JCS - volume 29 - 2021 论文列表 |
点击这里查看 Journal of Computer Security 的JCR分区、影响因子等信息 |
Helen-Maria Dounavi Anna Mpanti Stavros D. Nikolopoulos Iosif Polenakis
Privacy-preserving policy evaluation in multi-party access control. Ballot secrecy: Security definition, sufficient conditions, and analysis of Helios.Guangjun Li Preetpal Sharma Lei Pan Sutharshan Rajasegarar Chandan K. Karmakar Nicholas Charles Patterson
Jianguo Jiang Boquan Li Baole Wei Gang Li Chao Liu Weiqing Huang Meimei Li Min Yu
Permissive runtime information flow control in the presence of exceptions.Abhishek Bichhawat Vineet Rajani Deepak Garg Christian Hammer
Ghandi Hessam Ghassan Saba M. Iyad Alkhayat
Resource and timing aspects of security protocols.Abraão Aires Urquiza Musab A. Alturki Tajana Ban Kirigin Max I. Kanovich Vivek Nigam Andre Scedrov Carolyn L. Talcott
Lattice-based remote user authentication from reusable fuzzy signature.Yangguang Tian Yingjiu Li Robert H. Deng Binanda Sengupta Guomin Yang
Panagiotis Grontas Aris Pagourtzis Alexandros Zacharakis Bingsheng Zhang
A permission-dependent type system for secure information flow analysis. Research perspectives on fully homomorphic encryption models for cloud sector.Chiara Bodei Lorenzo Ceragioli Pierpaolo Degano Riccardo Focardi Letterio Galletta Flaminia L. Luccio Mauro Tempesta Lorenzo Veronese
USBCaptchaIn: Preventing (un)conventional attacks from promiscuously used USB devices in industrial control systems.Federico Griscioli Maurizio Pizzonia
A large-scale analysis of HTTPS deployments: Challenges, solutions, and recommendations.Qinwen Hu Muhammad Rizwan Asghar Nevil Brownlee
Directed adversarial sampling attacks on phishing detection.Hossein Shirazi Bruhadeshwar Bezawada Indrakshi Ray Chuck Anderson