


default search action
Journal of Computer Security, Volume 13
Volume 13, Number 1, 2005
- Stefano Bistarelli

, Iliano Cervesato, Gabriele Lenzini, Fabio Martinelli:
Relating multiset rewriting and process algebras for security protocol analysis. 3-47 - Chiara Bodei, Pierpaolo Degano, Corrado Priami:

Checking security policies through an enhanced Control Flow Analysis. 49-85 - Michele Bugliesi

, Sabina Rossi:
Non-interference proof techniques for the analysis of cryptographic protocols. 87-113 - Joshua D. Guttman

, Amy L. Herzog, John D. Ramsdell, Clement W. Skorupka:
Verifying information flow goals in Security-Enhanced Linux. 115-134 - Ramaswamy Ramanujam, S. P. Suresh

:
Decidability of context-explicit security protocols. 135-165 - Vitaly Shmatikov, Carolyn L. Talcott:

Reputation-based trust management. 167-190
Volume 13, Number 2, 2005
- Elisa Bertino, Elena Ferrari

, Giovanni Mella:
An approach to cooperative updates of XML documents in distributed systems. 191-242 - Andre Zuquete

:
An efficient high quality random number generator for multi-programmed systems. 243-263 - Iliano Cervesato, Nancy A. Durgin, Patrick Lincoln:

A comparison between strand spaces and multiset rewriting for security protocol analysis. 265-316 - James Heather, Steve A. Schneider:

A decision procedure for the existence of a rank function. 317-344
Volume 13, Number 3, 2005
- Riccardo Focardi:

Guest editor's preface. 345- - Chiara Bodei, Mikael Buchholtz, Pierpaolo Degano, Flemming Nielson, Hanne Riis Nielson:

Static validation of security protocols. 347-390 - Annalisa Bossi, Damiano Macedonio, Carla Piazza, Sabina Rossi:

Information flow in secure contexts. 391-422 - Anupam Datta, Ante Derek, John C. Mitchell, Dusko Pavlovic

:
A derivation system and compositional logic for security protocols. 423-482 - Joseph Y. Halpern, Kevin R. O'Neill:

Anonymity and information hiding in multiagent systems. 483-512 - Jonathan K. Millen, Vitaly Shmatikov:

Symbolic protocol analysis with an Abelian group operator or Diffie-Hellman exponentiation. 515-564 - Bogdan Warinschi:

A computational analysis of the Needham-Schroeder-(Lowe) protocol. 565-591
Volume 13, Number 4, 2005
- Jaideep Vaidya, Chris Clifton:

Secure set intersection cardinality with application to association rule mining. 593-622 - Meng Yu, Peng Liu, Wanyu Zang:

Specifying and using intrusion masking models to process distributed operations. 623-658 - Salvatore J. Stolfo, Frank Apap, Eleazar Eskin, Katherine A. Heller, Shlomo Hershkop, Andrew Honig, Krysta M. Svore:

A comparative evaluation of two algorithms for Windows Registry Anomaly Detection. 659-693
- Jonathan K. Millen, Vitaly Shmatikov:

Symbolic protocol analysis with an Abelian group operator or Diffie-Hellman exponentiation. 695-
Volume 13, Number 5, 2005
- Giampaolo Bella, Peter Y. A. Ryan:

Guest Editors' preface. 697- - Stefano Bistarelli

, Simon N. Foley
, Barry O'Sullivan
:
A soft constraint-based approach to the cascade vulnerability problem. 699-720 - Christian S. Collberg, Tapas Ranjan Sahoo:

Software watermarking in the frequency domain: Implementation, analysis, and attacks. 721-755 - Aleksandra Nenadic, Ning Zhang, Qi Shi

:
RSA-based Verifiable and Recoverable Encryption of Signatures and its application in certified e-mail delivery. 757-777 - Christos Siaterlis, Vasilis Maglaris

:
One step ahead to multisensor data fusion for DDoS detection. 779-806
Volume 13, Number 6, 2005
- Jarmo Mölsä:

Mitigating denial of service attacks: A tutorial. 807-837 - Rob Sherwood, Bobby Bhattacharjee, Aravind Srinivasan:

P5: A protocol for scalable anonymous communication. 839-876 - Antonio Pescapè, Giorgio Ventre:

Experimental analysis of attacks against intradomain routing protocols. 877-903

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














