


default search action
ACM Transactions on Information and System Security, Volume 18
Volume 18, Number 1, June 2015
- Ghassan O. Karame, Elli Androulaki, Marc Roeschlin, Arthur Gervais, Srdjan Capkun:
Misbehavior in Bitcoin: A Study of Double-Spending and Accountability. 2:1-2:32 - Chris Culnane
, Peter Y. A. Ryan
, Steve A. Schneider
, Vanessa Teague:
vVote: A Verifiable Voting System. 3:1-3:30 - Goran Doychev, Boris Köpf, Laurent Mauborgne, Jan Reineke:
CacheAudit: A Tool for the Static Analysis of Cache Side Channels. 4:1-4:32
Volume 18, Number 2, December 2015
- Rui Tan, Varun Badrinath Krishna, David K. Y. Yau, Zbigniew T. Kalbarczyk:
Integrity Attacks on Real-Time Pricing in Electric Power Grids. 5:1-5:33 - Perry Alexander, Lee Pike, Peter A. Loscocco, George Coker:
Model Checking Distributed Mandatory Access Control Policies. 6:1-6:25 - Muhammad Qasim Ali, Ehab Al-Shaer:
Randomization-Based Intrusion Detection System for Advanced Metering Infrastructure. 7:1-7:30 - Stephen Chong, Ron van der Meyden
:
Using Architecture to Reason about Information Security. 8:1-8:30
Volume 18, Number 3, April 2016
- Asaf Shabtai, Maya Bercovitch, Lior Rokach, Ya'akov (Kobi) Gal
, Yuval Elovici, Erez Shmueli:
Behavioral Study of Users When Interacting with Active Honeytokens. 9:1-9:21 - Fabrice Benhamouda, Marc Joye, Benoît Libert:
A New Framework for Privacy-Preserving Aggregation of Time-Series Data. 10:1-10:21 - Nan Zheng, Aaron Paloski, Haining Wang:
An Efficient User Verification System Using Angle-Based Mouse Movement Biometrics. 11:1-11:27
Volume 18, Number 4, May 2016
- Shouling Ji, Weiqing Li, Mudhakar Srivatsa, Jing (Selena) He, Raheem A. Beyah
:
General Graph Data De-Anonymization: From Mobility Traces to Social Networks. 12:1-12:29 - Richard Shay, Saranga Komanduri, Adam L. Durity, Phillip (Seyoung) Huh, Michelle L. Mazurek, Sean M. Segreti, Blase Ur, Lujo Bauer
, Nicolas Christin
, Lorrie Faith Cranor
:
Designing Password Policies for Strength and Usability. 13:1-13:34 - Abdul Serwadda, Vir V. Phoha
, Zibo Wang, Rajesh Kumar
, Diksha Shukla:
Toward Robotic Robbery on the Touch Screen. 14:1-14:25

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.