personalization: Understanding and practical attacks.Wenrui Diao Rui Liu Xiangyu Liu Zhe Zhou Zhou Li Kehuan Zhang
Haritabh Gupta Shamik Sural Vijayalakshmi Atluri Jaideep Vaidya
Reasoning about firewall policies through refinement and composition. Sharing-habits based privacy control in social networks.Silvie Levy Ehud Gudes Nurit Gal-Oz
Enforcing authorizations while protecting access confidentiality.Sabrina De Capitani di Vimercati Sara Foresti Stefano Paraboschi Gerardo Pelosi Pierangela Samarati
Christoph Sprenger David A. Basin
Characterizing a property-driven obfuscation strategy.Mila Dalla Preda Isabella Mastroeni
Substring search over encrypted data.Tarik Moataz Indrajit Ray Indrakshi Ray Abdullatif Shikfa Frédéric Cuppens Nora Cuppens