default search action
International Journal of Information Security, Volume 4
Volume 4, Number 1-2, February 2005
- Serge Autexier, Iliano Cervesato, Heiko Mantel:
Preface to the special issue of selected papers from FCS/VERIFY 2002. 1 - Jay Ligatti, Lujo Bauer, David Walker:
Edit automata: enforcement mechanisms for run-time security policies. 2-16 - Giampaolo Bella, Fabio Massacci, Lawrence C. Paulson:
An overview of the verification of SET. 17-28 - Joshua D. Guttman, Amy L. Herzog:
Rigorous automated network security management. 29-48 - Ralf Küsters:
On the decidability of cryptographic protocols with open-ended data structures. 49-70 - Kong-wei Lye, Jeannette M. Wing:
Game strategies in network security. 71-86 - Christian Skalka, Scott F. Smith:
Static use-based object confinement. 87-104 - Kyung-suk Lhee, Steve J. Chapin:
Detection of file-based race conditions. 105-119 - Yun Bai, Yan Zhang, Vijay Varadharajan:
On the sequence of authorization policy transformations. 120-131
Volume 4, Number 3, June 2005
- Einar Snekkenes:
Preface to the special issue on ESORICS 2003. 133-134 - Michael Backes, Birgit Pfitzmann, Michael Waidner:
Symmetric authentication in a simulatable Dolev-Yao-style cryptographic library. 135-154 - David von Oheimb, Volkmar Lotz, Georg Walter:
Analyzing SLE 88 memory management security using Interacting State Machines. 155-171 - Andrei Serjantov, Peter Sewell:
Passive-attack analysis for connection-based anonymity systems. 172-180 - David A. Basin, Sebastian Mödersheim, Luca Viganò:
OFMC: A symbolic model checker for security protocols. 181-208 - Jonathan T. Trostle, Bill Gossman:
Techniques for improving the security and manageability of IPsec policy. 209-226
Volume 4, Number 4, October 2005
- Colin Boyd, Wenbo Mao:
Preface to the special issue on ISC 2003. 227-227 - David Galindo, Sebastià Martín Molleví, Paz Morillo, Jorge Luis Villar:
Fujisaki-Okamoto hybrid encryption revisited. 228-241 - Michael Backes, Birgit Pfitzmann, Michael Waidner:
Reactively secure signature schemes. 242-252 - Sigrid Gürgens, Carsten Rudolph, Holger Vogt:
On the security of fair non-repudiation protocols. 253-262 - Adrian Baldwin, Simon Shiu:
Enabling shared audit data. 263-276 - Mikhail J. Atallah, Jiangtao Li:
Secure outsourcing of sequence comparisons . 277-287 - Yukio Itakura, Shigeo Tsujii:
Proposal on a multifactor biometric authentication method based on cryptosystem keys containing biometric signatures. 288-296
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.