


default search action
Journal of Computer Security, Volume 15
Volume 15, Number 1, 2007
- Message from the Guest Editors. 1-2
- Charikleia Zouridaki, Brian L. Mark, Marek Hejmo, Roshan K. Thomas:
Hermes: A quantitative trust establishment framework for reliable data packet delivery in MANETs. 3-38 - Maxim Raya, Jean-Pierre Hubaux:
Securing vehicular ad hoc networks. 39-68 - Haowen Chan, Adrian Perrig, Bartosz Przydatek, Dawn Xiaodong Song:
SIA: Secure information aggregation in sensor networks. 69-102 - Svetlana Radosavac, Alvaro A. Cárdenas, John S. Baras, George V. Moustakides:
Detecting IEEE 802.11 MAC layer misbehavior in ad hoc networks: Robust strategies against individual and colluding attackers. 103-128 - Shouhuai Xu:
On the security of group communication schemes. 129-169 - Giorgio Zanin, Roberto Di Pietro
, Luigi V. Mancini:
Robust RSA distributed signatures for large-scale long-lived ad hoc networks. 171-196
Volume 15, Number 2, 2007
- Valentina Casola
, Antonino Mazzeo, Nicola Mazzocca
, Valeria Vittorini:
A policy-based methodology for security evaluation: A Security Metric for Public Key Infrastructures. 197-229 - Mahesh V. Tripunitara, Ninghui Li:
A theory for comparing the expressive power of access control models. 231-272 - Victor A. Skormin, Alexander Volynkin, Douglas H. Summerville, James Moronski:
Prevention of information attacks by run-time detection of self-replication in computer codes. 273-302
Volume 15, Number 3, 2007
- Stephanie Wehner:
Analyzing worms and network traffic using compression. 303-320 - David Clark
, Sebastian Hunt
, Pasquale Malacaria:
A static analysis for quantifying information flow in a simple imperative language. 321-371 - Annalisa Bossi, Carla Piazza, Sabina Rossi:
Compositional information flow security for concurrent programs. 373-416
Volume 15, Number 4, 2007
- Lingyu Wang, Yingjiu Li, Sushil Jajodia, Duminda Wijesekera:
Parity-based inference control for multi-dimensional range sum queries. 417-445 - Christian Skalka, Xiaoyang Sean Wang, Peter C. Chapin:
Risk management for distributed authorization. 447-489
Volume 15, Number 5, 2007
- Atsuhiro Goto:
Preface. 491 - Abhilasha Bhargav-Spantzel, Jan Camenisch, Thomas Gross
, Dieter Sommer:
User centricity: A taxonomy and open issues. 493-527 - Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciarini
, Shimon K. Modi, Matthew Young, Elisa Bertino, Stephen J. Elliott:
Privacy preserving multi-factor authentication with biometrics. 529-560
Volume 15, Number 6, 2007
- Michael Backes, David A. Basin, Michael Waidner
:
Preface. 561 - Michele Bugliesi
, Riccardo Focardi, Matteo Maffei:
Dynamic types for authentication. 563-617 - Ricardo Corin, Sandro Etalle, Pieter H. Hartel, Angelika Mader
:
Timed analysis of security protocols. 619-645 - Gilles Barthe, Leonor Prensa Nieto:
Secure information flow for a concurrent language with scheduling. 647-689 - Tomás E. Uribe, Steven Cheung:
Automatic analysis of firewall and network intrusion detection system configurations. 691-715

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.