


default search action
International Journal of Information Security, Volume 7
Volume 7, Number 1, January 2008
- Pierpaolo Degano, Luca Viganò:

Preface. 1 - Alessandro Armando

, Luca Compagna:
SAT-based model-checking for security protocols analysis. 3-32 - Michael Backes, Birgit Pfitzmann:

Limits of the BRSIM/UC soundness of Dolev-Yao-style XOR. 33-54 - Andrea Bracciali

, Gianluigi Ferrari
, Emilio Tuosto
:
A symbolic framework for multi-faceted security protocol analysis. 55-84 - Juan M. Estévez-Tapiador

, Almudena Alcaide, Julio César Hernández Castro
, Arturo Ribagorda:
Bayesian rational exchange. 85-100
Volume 7, Number 2, April 2008
- Dieter Gollmann:

Editorial. 101 - Joaquín García-Alfaro

, Nora Boulahia-Cuppens, Frédéric Cuppens:
Complete analysis of configuration rules to guarantee reliable network security policies. 103-122 - Jason Crampton, Hemanth Khambhammettu:

Delegation in role-based access control. 123-136 - Philip W. L. Fong:

Discretionary capability confinement. 137-154 - Michael Backes, Markus Dürmuth, Dennis Hofheinz, Ralf Küsters:

Conditional reactive simulatability. 155-169
Volume 7, Number 3, June 2008
- Xinyi Huang, Willy Susilo

, Yi Mu, Wei Wu:
Secure universal designated verifier signature without random oracles. 171-183 - Pei-Te Chen, Chi-Sung Laih:

IDSIC: an intrusion detection system with identification capability. 185-197 - Joachim Biskup, Torben Weibert:

Keeping secrets in incomplete databases. 199-217 - Alessandro Aldini

, Alessandra Di Pierro:
Estimating the maximum information leakage. 219-242
Volume 7, Number 4, August 2008
- XiaoFeng Wang, Michael K. Reiter:

A multi-layer framework for puzzle-based denial-of-service defense. 243-263 - Christophe Tartary, Huaxiong Wang, Josef Pieprzyk

:
A coding approach to the multicast stream authentication problem. 265-283 - Frédéric Cuppens, Nora Cuppens-Boulahia:

Modeling contextual security policies. 285-305
Volume 7, Number 5, October 2008
- Esma Aïmeur, Gilles Brassard, José M. Fernandez

, Flavien Serge Mani Onana:
Alambic : a privacy-preserving recommender system for electronic commerce. 307-334 - Cherita L. Corbett, Raheem A. Beyah

, John A. Copeland:
Passive classification of wireless NICs during active scanning. 335-348 - Alexander W. Dent:

A survey of certificateless encryption schemes and security models. 349-377
Volume 7, Number 6, November 2008
- Changan Zhao

, Fangguo Zhang
, Jiwu Huang:
A note on the Ate pairing. 379-382 - Kenji Imamoto, Jianying Zhou

, Kouichi Sakurai:
Achieving evenhandedness in certified email system for contract signing. 383-394 - Theodoros Balopoulos, Stefanos Gritzalis

, Sokratis K. Katsikas
:
Specifying and implementing privacy-preserving cryptographic protocols. 395-420 - Jeremy W. Bryans

, Maciej Koutny, Laurent Mazaré, Peter Y. A. Ryan
:
Opacity generalised to transition systems. 421-435

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














