


default search action
Journal of Computer Security, Volume 29
Volume 29, Number 1, 2021
- Hossein Shirazi, Bruhadeshwar Bezawada, Indrakshi Ray, Chuck Anderson:
Directed adversarial sampling attacks on phishing detection. 1-23 - Qinwen Hu, Muhammad Rizwan Asghar
, Nevil Brownlee:
A large-scale analysis of HTTPS deployments: Challenges, solutions, and recommendations. 25-50 - Federico Griscioli, Maurizio Pizzonia:
USBCaptchaIn: Preventing (un)conventional attacks from promiscuously used USB devices in industrial control systems. 51-76 - Chiara Bodei, Lorenzo Ceragioli, Pierpaolo Degano, Riccardo Focardi
, Letterio Galletta
, Flaminia L. Luccio
, Mauro Tempesta, Lorenzo Veronese:
FWS: Analyzing, maintaining and transcompiling firewalls. 77-134
Volume 29, Number 2, 2021
- Sonam Mittal
, K. R. Ramkumar:
Research perspectives on fully homomorphic encryption models for cloud sector. 135-160 - Zhiwu Xu, Hongxu Chen, Alwen Tiu, Yang Liu
, Kunal Sareen
:
A permission-dependent type system for secure information flow analysis. 161-228 - Panagiotis Grontas
, Aris Pagourtzis, Alexandros Zacharakis, Bingsheng Zhang:
Publicly auditable conditional blind signatures. 229-271
Volume 29, Number 3, 2021
- Yangguang Tian, Yingjiu Li, Robert H. Deng
, Binanda Sengupta
, Guomin Yang
:
Lattice-based remote user authentication from reusable fuzzy signature. 273-298 - Abraão Aires Urquiza, Musab A. Alturki, Tajana Ban Kirigin
, Max I. Kanovich, Vivek Nigam
, Andre Scedrov, Carolyn L. Talcott:
Resource and timing aspects of security protocols. 299-340 - Ghandi Hessam
, Ghassan Saba, M. Iyad Alkhayat:
A new approach for detecting violation of data plane integrity in Software Defined Networks. 341-358 - Sonam Mittal
, K. R. Ramkumar:
Research perspectives on fully homomorphic encryption models for cloud sector. 359
Volume 29, Number 4, 2021
- Abhishek Bichhawat, Vineet Rajani, Deepak Garg, Christian Hammer
:
Permissive runtime information flow control in the presence of exceptions. 361-401 - Jianguo Jiang, Boquan Li
, Baole Wei, Gang Li
, Chao Liu, Weiqing Huang, Meimei Li, Min Yu:
FakeFilter: A cross-distribution Deepfake detection system with domain adaptation. 403-421 - Md. Morshed Alam
, Weichao Wang:
A comprehensive survey on data provenance: State-of-the-art approaches and their deployments for IoT security enforcement. 423-446
Volume 29, Number 5, 2021
- Guangjun Li, Preetpal Sharma, Lei Pan, Sutharshan Rajasegarar
, Chandan K. Karmakar
, Nicholas Charles Patterson
:
Deep learning algorithms for cyber security applications: A survey. 447-471 - Andronicus Ayobami Akinyelu:
Advances in spam detection for email spam, web spam, social network spam, and review spam: ML-based and nature-inspired-based techniques. 473-529 - Himani Sharma
, Navdeep Kanwal:
Video interframe forgery detection: Classification, technique & new dataset. 531-550
Volume 29, Number 6, 2021
- Ben Smyth:
Ballot secrecy: Security definition, sufficient conditions, and analysis of Helios. 551-611 - Mina Sheikhalishahi, Ischa Stork, Nicola Zannone
:
Privacy-preserving policy evaluation in multi-party access control. 613-650

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.