Search dblp for Publications

export results for "stream:journals/tissec:"

 download as .bib file

@article{DBLP:journals/tissec/0002DNW24,
  author       = {Liqun Chen and
                  Changyu Dong and
                  Christopher J. P. Newton and
                  Yalan Wang},
  title        = {Sphinx-in-the-Head: Group Signatures from Symmetric Primitives},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {27},
  number       = {1},
  pages        = {11:1--11:35},
  year         = {2024},
  url          = {https://doi.org/10.1145/3638763},
  doi          = {10.1145/3638763},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/0002DNW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/0002LDP0024,
  author       = {Yong Zeng and
                  Jiale Liu and
                  Tong Dong and
                  Qingqi Pei and
                  Jianfeng Ma and
                  Yao Liu},
  title        = {Eyes See Hazy while Algorithms Recognize Who You Are},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {27},
  number       = {1},
  pages        = {7:1--7:23},
  year         = {2024},
  url          = {https://doi.org/10.1145/3632292},
  doi          = {10.1145/3632292},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/0002LDP0024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/0004SLGW24,
  author       = {Han Cao and
                  Qindong Sun and
                  Yaqi Li and
                  Rong Geng and
                  Xiaoxiong Wang},
  title        = {Efficient History-Driven Adversarial Perturbation Distribution Learning
                  in Low Frequency Domain},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {27},
  number       = {1},
  pages        = {4:1--4:25},
  year         = {2024},
  url          = {https://doi.org/10.1145/3632293},
  doi          = {10.1145/3632293},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/0004SLGW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/0008DANS024,
  author       = {Shen Wang and
                  Mahshid Delavar and
                  Muhammad Ajmal Azad and
                  Farshad Nabizadeh and
                  Steve Smith and
                  Feng Hao},
  title        = {Spoofing Against Spoofing: Toward Caller {ID} Verification in Heterogeneous
                  Telecommunication Systems},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {27},
  number       = {1},
  pages        = {1:1--1:25},
  year         = {2024},
  url          = {https://doi.org/10.1145/3625546},
  doi          = {10.1145/3625546},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/0008DANS024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/AhmedCASL24,
  author       = {Mukhtar Ahmed and
                  Jinfu Chen and
                  Ernest Akpaku and
                  Rexford Nii Ayitey Sosu and
                  Ajmal Latif},
  title        = {{DELM:} Deep Ensemble Learning Model for Anomaly Detection in Malicious
                  Network Traffic-based Adaptive Feature Aggregation and Network Optimization},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {27},
  number       = {4},
  pages        = {32:1--32:36},
  year         = {2024},
  url          = {https://doi.org/10.1145/3690637},
  doi          = {10.1145/3690637},
  timestamp    = {Wed, 06 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/AhmedCASL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/AhmedPSA24,
  author       = {Abu Shohel Ahmed and
                  Aleksi Peltonen and
                  Mohit Sethi and
                  Tuomas Aura},
  title        = {Security Analysis of the Consumer Remote {SIM} Provisioning Protocol},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {27},
  number       = {3},
  pages        = {23:1--23:36},
  year         = {2024},
  url          = {https://doi.org/10.1145/3663761},
  doi          = {10.1145/3663761},
  timestamp    = {Thu, 03 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/AhmedPSA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/AmeerPSBG24,
  author       = {Safwa Ameer and
                  Lopamudra Praharaj and
                  Ravi Sandhu and
                  Smriti Bhatt and
                  Maanak Gupta},
  title        = {ZTA-IoT: {A} Novel Architecture for Zero-Trust in IoT Systems and
                  an Ensuing Usage Control Model},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {27},
  number       = {3},
  pages        = {22:1--22:36},
  year         = {2024},
  url          = {https://doi.org/10.1145/3671147},
  doi          = {10.1145/3671147},
  timestamp    = {Thu, 03 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/AmeerPSBG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BayerKSR24,
  author       = {Markus Bayer and
                  Philipp Kuehn and
                  Ramin Shanehsaz and
                  Christian Reuter},
  title        = {CySecBERT: {A} Domain-Adapted Language Model for the Cybersecurity
                  Domain},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {27},
  number       = {2},
  pages        = {18},
  year         = {2024},
  url          = {https://doi.org/10.1145/3652594},
  doi          = {10.1145/3652594},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/BayerKSR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BernabeRodriguezGL24,
  author       = {Julen Bernab{\'{e}}{-}Rodr{\'{\i}}guez and
                  Albert Garreta and
                  Oscar Lage},
  title        = {A Decentralized Private Data Marketplace using Blockchain and Secure
                  Multi-Party Computation},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {27},
  number       = {2},
  pages        = {19},
  year         = {2024},
  url          = {https://doi.org/10.1145/3652162},
  doi          = {10.1145/3652162},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/BernabeRodriguezGL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BlassN24,
  author       = {Erik{-}Oliver Blass and
                  Guevara Noubir},
  title        = {Forward Security with Crash Recovery for Secure Logs},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {27},
  number       = {1},
  pages        = {3:1--3:28},
  year         = {2024},
  url          = {https://doi.org/10.1145/3631524},
  doi          = {10.1145/3631524},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/BlassN24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/CeragioliGDB24,
  author       = {Lorenzo Ceragioli and
                  Letterio Galletta and
                  Pierpaolo Degano and
                  David A. Basin},
  title        = {Specifying and Verifying Information Flow Control in SELinux Configurations},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {27},
  number       = {4},
  pages        = {31:1--31:35},
  year         = {2024},
  url          = {https://doi.org/10.1145/3690636},
  doi          = {10.1145/3690636},
  timestamp    = {Wed, 06 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/CeragioliGDB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ChenHK24,
  author       = {Jiayi Chen and
                  Urs Hengartner and
                  Hassan Khan},
  title        = {{MRAAC:} {A} Multi-stage Risk-aware Adaptive Authentication and Access
                  Control Framework for Android},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {27},
  number       = {2},
  pages        = {17},
  year         = {2024},
  url          = {https://doi.org/10.1145/3648372},
  doi          = {10.1145/3648372},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/ChenHK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ConconeGGRM24,
  author       = {Federico Concone and
                  Salvatore Gaglio and
                  Andrea Giammanco and
                  Giuseppe Lo Re and
                  Marco Morana},
  title        = {AdverSPAM: Adversarial SPam Account Manipulation in Online Social
                  Networks},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {27},
  number       = {2},
  pages        = {15},
  year         = {2024},
  url          = {https://doi.org/10.1145/3643563},
  doi          = {10.1145/3643563},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/ConconeGGRM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/EbrahimpourH24,
  author       = {Ghader Ebrahimpour and
                  Mohammad Sayad Haghighi},
  title        = {Is Bitcoin Future as Secure as We Think? Analysis of Bitcoin Vulnerability
                  to Bribery Attacks Launched through Large Transactions},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {27},
  number       = {2},
  pages        = {14},
  year         = {2024},
  url          = {https://doi.org/10.1145/3641546},
  doi          = {10.1145/3641546},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/EbrahimpourH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/GunasingheAB24,
  author       = {Hasini Gunasinghe and
                  Mikhail J. Atallah and
                  Elisa Bertino},
  title        = {{PEBASI:} {A} Privacy preserving, Efficient Biometric Authentication
                  Scheme based on Irises},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {27},
  number       = {3},
  pages        = {25:1--25:31},
  year         = {2024},
  url          = {https://doi.org/10.1145/3677017},
  doi          = {10.1145/3677017},
  timestamp    = {Wed, 09 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/GunasingheAB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/HeHGC24,
  author       = {Xinyu He and
                  Fengrui Hao and
                  Tianlong Gu and
                  Liang Chang},
  title        = {CBAs: Character-level Backdoor Attacks against Chinese Pre-trained
                  Language Models},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {27},
  number       = {3},
  pages        = {24:1--24:26},
  year         = {2024},
  url          = {https://doi.org/10.1145/3678007},
  doi          = {10.1145/3678007},
  timestamp    = {Thu, 03 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/HeHGC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/KlubanMY24,
  author       = {Maryna Kluban and
                  Mohammad Mannan and
                  Amr M. Youssef},
  title        = {On Detecting and Measuring Exploitable JavaScript Functions in Real-world
                  Applications},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {27},
  number       = {1},
  pages        = {8:1--8:37},
  year         = {2024},
  url          = {https://doi.org/10.1145/3630253},
  doi          = {10.1145/3630253},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/KlubanMY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/MohantyT24,
  author       = {Susil Kumar Mohanty and
                  Somanath Tripathy},
  title        = {Flexichain: Flexible Payment Channel Network to Defend Against Channel
                  Exhaustion Attack},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {27},
  number       = {4},
  pages        = {30:1--30:26},
  year         = {2024},
  url          = {https://doi.org/10.1145/3687476},
  doi          = {10.1145/3687476},
  timestamp    = {Wed, 06 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/MohantyT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/OttmannBF24,
  author       = {Jenny Ottmann and
                  Frank Breitinger and
                  Felix C. Freiling},
  title        = {An Experimental Assessment of Inconsistencies in Memory Forensics},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {27},
  number       = {1},
  pages        = {2:1--2:29},
  year         = {2024},
  url          = {https://doi.org/10.1145/3628600},
  doi          = {10.1145/3628600},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/OttmannBF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/OuDZLL24,
  author       = {Weihan Ou and
                  Steven H. H. Ding and
                  Mohammad Zulkernine and
                  Li Tao Li and
                  Sarah Labrosse},
  title        = {VeriBin: {A} Malware Authorship Verification Approach for {APT} Tracking
                  through Explainable and Functionality-Debiasing Adversarial Representation
                  Learning},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {27},
  number       = {3},
  pages        = {26:1--26:37},
  year         = {2024},
  url          = {https://doi.org/10.1145/3669901},
  doi          = {10.1145/3669901},
  timestamp    = {Thu, 03 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/OuDZLL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ParkK24,
  author       = {Namgyu Park and
                  Jong Kim},
  title        = {Toward Robust {ASR} System against Audio Adversarial Examples using
                  Agitated Logit},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {27},
  number       = {2},
  pages        = {20},
  year         = {2024},
  url          = {https://doi.org/10.1145/3661822},
  doi          = {10.1145/3661822},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/ParkK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/Qiao0K24,
  author       = {Yan Qiao and
                  Kui Wu and
                  Majid Khabbazian},
  title        = {Non-intrusive Balance Tomography Using Reinforcement Learning in the
                  Lightning Network},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {27},
  number       = {1},
  pages        = {12:1--12:32},
  year         = {2024},
  url          = {https://doi.org/10.1145/3639366},
  doi          = {10.1145/3639366},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/Qiao0K24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/SateesanVSHPM24,
  author       = {Arish Sateesan and
                  Jo Vliegen and
                  Simon Scherrer and
                  Hsu{-}Chun Hsiao and
                  Adrian Perrig and
                  Nele Mentens},
  title        = {SPArch: {A} Hardware-oriented Sketch-based Architecture for High-speed
                  Network Flow Measurements},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {27},
  number       = {4},
  pages        = {29:1--29:34},
  year         = {2024},
  url          = {https://doi.org/10.1145/3687477},
  doi          = {10.1145/3687477},
  timestamp    = {Wed, 06 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/SateesanVSHPM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/SathiM24,
  author       = {Vipin N. Sathi and
                  C. Siva Ram Murthy},
  title        = {Boost Your Immunity: {VACCINE} for Preventing a Novel Stealthy Slice
                  Selection Attack in 5G and Beyond},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {27},
  number       = {4},
  pages        = {27:1--27:29},
  year         = {2024},
  url          = {https://doi.org/10.1145/3686152},
  doi          = {10.1145/3686152},
  timestamp    = {Wed, 06 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/SathiM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/SchulmannZ24,
  author       = {Haya Schulmann and
                  Shujie Zhao},
  title        = {ZPredict: ML-Based {IPID} Side-channel Measurements},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {27},
  number       = {4},
  pages        = {28:1--28:33},
  year         = {2024},
  url          = {https://doi.org/10.1145/3672560},
  doi          = {10.1145/3672560},
  timestamp    = {Wed, 06 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/SchulmannZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ShiMGS24,
  author       = {Zhenpeng Shi and
                  Nikolay Matyunin and
                  Kalman Graffi and
                  David Starobinski},
  title        = {Uncovering {CWE-CVE-CPE} Relations with Threat Knowledge Graphs},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {27},
  number       = {1},
  pages        = {13:1--13:26},
  year         = {2024},
  url          = {https://doi.org/10.1145/3641819},
  doi          = {10.1145/3641819},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/ShiMGS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ShresthaMS24,
  author       = {Prakash Shrestha and
                  Ahmed Tanvir Mahdad and
                  Nitesh Saxena},
  title        = {Sound-based Two-factor Authentication: Vulnerabilities and Redesign},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {27},
  number       = {1},
  pages        = {5:1--5:27},
  year         = {2024},
  url          = {https://doi.org/10.1145/3632175},
  doi          = {10.1145/3632175},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/ShresthaMS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/SommerGKKS24,
  author       = {Florian Sommer and
                  Mona Gierl and
                  Reiner Kriesten and
                  Frank Kargl and
                  Eric Sax},
  title        = {Combining Cyber Security Intelligence to Refine Automotive Cyber Threats},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {27},
  number       = {2},
  pages        = {16},
  year         = {2024},
  url          = {https://doi.org/10.1145/3644075},
  doi          = {10.1145/3644075},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/SommerGKKS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/SwarnkarS24,
  author       = {Mayank Swarnkar and
                  Neha Sharma},
  title        = {\emph{OptiClass}: An Optimized Classifier for Application Layer Protocols
                  Using Bit Level Signatures},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {27},
  number       = {1},
  pages        = {6:1--6:23},
  year         = {2024},
  url          = {https://doi.org/10.1145/3633777},
  doi          = {10.1145/3633777},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/SwarnkarS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/Tang00XX024,
  author       = {Li Tang and
                  Qingqing Ye and
                  Haibo Hu and
                  Qiao Xue and
                  Yaxin Xiao and
                  Jin Li},
  title        = {DeepMark: {A} Scalable and Robust Framework for DeepFake Video Detection},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {27},
  number       = {1},
  pages        = {9:1--9:26},
  year         = {2024},
  url          = {https://doi.org/10.1145/3629976},
  doi          = {10.1145/3629976},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/Tang00XX024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ValentimDMC24,
  author       = {Rodolfo Vieira Valentim and
                  Idilio Drago and
                  Marco Mellia and
                  Federico Cerutti},
  title        = {X-squatter: {AI} Multilingual Generation of Cross-Language Sound-squatting},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {27},
  number       = {3},
  pages        = {21:1--21:27},
  year         = {2024},
  url          = {https://doi.org/10.1145/3663569},
  doi          = {10.1145/3663569},
  timestamp    = {Thu, 03 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/ValentimDMC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/WangML0JG24,
  author       = {Li Wang and
                  Xiangtao Meng and
                  Dan Li and
                  Xuhong Zhang and
                  Shouling Ji and
                  Shanqing Guo},
  title        = {{DEEPFAKER:} {A} Unified Evaluation Platform for Facial Deepfake and
                  Detection Models},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {27},
  number       = {1},
  pages        = {10:1--10:34},
  year         = {2024},
  url          = {https://doi.org/10.1145/3634914},
  doi          = {10.1145/3634914},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/WangML0JG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/AlexJP23,
  author       = {Sona Alex and
                  Dhanaraj K. J. and
                  Deepthi P. P.},
  title        = {Energy Efficient and Secure Neural Network-based Disease Detection
                  Framework for Mobile Healthcare Network},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {26},
  number       = {3},
  pages        = {29:1--29:27},
  year         = {2023},
  url          = {https://doi.org/10.1145/3585536},
  doi          = {10.1145/3585536},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/AlexJP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/AlotaibiWK23,
  author       = {Norah Mohsen T. Alotaibi and
                  John Williamson and
                  Mohamed Khamis},
  title        = {ThermoSecure: Investigating the Effectiveness of AI-Driven Thermal
                  Attacks on Commonly Used Computer Keyboards},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {26},
  number       = {2},
  pages        = {12:1--12:24},
  year         = {2023},
  url          = {https://doi.org/10.1145/3563693},
  doi          = {10.1145/3563693},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/AlotaibiWK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/AloufiHB23,
  author       = {Ranya Aloufi and
                  Hamed Haddadi and
                  David Boyle},
  title        = {Paralinguistic Privacy Protection at the Edge},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {26},
  number       = {2},
  pages        = {19:1--19:27},
  year         = {2023},
  url          = {https://doi.org/10.1145/3570161},
  doi          = {10.1145/3570161},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/AloufiHB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/AmroGK23,
  author       = {Ahmed Amro and
                  Vasileios Gkioulos and
                  Sokratis K. Katsikas},
  title        = {Assessing Cyber Risk in Cyber-Physical Systems Using the ATT{\&}CK
                  Framework},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {26},
  number       = {2},
  pages        = {22:1--22:33},
  year         = {2023},
  url          = {https://doi.org/10.1145/3571733},
  doi          = {10.1145/3571733},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/AmroGK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BansalKHCBM23,
  author       = {Ayoosh Bansal and
                  Anant Kandikuppa and
                  Monowar Hasan and
                  Chien{-}Ying Chen and
                  Adam Bates and
                  Sibin Mohan},
  title        = {System Auditing for Real-Time Systems},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {26},
  number       = {4},
  pages        = {50:1--50:37},
  year         = {2023},
  url          = {https://doi.org/10.1145/3625229},
  doi          = {10.1145/3625229},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/BansalKHCBM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BarbosaBGKS23,
  author       = {Manuel Barbosa and
                  Gilles Barthe and
                  Benjamin Gr{\'{e}}goire and
                  Adrien Koutsos and
                  Pierre{-}Yves Strub},
  title        = {Mechanized Proofs of Adversarial Complexity and Application to Universal
                  Composability},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {26},
  number       = {3},
  pages        = {41:1--41:34},
  year         = {2023},
  url          = {https://doi.org/10.1145/3589962},
  doi          = {10.1145/3589962},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/BarbosaBGKS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BarreraBO23,
  author       = {David Barrera and
                  Christopher Bellman and
                  Paul C. van Oorschot},
  title        = {Security Best Practices: {A} Critical Analysis Using IoT as a Case
                  Study},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {26},
  number       = {2},
  pages        = {13:1--13:30},
  year         = {2023},
  url          = {https://doi.org/10.1145/3563392},
  doi          = {10.1145/3563392},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/BarreraBO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BhuiyanR23,
  author       = {Farzana Ahamed Bhuiyan and
                  Akond Rahman},
  title        = {Log-related Coding Patterns to Conduct Postmortems of Attacks in Supervised
                  Learning-based Projects},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {26},
  number       = {2},
  pages        = {17:1--17:24},
  year         = {2023},
  url          = {https://doi.org/10.1145/3568020},
  doi          = {10.1145/3568020},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/BhuiyanR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BoltonDBM23,
  author       = {Tom Bolton and
                  Tooska Dargahi and
                  Sana Belguith and
                  Carsten Maple},
  title        = {PrivExtractor: Toward Redressing the Imbalance of Understanding between
                  Virtual Assistant Users and Vendors},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {26},
  number       = {3},
  pages        = {31:1--31:29},
  year         = {2023},
  url          = {https://doi.org/10.1145/3588770},
  doi          = {10.1145/3588770},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/BoltonDBM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/CabarcosFHSBS23,
  author       = {Patricia Arias Cabarcos and
                  Matin Fallahi and
                  Thilo Habrich and
                  Karen Schulze and
                  Christian Becker and
                  Thorsten Strufe},
  title        = {Performance and Usability Evaluation of Brainwave Authentication Techniques
                  with Consumer Devices},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {26},
  number       = {3},
  pages        = {26:1--26:36},
  year         = {2023},
  url          = {https://doi.org/10.1145/3579356},
  doi          = {10.1145/3579356},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/CabarcosFHSBS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ChenSCXYA23,
  author       = {Jinfu Chen and
                  Luo Song and
                  Saihua Cai and
                  Haodi Xie and
                  Shang Yin and
                  Bilal Ahmad},
  title        = {{TLS-MHSA:} An Efficient Detection Model for Encrypted Malicious Traffic
                  based on Multi-Head Self-Attention Mechanism},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {26},
  number       = {4},
  pages        = {44:1--44:21},
  year         = {2023},
  url          = {https://doi.org/10.1145/3613960},
  doi          = {10.1145/3613960},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/ChenSCXYA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ChooNAKYW23,
  author       = {Euijin Choo and
                  Mohamed Nabeel and
                  Mashael AlSabah and
                  Issa Khalil and
                  Ting Yu and
                  Wei Wang},
  title        = {DeviceWatch: {A} Data-Driven Network Analysis Approach to Identifying
                  Compromised Mobile Devices with Graph-Inference},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {26},
  number       = {1},
  pages        = {9:1--9:32},
  year         = {2023},
  url          = {https://doi.org/10.1145/3558767},
  doi          = {10.1145/3558767},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/ChooNAKYW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/DambraBB23,
  author       = {Savino Dambra and
                  Leyla Bilge and
                  Davide Balzarotti},
  title        = {A Comparison of Systemic and Systematic Risks of Malware Encounters
                  in Consumer and Enterprise Environments},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {26},
  number       = {2},
  pages        = {16:1--16:30},
  year         = {2023},
  url          = {https://doi.org/10.1145/3565362},
  doi          = {10.1145/3565362},
  timestamp    = {Thu, 11 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/DambraBB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/DanielBR23,
  author       = {Lesly{-}Ann Daniel and
                  S{\'{e}}bastien Bardin and
                  Tamara Rezk},
  title        = {Binsec/Rel: Symbolic Binary Analyzer for Security with Applications
                  to Constant-Time and Secret-Erasure},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {26},
  number       = {2},
  pages        = {11:1--11:42},
  year         = {2023},
  url          = {https://doi.org/10.1145/3563037},
  doi          = {10.1145/3563037},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/DanielBR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/EngstromJLRW23,
  author       = {Viktor Engstr{\"{o}}m and
                  Pontus Johnson and
                  Robert Lagerstr{\"{o}}m and
                  Erik Ringdahl and
                  Max W{\"{a}}llstedt},
  title        = {Automated Security Assessments of Amazon Web Services Environments},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {26},
  number       = {2},
  pages        = {20:1--20:31},
  year         = {2023},
  url          = {https://doi.org/10.1145/3570903},
  doi          = {10.1145/3570903},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/EngstromJLRW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ErenBJRNA23,
  author       = {Maksim Ekin Eren and
                  Manish Bhattarai and
                  Robert J. Joyce and
                  Edward Raff and
                  Charles Nicholas and
                  Boian S. Alexandrov},
  title        = {Semi-Supervised Classification of Malware Families Under Extreme Class
                  Imbalance via Hierarchical Non-Negative Matrix Factorization with
                  Automatic Model Selection},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {26},
  number       = {4},
  pages        = {48:1--48:27},
  year         = {2023},
  url          = {https://doi.org/10.1145/3624567},
  doi          = {10.1145/3624567},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/ErenBJRNA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/GilAHD23,
  author       = {Gonzalo Gil and
                  Aitor Arnaiz and
                  Marivi Higuero and
                  Francisco Javier D{\'{\i}}ez},
  title        = {Assessment Framework for the Identification and Evaluation of Main
                  Features for Distributed Usage Control Solutions},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {26},
  number       = {1},
  pages        = {10:1--10:28},
  year         = {2023},
  url          = {https://doi.org/10.1145/3561511},
  doi          = {10.1145/3561511},
  timestamp    = {Mon, 22 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/GilAHD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/GongCYHW23,
  author       = {Xueluan Gong and
                  Yanjiao Chen and
                  Wenbin Yang and
                  Huayang Huang and
                  Qian Wang},
  title        = {B\({}^{\mbox{3}}\): Backdoor Attacks against Black-box Machine Learning
                  Models},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {26},
  number       = {4},
  pages        = {43:1--43:24},
  year         = {2023},
  url          = {https://doi.org/10.1145/3605212},
  doi          = {10.1145/3605212},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/GongCYHW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/GuoWXY23,
  author       = {Chun Guo and
                  Xiao Wang and
                  Xiang Xie and
                  Yu Yu},
  title        = {The Multi-User Constrained Pseudorandom Function Security of Generalized
                  {GGM} Trees for {MPC} and Hierarchical Wallets},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {26},
  number       = {3},
  pages        = {37:1--37:38},
  year         = {2023},
  url          = {https://doi.org/10.1145/3592608},
  doi          = {10.1145/3592608},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/GuoWXY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/HabibKHH23,
  author       = {Sohail Habib and
                  Hassan Khan and
                  Andrew Hamilton{-}Wright and
                  Urs Hengartner},
  title        = {Revisiting the Security of Biometric Authentication Systems Against
                  Statistical Attacks},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {26},
  number       = {2},
  pages        = {21:1--21:30},
  year         = {2023},
  url          = {https://doi.org/10.1145/3571743},
  doi          = {10.1145/3571743},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/HabibKHH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/HagenWSDS23,
  author       = {Christoph Hagen and
                  Christian Weinert and
                  Christoph Sendner and
                  Alexandra Dmitrienko and
                  Thomas Schneider},
  title        = {Contact Discovery in Mobile Messengers: Low-cost Attacks, Quantitative
                  Analyses, and Efficient Mitigations},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {26},
  number       = {1},
  pages        = {2:1--2:44},
  year         = {2023},
  url          = {https://doi.org/10.1145/3546191},
  doi          = {10.1145/3546191},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/HagenWSDS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/HessMB23,
  author       = {Andreas V. Hess and
                  Sebastian Alexander M{\"{o}}dersheim and
                  Achim D. Brucker},
  title        = {Stateful Protocol Composition in Isabelle/HOL},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {26},
  number       = {3},
  pages        = {25:1--25:36},
  year         = {2023},
  url          = {https://doi.org/10.1145/3577020},
  doi          = {10.1145/3577020},
  timestamp    = {Sat, 28 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/HessMB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/HouWZJWD23,
  author       = {Jian Hou and
                  Jing Wang and
                  Mingyue Zhang and
                  Zhi Jin and
                  Chunlin Wei and
                  Zuohua Ding},
  title        = {Privacy-preserving Resilient Consensus for Multi-agent Systems in
                  a General Topology Structure},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {26},
  number       = {3},
  pages        = {34:1--34:22},
  year         = {2023},
  url          = {https://doi.org/10.1145/3587933},
  doi          = {10.1145/3587933},
  timestamp    = {Mon, 04 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/HouWZJWD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/HwangOT23,
  author       = {Seoyeon Hwang and
                  Ercan Ozturk and
                  Gene Tsudik},
  title        = {Balancing Security and Privacy in Genomic Range Queries},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {26},
  number       = {3},
  pages        = {23:1--23:28},
  year         = {2023},
  url          = {https://doi.org/10.1145/3575796},
  doi          = {10.1145/3575796},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/HwangOT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/KhanKHM23,
  author       = {Shaharyar Khan and
                  Ilya Kabanov and
                  Yunke Hua and
                  Stuart E. Madnick},
  title        = {A Systematic Analysis of the Capital One Data Breach: Critical Lessons
                  Learned},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {26},
  number       = {1},
  pages        = {3:1--3:29},
  year         = {2023},
  url          = {https://doi.org/10.1145/3546068},
  doi          = {10.1145/3546068},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/KhanKHM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/KimCSKNK23,
  author       = {Dohyun Kim and
                  ManGi Cho and
                  Hocheol Shin and
                  Jaehoon Kim and
                  Juhwan Noh and
                  Yongdae Kim},
  title        = {Lightbox: Sensor Attack Detection for Photoelectric Sensors via Spectrum
                  Fingerprinting},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {26},
  number       = {4},
  pages        = {46:1--46:30},
  year         = {2023},
  url          = {https://doi.org/10.1145/3615867},
  doi          = {10.1145/3615867},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/KimCSKNK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/KingH23,
  author       = {Isaiah J. King and
                  H. Howie Huang},
  title        = {Euler: Detecting Network Lateral Movement via Scalable Temporal Link
                  Prediction},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {26},
  number       = {3},
  pages        = {35:1--35:36},
  year         = {2023},
  url          = {https://doi.org/10.1145/3588771},
  doi          = {10.1145/3588771},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/KingH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/LachtarIKB23,
  author       = {Nada Lachtar and
                  Duha Ibdah and
                  Hamza Khan and
                  Anys Bacha},
  title        = {RansomShield: {A} Visualization Approach to Defending Mobile Systems
                  Against Ransomware},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {26},
  number       = {3},
  pages        = {27:1--27:30},
  year         = {2023},
  url          = {https://doi.org/10.1145/3579822},
  doi          = {10.1145/3579822},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/LachtarIKB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/LanotteMM23,
  author       = {Ruggero Lanotte and
                  Massimo Merro and
                  Andrei Munteanu},
  title        = {Industrial Control Systems Security via Runtime Enforcement},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {26},
  number       = {1},
  pages        = {4:1--4:41},
  year         = {2023},
  url          = {https://doi.org/10.1145/3546579},
  doi          = {10.1145/3546579},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/LanotteMM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/LembkeRRE23,
  author       = {James Lembke and
                  Srivatsan Ravi and
                  Pierre{-}Louis Roman and
                  Patrick Eugster},
  title        = {Secure and Reliable Network Updates},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {26},
  number       = {1},
  pages        = {8:1--8:41},
  year         = {2023},
  url          = {https://doi.org/10.1145/3556542},
  doi          = {10.1145/3556542},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/LembkeRRE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/LiDTFCOSC23,
  author       = {Litao Li and
                  Steven H. H. Ding and
                  Yuan Tian and
                  Benjamin C. M. Fung and
                  Philippe Charland and
                  Weihan Ou and
                  Leo Song and
                  Congwei Chen},
  title        = {VulANalyzeR: Explainable Binary Vulnerability Detection with Multi-task
                  Learning and Attentional Graph Convolution},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {26},
  number       = {3},
  pages        = {28:1--28:25},
  year         = {2023},
  url          = {https://doi.org/10.1145/3585386},
  doi          = {10.1145/3585386},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/LiDTFCOSC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/LuYS23,
  author       = {Yang Lu and
                  Zhengxin Yu and
                  Neeraj Suri},
  title        = {Privacy-preserving Decentralized Federated Learning over Time-varying
                  Communication Graph},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {26},
  number       = {3},
  pages        = {33:1--33:39},
  year         = {2023},
  url          = {https://doi.org/10.1145/3591354},
  doi          = {10.1145/3591354},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/LuYS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/MallahHF23,
  author       = {Ranwa Al Mallah and
                  Talal Halabi and
                  Bilal Farooq},
  title        = {Resilience-by-design in Adaptive Multi-agent Traffic Control Systems},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {26},
  number       = {3},
  pages        = {40:1--40:27},
  year         = {2023},
  url          = {https://doi.org/10.1145/3592799},
  doi          = {10.1145/3592799},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/MallahHF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/MurrayM23,
  author       = {Hazel Murray and
                  David Malone},
  title        = {Costs and Benefits of Authentication Advice},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {26},
  number       = {3},
  pages        = {30:1--30:35},
  year         = {2023},
  url          = {https://doi.org/10.1145/3588031},
  doi          = {10.1145/3588031},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/MurrayM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/OtoniMAEHS23,
  author       = {Rodrigo Otoni and
                  Matteo Marescotti and
                  Leonardo Alt and
                  Patrick Eugster and
                  Antti E. J. Hyv{\"{a}}rinen and
                  Natasha Sharygina},
  title        = {A Solicitous Approach to Smart Contract Verification},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {26},
  number       = {2},
  pages        = {15:1--15:28},
  year         = {2023},
  url          = {https://doi.org/10.1145/3564699},
  doi          = {10.1145/3564699},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/OtoniMAEHS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/PaladiniMPCZ23,
  author       = {Tommaso Paladini and
                  Francesco Monti and
                  Mario Polino and
                  Michele Carminati and
                  Stefano Zanero},
  title        = {Fraud Detection under Siege: Practical Poisoning Attacks and Defense
                  Strategies},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {26},
  number       = {4},
  pages        = {45:1--45:35},
  year         = {2023},
  url          = {https://doi.org/10.1145/3613244},
  doi          = {10.1145/3613244},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/PaladiniMPCZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/RamokapaneSR23,
  author       = {Kopo Marvin Ramokapane and
                  Jose M. Such and
                  Awais Rashid},
  title        = {What Users Want From Cloud Deletion and the Information They Need:
                  {A} Participatory Action Study},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {26},
  number       = {1},
  pages        = {5:1--5:34},
  year         = {2023},
  url          = {https://doi.org/10.1145/3546578},
  doi          = {10.1145/3546578},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/RamokapaneSR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/SajidWADAK23,
  author       = {Md Sajidul Islam Sajid and
                  Jinpeng Wei and
                  Ehab Al{-}Shaer and
                  Qi Duan and
                  Basel Abdeen and
                  Latifur Khan},
  title        = {symbSODA: Configurable and Verifiable Orchestration Automation for
                  Active Malware Deception},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {26},
  number       = {4},
  pages        = {51:1--51:36},
  year         = {2023},
  url          = {https://doi.org/10.1145/3624568},
  doi          = {10.1145/3624568},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/SajidWADAK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/SakibAG23,
  author       = {Shahnewaz Karim Sakib and
                  George T. Amariucai and
                  Yong Guan},
  title        = {Measures of Information Leakage for Incomplete Statistical Information:
                  Application to a Binary Privacy Mechanism},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {26},
  number       = {4},
  pages        = {47:1--47:31},
  year         = {2023},
  url          = {https://doi.org/10.1145/3624982},
  doi          = {10.1145/3624982},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/SakibAG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ScopellitiPNABPM23,
  author       = {Gianluca Scopelliti and
                  Sepideh Pouyanrad and
                  Job Noorman and
                  Fritz Alder and
                  Christoph Baumann and
                  Frank Piessens and
                  Jan Tobias M{\"{u}}hlberg},
  title        = {End-to-End Security for Distributed Event-driven Enclave Applications
                  on Heterogeneous TEEs},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {26},
  number       = {3},
  pages        = {39:1--39:46},
  year         = {2023},
  url          = {https://doi.org/10.1145/3592607},
  doi          = {10.1145/3592607},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/ScopellitiPNABPM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/TizioSSBSK23,
  author       = {Giorgio Di Tizio and
                  Patrick Speicher and
                  Milivoj Simeonovski and
                  Michael Backes and
                  Ben Stock and
                  Robert K{\"{u}}nnemann},
  title        = {Pareto-optimal Defenses for the Web Infrastructure: Theory and Practice},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {26},
  number       = {2},
  pages        = {18:1--18:36},
  year         = {2023},
  url          = {https://doi.org/10.1145/3567595},
  doi          = {10.1145/3567595},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/TizioSSBSK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/UsyninRK23,
  author       = {Dmitrii Usynin and
                  Daniel Rueckert and
                  Georgios Kaissis},
  title        = {Beyond Gradients: Exploiting Adversarial Priors in Model Inversion
                  Attacks},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {26},
  number       = {3},
  pages        = {38:1--38:30},
  year         = {2023},
  url          = {https://doi.org/10.1145/3592800},
  doi          = {10.1145/3592800},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/UsyninRK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/VenkatesaramaniWMV23,
  author       = {Rajagopal Venkatesaramani and
                  Zhiyu Wan and
                  Bradley A. Malin and
                  Yevgeniy Vorobeychik},
  title        = {Defending Against Membership Inference Attacks on Beacon Services},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {26},
  number       = {3},
  pages        = {42:1--42:32},
  year         = {2023},
  url          = {https://doi.org/10.1145/3603627},
  doi          = {10.1145/3603627},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/VenkatesaramaniWMV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/VidanageCRS23,
  author       = {Anushka Vidanage and
                  Peter Christen and
                  Thilina Ranbaduge and
                  Rainer Schnell},
  title        = {A Vulnerability Assessment Framework for Privacy-preserving Record
                  Linkage},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {26},
  number       = {3},
  pages        = {36:1--36:31},
  year         = {2023},
  url          = {https://doi.org/10.1145/3589641},
  doi          = {10.1145/3589641},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/VidanageCRS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/Wagner23,
  author       = {Isabel Wagner},
  title        = {Privacy Policies across the Ages: Content of Privacy Policies 1996-2021},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {26},
  number       = {3},
  pages        = {32:1--32:32},
  year         = {2023},
  url          = {https://doi.org/10.1145/3590152},
  doi          = {10.1145/3590152},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/Wagner23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/WangYWML23,
  author       = {Huanran Wang and
                  Wu Yang and
                  Wei Wang and
                  Dapeng Man and
                  Jiguang Lv},
  title        = {A Novel Cross-Network Embedding for Anchor Link Prediction with Social
                  Adversarial Attacks},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {26},
  number       = {1},
  pages        = {7:1--7:32},
  year         = {2023},
  url          = {https://doi.org/10.1145/3548685},
  doi          = {10.1145/3548685},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/WangYWML23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/WieflingJTI23,
  author       = {Stephan Wiefling and
                  Paul Ren{\'{e}} J{\o}rgensen and
                  Sigurd Thunem and
                  Luigi Lo Iacono},
  title        = {Pump Up Password Security! Evaluating and Enhancing Risk-Based Authentication
                  on a Real-World Large-Scale Online Service},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {26},
  number       = {1},
  pages        = {6:1--6:36},
  year         = {2023},
  url          = {https://doi.org/10.1145/3546069},
  doi          = {10.1145/3546069},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/WieflingJTI23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ZhangKL23,
  author       = {Xueru Zhang and
                  Mohammad Mahdi Khalili and
                  Mingyan Liu},
  title        = {Differentially Private Real-Time Release of Sequential Data},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {26},
  number       = {1},
  pages        = {1:1--1:29},
  year         = {2023},
  url          = {https://doi.org/10.1145/3544837},
  doi          = {10.1145/3544837},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/ZhangKL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ZhangZYY23,
  author       = {Chenhan Zhang and
                  Shiyao Zhang and
                  James J. Q. Yu and
                  Shui Yu},
  title        = {{SAM:} Query-efficient Adversarial Attacks against Graph Neural Networks},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {26},
  number       = {4},
  pages        = {49:1--49:19},
  year         = {2023},
  url          = {https://doi.org/10.1145/3611307},
  doi          = {10.1145/3611307},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/ZhangZYY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ZhuoBKLR23,
  author       = {Sijie Zhuo and
                  Robert Biddle and
                  Yun Sing Koh and
                  Danielle M. Lottridge and
                  Giovanni Russello},
  title        = {SoK: Human-centered Phishing Susceptibility},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {26},
  number       = {3},
  pages        = {24:1--24:27},
  year         = {2023},
  url          = {https://doi.org/10.1145/3575797},
  doi          = {10.1145/3575797},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/ZhuoBKLR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/AkaviaLRRSV22,
  author       = {Adi Akavia and
                  Max Leibovich and
                  Yehezkel S. Resheff and
                  Roey Ron and
                  Moni Shahar and
                  Margarita Vald},
  title        = {Privacy-Preserving Decision Trees Training and Prediction},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {25},
  number       = {3},
  pages        = {24:1--24:30},
  year         = {2022},
  url          = {https://doi.org/10.1145/3517197},
  doi          = {10.1145/3517197},
  timestamp    = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/AkaviaLRRSV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/AlperK22,
  author       = {Handan Kilin{\c{c}} Alper and
                  Alptekin K{\"{u}}p{\c{c}}{\"{u}}},
  title        = {Optimally Efficient Multi-party Fair Exchange and Fair Secure Multi-party
                  Computation},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {25},
  number       = {1},
  pages        = {3:1--3:34},
  year         = {2022},
  url          = {https://doi.org/10.1145/3477530},
  doi          = {10.1145/3477530},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/AlperK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/AlvimCKP22,
  author       = {M{\'{a}}rio S. Alvim and
                  Konstantinos Chatzikokolakis and
                  Yusuke Kawamoto and
                  Catuscia Palamidessi},
  title        = {Information Leakage Games: Exploring Information as a Utility Function},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {25},
  number       = {3},
  pages        = {20:1--20:36},
  year         = {2022},
  url          = {https://doi.org/10.1145/3517330},
  doi          = {10.1145/3517330},
  timestamp    = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/AlvimCKP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BazaiJA22,
  author       = {Sibghat Ullah Bazai and
                  Julian Jang{-}Jaccard and
                  Hooman Alavizadeh},
  title        = {A Novel Hybrid Approach for Multi-Dimensional Data Anonymization for
                  Apache Spark},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {25},
  number       = {1},
  pages        = {5:1--5:25},
  year         = {2022},
  url          = {https://doi.org/10.1145/3484945},
  doi          = {10.1145/3484945},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/BazaiJA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BerlatoCLR22,
  author       = {Stefano Berlato and
                  Roberto Carbone and
                  Adam J. Lee and
                  Silvio Ranise},
  title        = {Formal Modelling and Automated Trade-off Analysis of Enforcement Architectures
                  for Cryptographic Access Control in the Cloud},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {25},
  number       = {1},
  pages        = {2:1--2:37},
  year         = {2022},
  url          = {https://doi.org/10.1145/3474056},
  doi          = {10.1145/3474056},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/BerlatoCLR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BlairMAW0KE22,
  author       = {William Blair and
                  Andrea Mambretti and
                  Sajjad Arshad and
                  Michael Weissbacher and
                  William Robertson and
                  Engin Kirda and
                  Manuel Egele},
  title        = {HotFuzz: Discovering Temporal and Spatial Denial-of-Service Vulnerabilities
                  Through Guided Micro-Fuzzing},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {25},
  number       = {4},
  pages        = {33:1--33:35},
  year         = {2022},
  url          = {https://doi.org/10.1145/3532184},
  doi          = {10.1145/3532184},
  timestamp    = {Thu, 25 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/BlairMAW0KE22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BotacinMNGA22,
  author       = {Marcus Botacin and
                  Francis B. Moreira and
                  Philippe O. A. Navaux and
                  Andr{\'{e}} Gr{\'{e}}gio and
                  Marco A. Z. Alves},
  title        = {Terminator: {A} Secure Coprocessor to Accelerate Real-Time AntiViruses
                  Using Inspection Breakpoints},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {25},
  number       = {2},
  pages        = {9:1--9:34},
  year         = {2022},
  url          = {https://doi.org/10.1145/3494535},
  doi          = {10.1145/3494535},
  timestamp    = {Fri, 08 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/BotacinMNGA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BraunDST22,
  author       = {Lennart Braun and
                  Daniel Demmler and
                  Thomas Schneider and
                  Oleksandr Tkachenko},
  title        = {{MOTION} - {A} Framework for Mixed-Protocol Multi-Party Computation},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {25},
  number       = {2},
  pages        = {8:1--8:35},
  year         = {2022},
  url          = {https://doi.org/10.1145/3490390},
  doi          = {10.1145/3490390},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/BraunDST22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BrisenoSS22,
  author       = {Julian de Gortari Briseno and
                  Akash Deep Singh and
                  Mani Srivastava},
  title        = {InkFiltration: Using Inkjet Printers for Acoustic Data Exfiltration
                  from Air-Gapped Networks},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {25},
  number       = {2},
  pages        = {15:1--15:26},
  year         = {2022},
  url          = {https://doi.org/10.1145/3510583},
  doi          = {10.1145/3510583},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/BrisenoSS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ChenZYZCWG22,
  author       = {Yuxuan Chen and
                  Jiangshan Zhang and
                  Xuejing Yuan and
                  Shengzhi Zhang and
                  Kai Chen and
                  Xiaofeng Wang and
                  Shanqing Guo},
  title        = {SoK: {A} Modularized Approach to Study the Security of Automatic Speech
                  Recognition Systems},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {25},
  number       = {3},
  pages        = {17:1--17:31},
  year         = {2022},
  url          = {https://doi.org/10.1145/3510582},
  doi          = {10.1145/3510582},
  timestamp    = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/ChenZYZCWG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ChernikovaO22,
  author       = {Alesia Chernikova and
                  Alina Oprea},
  title        = {{FENCE:} Feasible Evasion Attacks on Neural Networks in Constrained
                  Environments},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {25},
  number       = {4},
  pages        = {34:1--34:34},
  year         = {2022},
  url          = {https://doi.org/10.1145/3544746},
  doi          = {10.1145/3544746},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/ChernikovaO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/CliftonHMM22,
  author       = {Chris Clifton and
                  Eric J. Hanson and
                  Keith Merrill and
                  Shawn Merrill},
  title        = {Differentially Private \emph{k}-Nearest Neighbor Missing Data Imputation},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {25},
  number       = {3},
  pages        = {16:1--16:23},
  year         = {2022},
  url          = {https://doi.org/10.1145/3507952},
  doi          = {10.1145/3507952},
  timestamp    = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/CliftonHMM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/CramptonEGKM22,
  author       = {Jason Crampton and
                  Eduard Eiben and
                  Gregory Z. Gutin and
                  Daniel Karapetyan and
                  Diptapriyo Majumdar},
  title        = {Valued Authorization Policy Existence Problem: Theory and Experiments},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {25},
  number       = {4},
  pages        = {28:1--28:32},
  year         = {2022},
  url          = {https://doi.org/10.1145/3528101},
  doi          = {10.1145/3528101},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/CramptonEGKM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/CuiSSSY22,
  author       = {Jinhua Cui and
                  Shweta Shinde and
                  Satyaki Sen and
                  Prateek Saxena and
                  Pinghai Yuan},
  title        = {Dynamic Binary Translation for {SGX} Enclaves},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {25},
  number       = {4},
  pages        = {32:1--32:40},
  year         = {2022},
  url          = {https://doi.org/10.1145/3532862},
  doi          = {10.1145/3532862},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/CuiSSSY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/DaoudiABK22,
  author       = {Nadia Daoudi and
                  Kevin Allix and
                  Tegawend{\'{e}} Fran{\c{c}}ois D. Assise Bissyand{\'{e}} and
                  Jacques Klein},
  title        = {A Deep Dive Inside {DREBIN:} An Explorative Analysis beyond Android
                  Malware Detection Scores},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {25},
  number       = {2},
  pages        = {13:1--13:28},
  year         = {2022},
  url          = {https://doi.org/10.1145/3503463},
  doi          = {10.1145/3503463},
  timestamp    = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/DaoudiABK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/DebantDW22,
  author       = {Alexandre Debant and
                  St{\'{e}}phanie Delaune and
                  Cyrille Wiedling},
  title        = {So Near and Yet So Far - Symbolic Verification of Distance-Bounding
                  Protocols},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {25},
  number       = {2},
  pages        = {11:1--11:39},
  year         = {2022},
  url          = {https://doi.org/10.1145/3501402},
  doi          = {10.1145/3501402},
  timestamp    = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/DebantDW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/FenskeM0S22,
  author       = {Ellis Fenske and
                  Akshaya Mani and
                  Aaron Johnson and
                  Micah Sherr},
  title        = {Accountable Private Set Cardinality for Distributed Measurement},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {25},
  number       = {4},
  pages        = {25:1--25:35},
  year         = {2022},
  url          = {https://doi.org/10.1145/3477531},
  doi          = {10.1145/3477531},
  timestamp    = {Thu, 25 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/FenskeM0S22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/FischerFKJKB22,
  author       = {Andreas Fischer and
                  Benny Fuhry and
                  J{\"{o}}rn Ku{\ss}maul and
                  Jonas Janneck and
                  Florian Kerschbaum and
                  Eric Bodden},
  title        = {Computation on Encrypted Data Using Dataflow Authentication},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {25},
  number       = {3},
  pages        = {21:1--21:36},
  year         = {2022},
  url          = {https://doi.org/10.1145/3513005},
  doi          = {10.1145/3513005},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/FischerFKJKB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/IdanF22,
  author       = {Lihi Idan and
                  Joan Feigenbaum},
  title        = {PRShare: {A} Framework for Privacy-preserving, Interorganizational
                  Data Sharing},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {25},
  number       = {4},
  pages        = {29:1--29:38},
  year         = {2022},
  url          = {https://doi.org/10.1145/3531225},
  doi          = {10.1145/3531225},
  timestamp    = {Thu, 25 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/IdanF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/IyerM22,
  author       = {Padmavathi Iyer and
                  Amirreza Masoumzadeh},
  title        = {Learning Relationship-Based Access Control Policies from Black-Box
                  Systems},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {25},
  number       = {3},
  pages        = {22:1--22:36},
  year         = {2022},
  url          = {https://doi.org/10.1145/3517121},
  doi          = {10.1145/3517121},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/IyerM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/LandauerSWR22,
  author       = {Max Landauer and
                  Florian Skopik and
                  Markus Wurzenberger and
                  Andreas Rauber},
  title        = {Dealing with Security Alert Flooding: Using Machine Learning for Domain-independent
                  Alert Aggregation},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {25},
  number       = {3},
  pages        = {18:1--18:36},
  year         = {2022},
  url          = {https://doi.org/10.1145/3510581},
  doi          = {10.1145/3510581},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/LandauerSWR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/LehmanAKL022,
  author       = {Sarah M. Lehman and
                  Abrar S. Alrumayh and
                  Kunal Kolhe and
                  Haibin Ling and
                  Chiu C. Tan},
  title        = {Hidden in Plain Sight: Exploring Privacy Risks of Mobile Augmented
                  Reality Applications},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {25},
  number       = {4},
  pages        = {26:1--26:35},
  year         = {2022},
  url          = {https://doi.org/10.1145/3524020},
  doi          = {10.1145/3524020},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/LehmanAKL022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/MartinsM22,
  author       = {Cl{\'{a}}udio Martins and
                  Ib{\'{e}}ria Medeiros},
  title        = {Generating Quality Threat Intelligence Leveraging {OSINT} and a Cyber
                  Threat Unified Taxonomy},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {25},
  number       = {3},
  pages        = {19:1--19:39},
  year         = {2022},
  url          = {https://doi.org/10.1145/3530977},
  doi          = {10.1145/3530977},
  timestamp    = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/MartinsM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/Nussbaum022,
  author       = {Eyal Nussbaum and
                  Michael Segal},
  title        = {Privacy Analysis of Query-Set-Size Control},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {25},
  number       = {4},
  pages        = {31:1--31:19},
  year         = {2022},
  url          = {https://doi.org/10.1145/3532774},
  doi          = {10.1145/3532774},
  timestamp    = {Thu, 25 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/Nussbaum022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/OliveriB22,
  author       = {Andrea Oliveri and
                  Davide Balzarotti},
  title        = {In the Land of MMUs: Multiarchitecture OS-Agnostic Virtual Memory
                  Forensics},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {25},
  number       = {4},
  pages        = {27:1--27:32},
  year         = {2022},
  url          = {https://doi.org/10.1145/3528102},
  doi          = {10.1145/3528102},
  timestamp    = {Thu, 25 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/OliveriB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/OserHLK22,
  author       = {Pascal Oser and
                  Rens W. van der Heijden and
                  Stefan L{\"{u}}ders and
                  Frank Kargl},
  title        = {Risk Prediction of IoT Devices Based on Vulnerability Analysis},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {25},
  number       = {2},
  pages        = {14:1--14:36},
  year         = {2022},
  url          = {https://doi.org/10.1145/3510360},
  doi          = {10.1145/3510360},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/OserHLK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/PaganiB22,
  author       = {Fabio Pagani and
                  Davide Balzarotti},
  title        = {AutoProfile: Towards Automated Profile Generation for Memory Analysis},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {25},
  number       = {1},
  pages        = {6:1--6:26},
  year         = {2022},
  url          = {https://doi.org/10.1145/3485471},
  doi          = {10.1145/3485471},
  timestamp    = {Wed, 19 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/PaganiB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/PerilloPT22,
  author       = {Angelo Massimo Perillo and
                  Giuseppe Persiano and
                  Alberto Trombetta},
  title        = {Secure Selections on Encrypted Multi-writer Streams},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {25},
  number       = {1},
  pages        = {7:1--7:33},
  year         = {2022},
  url          = {https://doi.org/10.1145/3485470},
  doi          = {10.1145/3485470},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/PerilloPT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/QianGSWWGLW22,
  author       = {Yaguan Qian and
                  Yankai Guo and
                  Qiqi Shao and
                  Jiamin Wang and
                  Bin Wang and
                  Zhaoquan Gu and
                  Xiang Ling and
                  Chunming Wu},
  title        = {{EI-MTD:} Moving Target Defense for Edge Intelligence against Adversarial
                  Attacks},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {25},
  number       = {3},
  pages        = {23:1--23:24},
  year         = {2022},
  url          = {https://doi.org/10.1145/3517806},
  doi          = {10.1145/3517806},
  timestamp    = {Wed, 08 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/QianGSWWGLW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/QinPLRB22,
  author       = {Le Qin and
                  Fei Peng and
                  Min Long and
                  Raghavendra Ramachandra and
                  Christoph Busch},
  title        = {Vulnerabilities of Unattended Face Verification Systems to Facial
                  Components-based Presentation Attacks: An Empirical Study},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {25},
  number       = {1},
  pages        = {4:1--4:28},
  year         = {2022},
  url          = {https://doi.org/10.1145/3491199},
  doi          = {10.1145/3491199},
  timestamp    = {Wed, 06 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/QinPLRB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/SavvidesKSE22,
  author       = {Savvas Savvides and
                  Seema Kumar and
                  Julian James Stephen and
                  Patrick Eugster},
  title        = {{C3PO:} Cloud-based Confidentiality-preserving Continuous Query Processing},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {25},
  number       = {1},
  pages        = {1:1--1:36},
  year         = {2022},
  url          = {https://doi.org/10.1145/3472717},
  doi          = {10.1145/3472717},
  timestamp    = {Wed, 19 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/SavvidesKSE22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/StojmenovicSSB22,
  author       = {Milica Stojmenovic and
                  Eric Spero and
                  Milos Stojmenovic and
                  Robert Biddle},
  title        = {What is Beautiful is Secure},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {25},
  number       = {4},
  pages        = {30:1--30:30},
  year         = {2022},
  url          = {https://doi.org/10.1145/3533047},
  doi          = {10.1145/3533047},
  timestamp    = {Thu, 25 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/StojmenovicSSB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/WangHRTO22,
  author       = {Xueou Wang and
                  Xiaolu Hou and
                  Ruben Rios and
                  Nils Ole Tippenhauer and
                  Mart{\'{\i}}n Ochoa},
  title        = {Constrained Proximity Attacks on Mobile Targets},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {25},
  number       = {2},
  pages        = {10:1--10:29},
  year         = {2022},
  url          = {https://doi.org/10.1145/3498543},
  doi          = {10.1145/3498543},
  timestamp    = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/WangHRTO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ZolotavkinJKSD22,
  author       = {Yevhen Zolotavkin and
                  Jongkil Jay Jeong and
                  Veronika Kuchta and
                  Maksym Slavnenko and
                  Robin Doss},
  title        = {Improving Unlinkability of Attribute-based Authentication through
                  Game Theory},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {25},
  number       = {2},
  pages        = {12:1--12:36},
  year         = {2022},
  url          = {https://doi.org/10.1145/3501260},
  doi          = {10.1145/3501260},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/ZolotavkinJKSD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/AbuhamadAMN21,
  author       = {Mohammed Abuhamad and
                  Tamer AbuHmed and
                  David Mohaisen and
                  Daehun Nyang},
  title        = {Large-scale and Robust Code Authorship Identification with Deep Feature
                  Learning},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {24},
  number       = {4},
  pages        = {23:1--23:35},
  year         = {2021},
  url          = {https://doi.org/10.1145/3461666},
  doi          = {10.1145/3461666},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/AbuhamadAMN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/AcarAKKAAU21,
  author       = {Abbas Acar and
                  Shoukat Ali and
                  Koray Karabina and
                  Cengiz Kaygusuz and
                  Hidayet Aksu and
                  Kemal Akkaya and
                  Arif Selcuk Uluagac},
  title        = {A Lightweight Privacy-Aware Continuous Authentication Protocol-PACA},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {24},
  number       = {4},
  pages        = {24:1--24:28},
  year         = {2021},
  url          = {https://doi.org/10.1145/3464690},
  doi          = {10.1145/3464690},
  timestamp    = {Mon, 18 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/AcarAKKAAU21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/AmiKMNP21,
  author       = {Amit Seal Ami and
                  Kaushal Kafle and
                  Kevin Moran and
                  Adwait Nadkarni and
                  Denys Poshyvanyk},
  title        = {Systematic Mutation-Based Evaluation of the Soundness of Security-Focused
                  Android Static Analysis Techniques},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {24},
  number       = {3},
  pages        = {15:1--15:37},
  year         = {2021},
  url          = {https://doi.org/10.1145/3439802},
  doi          = {10.1145/3439802},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/AmiKMNP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ArceriM21,
  author       = {Vincenzo Arceri and
                  Isabella Mastroeni},
  title        = {Analyzing Dynamic Code: {A} Sound Abstract Interpreter for \emph{Evil}
                  Eval},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {24},
  number       = {2},
  pages        = {10:1--10:38},
  year         = {2021},
  url          = {https://doi.org/10.1145/3426470},
  doi          = {10.1145/3426470},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/ArceriM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BalliuMPS21,
  author       = {Musard Balliu and
                  Massimo Merro and
                  Michele Pasqua and
                  Mikhail Shcherbakov},
  title        = {Friendly Fire: Cross-app Interactions in IoT Platforms},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {24},
  number       = {3},
  pages        = {16:1--16:40},
  year         = {2021},
  url          = {https://doi.org/10.1145/3444963},
  doi          = {10.1145/3444963},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/BalliuMPS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BhattacharjeeMS21,
  author       = {Shameek Bhattacharjee and
                  Venkata Praveen Kumar Madhavarapu and
                  Simone Silvestri and
                  Sajal K. Das},
  title        = {Attack Context Embedded Data Driven Trust Diagnostics in Smart Metering
                  Infrastructure},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {24},
  number       = {2},
  pages        = {9:1--9:36},
  year         = {2021},
  url          = {https://doi.org/10.1145/3426739},
  doi          = {10.1145/3426739},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/BhattacharjeeMS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BirnbachBEM21,
  author       = {Simon Birnbach and
                  Richard Baker and
                  Simon Eberz and
                  Ivan Martinovic},
  title        = {{\#}PrettyFlyForAWiFi: Real-world Detection of Privacy Invasion Attacks
                  by Drones},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {24},
  number       = {4},
  pages        = {31:1--31:34},
  year         = {2021},
  url          = {https://doi.org/10.1145/3473672},
  doi          = {10.1145/3473672},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/BirnbachBEM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BotacinAOKVOGG21,
  author       = {Marcus Botacin and
                  Hojjat Aghakhani and
                  Stefano Ortolani and
                  Christopher Kruegel and
                  Giovanni Vigna and
                  Daniela Oliveira and
                  Paulo L{\'{\i}}cio de Geus and
                  Andr{\'{e}} Gr{\'{e}}gio},
  title        = {One Size Does Not Fit All: {A} Longitudinal Analysis of Brazilian
                  Financial Malware},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {24},
  number       = {2},
  pages        = {11:1--11:31},
  year         = {2021},
  url          = {https://doi.org/10.1145/3429741},
  doi          = {10.1145/3429741},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/BotacinAOKVOGG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ChaddadCEK21,
  author       = {Louma Chaddad and
                  Ali Chehab and
                  Imad H. Elhajj and
                  Ayman I. Kayssi},
  title        = {Optimal Packet Camouflage Against Traffic Analysis},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {24},
  number       = {3},
  pages        = {22:1--22:23},
  year         = {2021},
  url          = {https://doi.org/10.1145/3442697},
  doi          = {10.1145/3442697},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/ChaddadCEK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ChengALNCJAY21,
  author       = {Long Cheng and
                  Salman Ahmed and
                  Hans Liljestrand and
                  Thomas Nyman and
                  Haipeng Cai and
                  Trent Jaeger and
                  N. Asokan and
                  Danfeng (Daphne) Yao},
  title        = {Exploitation Techniques for Data-oriented Attacks with Existing and
                  Potential Defense Approaches},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {24},
  number       = {4},
  pages        = {26:1--26:36},
  year         = {2021},
  url          = {https://doi.org/10.1145/3462699},
  doi          = {10.1145/3462699},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/ChengALNCJAY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/CorderoVWMN21,
  author       = {Carlos Garcia Cordero and
                  Emmanouil Vasilomanolakis and
                  Aidmar Wainakh and
                  Max M{\"{u}}hlh{\"{a}}user and
                  Simin Nadjm{-}Tehrani},
  title        = {On Generating Network Traffic Datasets with Synthetic Attacks for
                  Intrusion Detection},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {24},
  number       = {2},
  pages        = {8:1--8:39},
  year         = {2021},
  url          = {https://doi.org/10.1145/3424155},
  doi          = {10.1145/3424155},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/CorderoVWMN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/CramptonGM21,
  author       = {Jason Crampton and
                  Gregory Z. Gutin and
                  Diptapriyo Majumdar},
  title        = {Towards Better Understanding of User Authorization Query Problem via
                  Multi-variable Complexity Analysis},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {24},
  number       = {3},
  pages        = {21:1--21:22},
  year         = {2021},
  url          = {https://doi.org/10.1145/3450768},
  doi          = {10.1145/3450768},
  timestamp    = {Thu, 18 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/CramptonGM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/CuiSAGR21,
  author       = {Shujie Cui and
                  Xiangfu Song and
                  Muhammad Rizwan Asghar and
                  Steven D. Galbraith and
                  Giovanni Russello},
  title        = {Privacy-preserving Dynamic Symmetric Searchable Encryption with Controllable
                  Leakage},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {24},
  number       = {3},
  pages        = {18:1--18:35},
  year         = {2021},
  url          = {https://doi.org/10.1145/3446920},
  doi          = {10.1145/3446920},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/CuiSAGR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/DemetrioCBLAR21,
  author       = {Luca Demetrio and
                  Scott E. Coull and
                  Battista Biggio and
                  Giovanni Lagorio and
                  Alessandro Armando and
                  Fabio Roli},
  title        = {Adversarial EXEmples: {A} Survey and Experimental Evaluation of Practical
                  Attacks on Machine Learning for Windows Malware Detection},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {24},
  number       = {4},
  pages        = {27:1--27:31},
  year         = {2021},
  url          = {https://doi.org/10.1145/3473039},
  doi          = {10.1145/3473039},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/DemetrioCBLAR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/HelbleKLRRA21,
  author       = {Sarah C. Helble and
                  Ian D. Kretz and
                  Peter A. Loscocco and
                  John D. Ramsdell and
                  Paul D. Rowe and
                  Perry Alexander},
  title        = {Flexible Mechanisms for Remote Attestation},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {24},
  number       = {4},
  pages        = {29:1--29:23},
  year         = {2021},
  url          = {https://doi.org/10.1145/3470535},
  doi          = {10.1145/3470535},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/HelbleKLRRA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/JacommeK21,
  author       = {Charlie Jacomme and
                  Steve Kremer},
  title        = {An Extensive Formal Analysis of Multi-factor Authentication Protocols},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {24},
  number       = {2},
  pages        = {13:1--13:34},
  year         = {2021},
  url          = {https://doi.org/10.1145/3440712},
  doi          = {10.1145/3440712},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/JacommeK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/JareckiJKSS21,
  author       = {Stanislaw Jarecki and
                  Mohammed Jubur and
                  Hugo Krawczyk and
                  Nitesh Saxena and
                  Maliheh Shirvanian},
  title        = {Two-factor Password-authenticated Key Exchange with End-to-end Security},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {24},
  number       = {3},
  pages        = {17:1--17:37},
  year         = {2021},
  url          = {https://doi.org/10.1145/3446807},
  doi          = {10.1145/3446807},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/JareckiJKSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/MaqsoodC21,
  author       = {Sana Maqsood and
                  Sonia Chiasson},
  title        = {Design, Development, and Evaluation of a Cybersecurity, Privacy, and
                  Digital Literacy Game for Tweens},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {24},
  number       = {4},
  pages        = {28:1--28:37},
  year         = {2021},
  url          = {https://doi.org/10.1145/3469821},
  doi          = {10.1145/3469821},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/MaqsoodC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/MarkertBGDA21,
  author       = {Philipp Markert and
                  Daniel V. Bailey and
                  Maximilian Golla and
                  Markus D{\"{u}}rmuth and
                  Adam J. Aviv},
  title        = {On the Security of Smartphone Unlock PINs},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {24},
  number       = {4},
  pages        = {30:1--30:36},
  year         = {2021},
  url          = {https://doi.org/10.1145/3473040},
  doi          = {10.1145/3473040},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/MarkertBGDA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/MayrhoferSBK21,
  author       = {Ren{\'{e}} Mayrhofer and
                  Jeffrey Vander Stoep and
                  Chad Brubaker and
                  Nick Kralevich},
  title        = {The Android Platform Security Model},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {24},
  number       = {3},
  pages        = {19:1--19:35},
  year         = {2021},
  url          = {https://doi.org/10.1145/3448609},
  doi          = {10.1145/3448609},
  timestamp    = {Fri, 14 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/MayrhoferSBK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/MohammadyOWHLPD21,
  author       = {Meisam Mohammady and
                  Momen Oqaily and
                  Lingyu Wang and
                  Yuan Hong and
                  Habib Louafi and
                  Makan Pourzandi and
                  Mourad Debbabi},
  title        = {A Multi-view Approach to Preserve Privacy and Utility in Network Trace
                  Anonymization},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {24},
  number       = {3},
  pages        = {14:1--14:36},
  year         = {2021},
  url          = {https://doi.org/10.1145/3439732},
  doi          = {10.1145/3439732},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/MohammadyOWHLPD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/PapaevripidesA21,
  author       = {Michalis Papaevripides and
                  Elias Athanasopoulos},
  title        = {Exploiting Mixed Binaries},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {24},
  number       = {2},
  pages        = {7:1--7:29},
  year         = {2021},
  url          = {https://doi.org/10.1145/3418898},
  doi          = {10.1145/3418898},
  timestamp    = {Tue, 09 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/PapaevripidesA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/SalemBP21,
  author       = {Aleieldin Salem and
                  Sebastian Banescu and
                  Alexander Pretschner},
  title        = {Maat: Automatically Analyzing VirusTotal for Accurate Labeling and
                  Effective Malware Detection},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {24},
  number       = {4},
  pages        = {25:1--25:35},
  year         = {2021},
  url          = {https://doi.org/10.1145/3465361},
  doi          = {10.1145/3465361},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/SalemBP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/VerasCT21,
  author       = {Rafael Veras and
                  Christopher Collins and
                  Julie Thorpe},
  title        = {A Large-Scale Analysis of the Semantic Password Model and Linguistic
                  Patterns in Passwords},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {24},
  number       = {3},
  pages        = {20:1--20:21},
  year         = {2021},
  url          = {https://doi.org/10.1145/3448608},
  doi          = {10.1145/3448608},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/VerasCT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/WagnerY21,
  author       = {Isabel Wagner and
                  Iryna Yevseyeva},
  title        = {Designing Strong Privacy Metrics Suites Using Evolutionary Optimization},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {24},
  number       = {2},
  pages        = {12:1--12:35},
  year         = {2021},
  url          = {https://doi.org/10.1145/3439405},
  doi          = {10.1145/3439405},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/WagnerY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/AbrathCBWCFS20,
  author       = {Bert Abrath and
                  Bart Coppens and
                  Jens Van den Broeck and
                  Brecht Wyseur and
                  Alessandro Cabutto and
                  Paolo Falcarin and
                  Bjorn De Sutter},
  title        = {Code Renewability for Native Software Protection},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {23},
  number       = {4},
  pages        = {20:1--20:31},
  year         = {2020},
  url          = {https://doi.org/10.1145/3404891},
  doi          = {10.1145/3404891},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/AbrathCBWCFS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/AhmedMO20,
  author       = {Chuadhry Mujeeb Ahmed and
                  Aditya P. Mathur and
                  Mart{\'{\i}}n Ochoa},
  title        = {\emph{NoiSense Print}: Detecting Data Integrity Attacks on Sensor
                  Measurements Using Hardware-based Fingerprints},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {24},
  number       = {1},
  pages        = {2:1--2:35},
  year         = {2020},
  url          = {https://doi.org/10.1145/3410447},
  doi          = {10.1145/3410447},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/AhmedMO20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/AlexopoulosHSM20,
  author       = {Nikolaos Alexopoulos and
                  Sheikh Mahbub Habib and
                  Steffen Schulz and
                  Max M{\"{u}}hlh{\"{a}}user},
  title        = {The Tip of the Iceberg: On the Merits of Finding Security Bugs},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {24},
  number       = {1},
  pages        = {3:1--3:33},
  year         = {2020},
  url          = {https://doi.org/10.1145/3406112},
  doi          = {10.1145/3406112},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/AlexopoulosHSM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/AntonioliTR20,
  author       = {Daniele Antonioli and
                  Nils Ole Tippenhauer and
                  Kasper Rasmussen},
  title        = {Key Negotiation Downgrade Attacks on Bluetooth and Bluetooth Low Energy},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {23},
  number       = {3},
  pages        = {14:1--14:28},
  year         = {2020},
  url          = {https://doi.org/10.1145/3394497},
  doi          = {10.1145/3394497},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/AntonioliTR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/AnwarS20,
  author       = {Fatima M. Anwar and
                  Mani B. Srivastava},
  title        = {A Case for Feedforward Control with Feedback Trim to Mitigate Time
                  Transfer Attacks},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {23},
  number       = {2},
  pages        = {11:1--11:25},
  year         = {2020},
  url          = {https://doi.org/10.1145/3382503},
  doi          = {10.1145/3382503},
  timestamp    = {Mon, 02 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/AnwarS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BelmanP20,
  author       = {Amith K. Belman and
                  Vir V. Phoha},
  title        = {Discriminative Power of Typing Features on Desktops, Tablets, and
                  Phones for User Identification},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {23},
  number       = {1},
  pages        = {4:1--4:36},
  year         = {2020},
  url          = {https://doi.org/10.1145/3377404},
  doi          = {10.1145/3377404},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/BelmanP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BoshrooyehKO20,
  author       = {Sanaz Taheri Boshrooyeh and
                  Alptekin K{\"{u}}p{\c{c}}{\"{u}} and
                  {\"{O}}znur {\"{O}}zkasap},
  title        = {Privado: Privacy-preserving Group-based Advertising Using Multiple
                  Independent Social Network Providers},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {23},
  number       = {3},
  pages        = {12:1--12:36},
  year         = {2020},
  url          = {https://doi.org/10.1145/3386154},
  doi          = {10.1145/3386154},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/BoshrooyehKO20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ChoHKCPLBK20,
  author       = {Geumhwan Cho and
                  Jun Ho Huh and
                  Soolin Kim and
                  Junsung Cho and
                  Heesung Park and
                  Yenah Lee and
                  Konstantin Beznosov and
                  Hyoungshick Kim},
  title        = {On the Security and Usability Implications of Providing Multiple Authentication
                  Choices on Smartphones: The More, the Better?},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {23},
  number       = {4},
  pages        = {22:1--22:32},
  year         = {2020},
  url          = {https://doi.org/10.1145/3410155},
  doi          = {10.1145/3410155},
  timestamp    = {Tue, 06 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/ChoHKCPLBK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/DiamantarisMIP20,
  author       = {Michalis Diamantaris and
                  Francesco Marcantoni and
                  Sotiris Ioannidis and
                  Jason Polakis},
  title        = {The Seven Deadly Sins of the {HTML5} WebAPI: {A} Large-scale Study
                  on the Risks of Mobile Sensor-based Attacks},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {23},
  number       = {4},
  pages        = {19:1--19:31},
  year         = {2020},
  url          = {https://doi.org/10.1145/3403947},
  doi          = {10.1145/3403947},
  timestamp    = {Tue, 06 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/DiamantarisMIP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/HoangYG20,
  author       = {Thang Hoang and
                  Attila A. Yavuz and
                  Jorge Guajardo},
  title        = {A Multi-server {ORAM} Framework with Constant Client Bandwidth Blowup},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {23},
  number       = {1},
  pages        = {1:1--1:35},
  year         = {2020},
  url          = {https://doi.org/10.1145/3369108},
  doi          = {10.1145/3369108},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/HoangYG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/HuZL20,
  author       = {Zhisheng Hu and
                  Minghui Zhu and
                  Peng Liu},
  title        = {Adaptive Cyber Defense Against Multi-Stage Attacks Using Learning-Based
                  {POMDP}},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {24},
  number       = {1},
  pages        = {6:1--6:25},
  year         = {2020},
  url          = {https://doi.org/10.1145/3418897},
  doi          = {10.1145/3418897},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/HuZL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/Hurley-SmithH20,
  author       = {Darren Hurley{-}Smith and
                  Julio C. Hernandez{-}Castro},
  title        = {Quantum Leap and Crash: Searching and Finding Bias in Quantum Random
                  Number Generators},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {23},
  number       = {3},
  pages        = {16:1--16:25},
  year         = {2020},
  url          = {https://doi.org/10.1145/3398726},
  doi          = {10.1145/3398726},
  timestamp    = {Fri, 08 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/Hurley-SmithH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/IkramMTKLE20,
  author       = {Muhammad Ikram and
                  Rahat Masood and
                  Gareth Tyson and
                  Mohamed Ali K{\^{a}}afar and
                  Noha Loizon and
                  Roya Ensafi},
  title        = {Measuring and Analysing the Chain of Implicit Trust: {A} Study of
                  Third-party Resources Loading},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {23},
  number       = {2},
  pages        = {8:1--8:27},
  year         = {2020},
  url          = {https://doi.org/10.1145/3380466},
  doi          = {10.1145/3380466},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/IkramMTKLE20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/KaregarPF20,
  author       = {Farzaneh Karegar and
                  John S{\"{o}}ren Pettersson and
                  Simone Fischer{-}H{\"{u}}bner},
  title        = {The Dilemma of User Engagement in Privacy Notices: Effects of Interaction
                  Modes and Habituation on User Attention},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {23},
  number       = {1},
  pages        = {5:1--5:38},
  year         = {2020},
  url          = {https://doi.org/10.1145/3372296},
  doi          = {10.1145/3372296},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/KaregarPF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/KhanHV20,
  author       = {Hassan Khan and
                  Urs Hengartner and
                  Daniel Vogel},
  title        = {Mimicry Attacks on Smartphone Keystroke Authentication},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {23},
  number       = {1},
  pages        = {2:1--2:34},
  year         = {2020},
  url          = {https://doi.org/10.1145/3372420},
  doi          = {10.1145/3372420},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/KhanHV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/LanotteMMV20,
  author       = {Ruggero Lanotte and
                  Massimo Merro and
                  Andrei Munteanu and
                  Luca Vigan{\`{o}}},
  title        = {A Formal Approach to Physics-based Attacks in Cyber-physical Systems},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {23},
  number       = {1},
  pages        = {3:1--3:41},
  year         = {2020},
  url          = {https://doi.org/10.1145/3373270},
  doi          = {10.1145/3373270},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/LanotteMMV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/MeylanCCHBH20,
  author       = {Alexandre Meylan and
                  Mauro Cherubini and
                  Bertil Chapuis and
                  Mathias Humbert and
                  Igor Bilogrevic and
                  K{\'{e}}vin Huguenin},
  title        = {A Study on the Use of Checksums for Integrity Verification of Web
                  Downloads},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {24},
  number       = {1},
  pages        = {4:1--4:36},
  year         = {2020},
  url          = {https://doi.org/10.1145/3410154},
  doi          = {10.1145/3410154},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/MeylanCCHBH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/NabeelKGY20,
  author       = {Mohamed Nabeel and
                  Issa M. Khalil and
                  Bei Guan and
                  Ting Yu},
  title        = {Following Passive {DNS} Traces to Detect Stealthy Malicious Domains
                  Via Graph Inference},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {23},
  number       = {4},
  pages        = {17:1--17:36},
  year         = {2020},
  url          = {https://doi.org/10.1145/3401897},
  doi          = {10.1145/3401897},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/NabeelKGY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/NaorRS20,
  author       = {Moni Naor and
                  Lior Rotem and
                  Gil Segev},
  title        = {The Security of Lazy Users in Out-of-Band Authentication},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {23},
  number       = {2},
  pages        = {9:1--9:32},
  year         = {2020},
  url          = {https://doi.org/10.1145/3377849},
  doi          = {10.1145/3377849},
  timestamp    = {Thu, 02 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/NaorRS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ParkerHRMLVMF20,
  author       = {James Parker and
                  Michael Hicks and
                  Andrew Ruef and
                  Michelle L. Mazurek and
                  Dave Levin and
                  Daniel Votipka and
                  Piotr Mardziel and
                  Kelsey R. Fulton},
  title        = {Build It, Break It, Fix It: Contesting Secure Development},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {23},
  number       = {2},
  pages        = {10:1--10:36},
  year         = {2020},
  url          = {https://doi.org/10.1145/3383773},
  doi          = {10.1145/3383773},
  timestamp    = {Thu, 02 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/ParkerHRMLVMF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/RizviF20,
  author       = {Syed Zain R. Rizvi and
                  Philip W. L. Fong},
  title        = {Efficient Authorization of Graph-database Queries in an Attribute-supporting
                  ReBAC Model},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {23},
  number       = {4},
  pages        = {18:1--18:33},
  year         = {2020},
  url          = {https://doi.org/10.1145/3401027},
  doi          = {10.1145/3401027},
  timestamp    = {Tue, 06 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/RizviF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/SamtaniZC20,
  author       = {Sagar Samtani and
                  Hongyi Zhu and
                  Hsinchun Chen},
  title        = {Proactively Identifying Emerging Hacker Threats from the Dark Web:
                  {A} Diachronic Graph Embedding Framework {(D-GEF)}},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {23},
  number       = {4},
  pages        = {21:1--21:33},
  year         = {2020},
  url          = {https://doi.org/10.1145/3409289},
  doi          = {10.1145/3409289},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/SamtaniZC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/SciarrettaCRV20,
  author       = {Giada Sciarretta and
                  Roberto Carbone and
                  Silvio Ranise and
                  Luca Vigan{\`{o}}},
  title        = {Formal Analysis of Mobile Multi-Factor Authentication with Single
                  Sign-On Login},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {23},
  number       = {3},
  pages        = {13:1--13:37},
  year         = {2020},
  url          = {https://doi.org/10.1145/3386685},
  doi          = {10.1145/3386685},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/SciarrettaCRV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ShinNKK20,
  author       = {Hocheol Shin and
                  Juhwan Noh and
                  Dohyun Kim and
                  Yongdae Kim},
  title        = {The System That Cried Wolf: Sensor Security Analysis of Wide-area
                  Smoke Detectors for Critical Infrastructure},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {23},
  number       = {3},
  pages        = {15:1--15:32},
  year         = {2020},
  url          = {https://doi.org/10.1145/3393926},
  doi          = {10.1145/3393926},
  timestamp    = {Mon, 02 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/ShinNKK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ShreeveHEAFR20,
  author       = {Benjamin Shreeve and
                  Joseph Hallett and
                  Matthew Edwards and
                  Pauline Anthonysamy and
                  Sylvain Frey and
                  Awais Rashid},
  title        = {"So if Mr Blue Head here clicks the link..." Risk Thinking in Cyber
                  Security Decision Making},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {24},
  number       = {1},
  pages        = {5:1--5:29},
  year         = {2020},
  url          = {https://doi.org/10.1145/3419101},
  doi          = {10.1145/3419101},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/ShreeveHEAFR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/WuL20,
  author       = {Fang{-}Jing Wu and
                  Tie Luo},
  title        = {CrowdPrivacy: Publish More Useful Data with Less Privacy Exposure
                  in Crowdsourced Location-Based Services},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {23},
  number       = {1},
  pages        = {6:1--6:25},
  year         = {2020},
  url          = {https://doi.org/10.1145/3375752},
  doi          = {10.1145/3375752},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/WuL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/YeTFZFXCHW20,
  author       = {Guixin Ye and
                  Zhanyong Tang and
                  Dingyi Fang and
                  Zhanxing Zhu and
                  Yansong Feng and
                  Pengfei Xu and
                  Xiaojiang Chen and
                  Jungong Han and
                  Zheng Wang},
  title        = {Using Generative Adversarial Networks to Break and Protect Text Captchas},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {23},
  number       = {2},
  pages        = {7:1--7:29},
  year         = {2020},
  url          = {https://doi.org/10.1145/3378446},
  doi          = {10.1145/3378446},
  timestamp    = {Mon, 16 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/YeTFZFXCHW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ZhaoAKTY20,
  author       = {Benjamin Zi Hao Zhao and
                  Hassan Jameel Asghar and
                  Mohamed Ali K{\^{a}}afar and
                  Francesca Trevisan and
                  Haiyue Yuan},
  title        = {Exploiting Behavioral Side Channels in Observation Resilient Cognitive
                  Authentication Schemes},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {24},
  number       = {1},
  pages        = {1:1--1:33},
  year         = {2020},
  url          = {https://doi.org/10.1145/3414844},
  doi          = {10.1145/3414844},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/ZhaoAKTY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/CantaliECE19,
  author       = {Gokcan Cantali and
                  Orhan Ermis and
                  Mehmet Ufuk {\c{C}}aglayan and
                  Cem Ersoy},
  title        = {Analytical Models for the Scalability of Dynamic Group-key Agreement
                  Protocols and Secure File Sharing Systems},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {22},
  number       = {4},
  pages        = {20:1--20:36},
  year         = {2019},
  url          = {https://doi.org/10.1145/3342998},
  doi          = {10.1145/3342998},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/CantaliECE19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/CecconelloCCLT19,
  author       = {Stefano Cecconello and
                  Alberto Compagno and
                  Mauro Conti and
                  Daniele Lain and
                  Gene Tsudik},
  title        = {Skype {\&} Type: Keyboard Eavesdropping in Voice-over-IP},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {22},
  number       = {4},
  pages        = {24:1--24:34},
  year         = {2019},
  url          = {https://doi.org/10.1145/3365366},
  doi          = {10.1145/3365366},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/CecconelloCCLT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/JansenTGWSS18,
  author       = {Rob Jansen and
                  Matthew Traudt and
                  John Geddes and
                  Chris Wacek and
                  Micah Sherr and
                  Paul Syverson},
  title        = {{KIST:} Kernel-Informed Socket Transport for Tor},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {22},
  number       = {1},
  pages        = {3:1--3:37},
  year         = {2019},
  url          = {https://doi.org/10.1145/3278121},
  doi          = {10.1145/3278121},
  timestamp    = {Fri, 10 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/JansenTGWSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/JinP19,
  author       = {Hongyu Jin and
                  Panos Papadimitratos},
  title        = {Resilient Privacy Protection for Location-Based Services through Decentralization},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {22},
  number       = {4},
  pages        = {21:1--21:36},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319401},
  doi          = {10.1145/3319401},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/JinP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/KreutzYRV19,
  author       = {Diego Kreutz and
                  Jiangshan Yu and
                  Fernando M. V. Ramos and
                  Paulo Jorge Esteves Ver{\'{\i}}ssimo},
  title        = {{ANCHOR:} Logically Centralized Security for Software-Defined Networks},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {22},
  number       = {2},
  pages        = {8:1--8:36},
  year         = {2019},
  url          = {https://doi.org/10.1145/3301305},
  doi          = {10.1145/3301305},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/KreutzYRV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/KwonYCP19,
  author       = {Donghyun Kwon and
                  Hayoon Yi and
                  Yeongpil Cho and
                  Yunheung Paek},
  title        = {Safe and Efficient Implementation of a Security System on {ARM} using
                  Intra-level Privilege Separation},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {22},
  number       = {2},
  pages        = {10:1--10:30},
  year         = {2019},
  url          = {https://doi.org/10.1145/3309698},
  doi          = {10.1145/3309698},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/KwonYCP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/MadiJAMWPWD18,
  author       = {Taous Madi and
                  Yosr Jarraya and
                  Amir Alimohammadifar and
                  Suryadipta Majumdar and
                  Yushun Wang and
                  Makan Pourzandi and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {{ISOTOP:} Auditing Virtual Networks Isolation Across Cloud Layers
                  in OpenStack},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {22},
  number       = {1},
  pages        = {1:1--1:35},
  year         = {2019},
  url          = {https://doi.org/10.1145/3267339},
  doi          = {10.1145/3267339},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/MadiJAMWPWD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ModersheimV18,
  author       = {Sebastian M{\"{o}}dersheim and
                  Luca Vigan{\`{o}}},
  title        = {Alpha-Beta Privacy},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {22},
  number       = {1},
  pages        = {7:1--7:35},
  year         = {2019},
  url          = {https://doi.org/10.1145/3289255},
  doi          = {10.1145/3289255},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/ModersheimV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/NohKSSKCK19,
  author       = {Juhwan Noh and
                  Yujin Kwon and
                  Yunmok Son and
                  Hocheol Shin and
                  Dohyun Kim and
                  Jaeyeong Choi and
                  Yongdae Kim},
  title        = {Tractor Beam: Safe-hijacking of Consumer Drones with Adaptive {GPS}
                  Spoofing},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {22},
  number       = {2},
  pages        = {12:1--12:26},
  year         = {2019},
  url          = {https://doi.org/10.1145/3309735},
  doi          = {10.1145/3309735},
  timestamp    = {Mon, 02 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/NohKSSKCK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/OnwuzurikeMACRS19,
  author       = {Lucky Onwuzurike and
                  Enrico Mariconti and
                  Panagiotis Andriotis and
                  Emiliano De Cristofaro and
                  Gordon J. Ross and
                  Gianluca Stringhini},
  title        = {MaMaDroid: Detecting Android Malware by Building Markov Chains of
                  Behavioral Models (Extended Version)},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {22},
  number       = {2},
  pages        = {14:1--14:34},
  year         = {2019},
  url          = {https://doi.org/10.1145/3313391},
  doi          = {10.1145/3313391},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/OnwuzurikeMACRS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/OutkinEGWVHHW19,
  author       = {Alexander V. Outkin and
                  Brandon K. Eames and
                  Meghan A. Galiardi and
                  Sarah Walsh and
                  Eric D. Vugrin and
                  Byron Heersink and
                  Jacob A. Hobbs and
                  Gregory D. Wyss},
  title        = {{GPLADD:} Quantifying Trust in Government and Commercial Systems {A}
                  Game-Theoretic Approach},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {22},
  number       = {3},
  pages        = {18:1--18:27},
  year         = {2019},
  url          = {https://doi.org/10.1145/3326283},
  doi          = {10.1145/3326283},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/OutkinEGWVHHW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/PaganiFB19,
  author       = {Fabio Pagani and
                  Oleksii Fedorov and
                  Davide Balzarotti},
  title        = {Introducing the Temporal Dimension to Memory Forensics},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {22},
  number       = {2},
  pages        = {9:1--9:21},
  year         = {2019},
  url          = {https://doi.org/10.1145/3310355},
  doi          = {10.1145/3310355},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/PaganiFB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/PomonisPKPK18,
  author       = {Marios Pomonis and
                  Theofilos Petsios and
                  Angelos D. Keromytis and
                  Michalis Polychronakis and
                  Vasileios P. Kemerlis},
  title        = {Kernel Protection Against Just-In-Time Code Reuse},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {22},
  number       = {1},
  pages        = {5:1--5:28},
  year         = {2019},
  url          = {https://doi.org/10.1145/3277592},
  doi          = {10.1145/3277592},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/PomonisPKPK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/Powell19,
  author       = {Brian A. Powell},
  title        = {Malicious Overtones: Hunting Data Theft in the Frequency Domain with
                  One-class Learning},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {22},
  number       = {4},
  pages        = {22:1--22:34},
  year         = {2019},
  url          = {https://doi.org/10.1145/3360469},
  doi          = {10.1145/3360469},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/Powell19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/RaoCBK19,
  author       = {Fang{-}Yu Rao and
                  Jianneng Cao and
                  Elisa Bertino and
                  Murat Kantarcioglu},
  title        = {Hybrid Private Record Linkage: Separating Differentially Private Synopses
                  from Matching Records},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {22},
  number       = {3},
  pages        = {15:1--15:36},
  year         = {2019},
  url          = {https://doi.org/10.1145/3318462},
  doi          = {10.1145/3318462},
  timestamp    = {Wed, 07 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/RaoCBK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ReavesVSTBTB18,
  author       = {Bradley Reaves and
                  Luis Vargas and
                  Nolen Scaife and
                  Dave Tian and
                  Logan Blue and
                  Patrick Traynor and
                  Kevin R. B. Butler},
  title        = {Characterizing the Security of the {SMS} Ecosystem with Public Gateways},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {22},
  number       = {1},
  pages        = {2:1--2:31},
  year         = {2019},
  url          = {https://doi.org/10.1145/3268932},
  doi          = {10.1145/3268932},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/ReavesVSTBTB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/RuotiADHMORSVWZ19,
  author       = {Scott Ruoti and
                  Jeff Andersen and
                  Luke Dickinson and
                  Scott Heidbrink and
                  Tyler Monson and
                  Mark O'Neill and
                  Ken Reese and
                  Brad Spendlove and
                  Elham Vaziripour and
                  Justin Wu and
                  Daniel Zappala and
                  Kent E. Seamons},
  title        = {A Usability Study of Four Secure Email Tools Using Paired Participants},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {22},
  number       = {2},
  pages        = {13:1--13:33},
  year         = {2019},
  url          = {https://doi.org/10.1145/3313761},
  doi          = {10.1145/3313761},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/RuotiADHMORSVWZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/SenarathGA19,
  author       = {Awanthika Senarath and
                  Marthie Grobler and
                  Nalin Asanka Gamagedara Arachchilage},
  title        = {Will They Use It or Not? Investigating Software Developers' Intention
                  to Follow Privacy Engineering Methodologies},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {22},
  number       = {4},
  pages        = {23:1--23:30},
  year         = {2019},
  url          = {https://doi.org/10.1145/3364224},
  doi          = {10.1145/3364224},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/SenarathGA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/SharifBBR19,
  author       = {Mahmood Sharif and
                  Sruti Bhagavatula and
                  Lujo Bauer and
                  Michael K. Reiter},
  title        = {A General Framework for Adversarial Examples with Objectives},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {22},
  number       = {3},
  pages        = {16:1--16:30},
  year         = {2019},
  url          = {https://doi.org/10.1145/3317611},
  doi          = {10.1145/3317611},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/SharifBBR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/SluganovicRRM18,
  author       = {Ivo Sluganovic and
                  Marc Roeschlin and
                  Kasper Bonne Rasmussen and
                  Ivan Martinovic},
  title        = {Analysis of Reflexive Eye Movements for Fast Replay-Resistant Biometric
                  Authentication},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {22},
  number       = {1},
  pages        = {4:1--4:30},
  year         = {2019},
  url          = {https://doi.org/10.1145/3281745},
  doi          = {10.1145/3281745},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/SluganovicRRM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/Ugarte-PedreroG18,
  author       = {Xabier Ugarte{-}Pedrero and
                  Mariano Graziano and
                  Davide Balzarotti},
  title        = {A Close Look at a Daily Dataset of Malware Samples},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {22},
  number       = {1},
  pages        = {6:1--6:30},
  year         = {2019},
  url          = {https://doi.org/10.1145/3291061},
  doi          = {10.1145/3291061},
  timestamp    = {Fri, 10 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/Ugarte-PedreroG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/WedajPR19,
  author       = {Samuel Wedaj and
                  Kolin Paul and
                  Vinay J. Ribeiro},
  title        = {{DADS:} Decentralized Attestation for Device Swarms},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {22},
  number       = {3},
  pages        = {19:1--19:29},
  year         = {2019},
  url          = {https://doi.org/10.1145/3325822},
  doi          = {10.1145/3325822},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/WedajPR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/WooAKLM19,
  author       = {Simon S. Woo and
                  Ron Artstein and
                  Elsi Kaiser and
                  Xiao Le and
                  Jelena Mirkovic},
  title        = {Using Episodic Memory for User Authentication},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {22},
  number       = {2},
  pages        = {11:1--11:34},
  year         = {2019},
  url          = {https://doi.org/10.1145/3308992},
  doi          = {10.1145/3308992},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/WooAKLM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/YanLVLFM19,
  author       = {Chao Yan and
                  Bo Li and
                  Yevgeniy Vorobeychik and
                  Aron Laszka and
                  Daniel Fabbri and
                  Bradley A. Malin},
  title        = {Database Audit Workload Prioritization via Game Theory},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {22},
  number       = {3},
  pages        = {17:1--17:21},
  year         = {2019},
  url          = {https://doi.org/10.1145/3323924},
  doi          = {10.1145/3323924},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/YanLVLFM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/AbdouO18,
  author       = {AbdelRahman Abdou and
                  Paul C. van Oorschot},
  title        = {Server Location Verification {(SLV)} and Server Location Pinning:
                  Augmenting {TLS} Authentication},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {21},
  number       = {1},
  pages        = {1:1--1:26},
  year         = {2018},
  url          = {https://doi.org/10.1145/3139294},
  doi          = {10.1145/3139294},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/AbdouO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/AlrabaeeSWD18,
  author       = {Saed Alrabaee and
                  Paria Shirani and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {\emph{FOSSIL}: {A} Resilient and Efficient System for Identifying
                  {FOSS} Functions in Malware Binaries},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {21},
  number       = {2},
  pages        = {8:1--8:34},
  year         = {2018},
  url          = {https://doi.org/10.1145/3175492},
  doi          = {10.1145/3175492},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/AlrabaeeSWD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BhattacharyaM18,
  author       = {Sarani Bhattacharya and
                  Debdeep Mukhopadhyay},
  title        = {Utilizing Performance Counters for Compromising Public Key Ciphers},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {21},
  number       = {1},
  pages        = {5:1--5:31},
  year         = {2018},
  url          = {https://doi.org/10.1145/3156015},
  doi          = {10.1145/3156015},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/BhattacharyaM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BotacinGG18,
  author       = {Marcus Botacin and
                  Paulo L{\'{\i}}cio de Geus and
                  Andr{\'{e}} Gr{\'{e}}gio},
  title        = {Enhancing Branch Monitoring for Security Purposes: From Control Flow
                  Integrity to Malware Analysis and Debugging},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {21},
  number       = {1},
  pages        = {4:1--4:30},
  year         = {2018},
  url          = {https://doi.org/10.1145/3152162},
  doi          = {10.1145/3152162},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/BotacinGG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/CarminatiPCLMZ18,
  author       = {Michele Carminati and
                  Mario Polino and
                  Andrea Continella and
                  Andrea Lanzi and
                  Federico Maggi and
                  Stefano Zanero},
  title        = {Security Evaluation of a Banking Fraud Analysis System},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {21},
  number       = {3},
  pages        = {11:1--11:31},
  year         = {2018},
  url          = {https://doi.org/10.1145/3178370},
  doi          = {10.1145/3178370},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/CarminatiPCLMZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/FarrisSCGJ18,
  author       = {Katheryn A. Farris and
                  Ankit Shah and
                  George Cybenko and
                  Rajesh Ganesan and
                  Sushil Jajodia},
  title        = {{VULCON:} {A} System for Vulnerability Prioritization, Mitigation,
                  and Management},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {21},
  number       = {4},
  pages        = {16:1--16:28},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196884},
  doi          = {10.1145/3196884},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/FarrisSCGJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/GiacobazziM18,
  author       = {Roberto Giacobazzi and
                  Isabella Mastroeni},
  title        = {Abstract Non-Interference: {A} Unifying Framework for Weakening Information-flow},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {21},
  number       = {2},
  pages        = {9:1--9:31},
  year         = {2018},
  url          = {https://doi.org/10.1145/3175660},
  doi          = {10.1145/3175660},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/GiacobazziM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/GongL18,
  author       = {Neil Zhenqiang Gong and
                  Bin Liu},
  title        = {Attribute Inference Attacks in Online Social Networks},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {21},
  number       = {1},
  pages        = {3:1--3:30},
  year         = {2018},
  url          = {https://doi.org/10.1145/3154793},
  doi          = {10.1145/3154793},
  timestamp    = {Mon, 31 Oct 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/GongL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/KelbertP18,
  author       = {Florian Kelbert and
                  Alexander Pretschner},
  title        = {Data Usage Control for Distributed Systems},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {21},
  number       = {3},
  pages        = {12:1--12:32},
  year         = {2018},
  url          = {https://doi.org/10.1145/3183342},
  doi          = {10.1145/3183342},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/KelbertP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/KimKKYSK18,
  author       = {Jinsu Kim and
                  Dongyoung Koo and
                  Yuna Kim and
                  Hyunsoo Yoon and
                  Junbum Shin and
                  Sungwook Kim},
  title        = {Efficient Privacy-Preserving Matrix Factorization for Recommendation
                  via Fully Homomorphic Encryption},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {21},
  number       = {4},
  pages        = {17:1--17:30},
  year         = {2018},
  url          = {https://doi.org/10.1145/3212509},
  doi          = {10.1145/3212509},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/KimKKYSK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/LevesqueCSF18,
  author       = {Fanny Lalonde L{\'{e}}vesque and
                  Sonia Chiasson and
                  Anil Somayaji and
                  Jos{\'{e}} M. Fernandez},
  title        = {Technological and Human Factors of Malware Attacks: {A} Computer Security
                  Clinical Trial Approach},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {21},
  number       = {4},
  pages        = {18:1--18:30},
  year         = {2018},
  url          = {https://doi.org/10.1145/3210311},
  doi          = {10.1145/3210311},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/LevesqueCSF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/PinkasSZ18,
  author       = {Benny Pinkas and
                  Thomas Schneider and
                  Michael Zohner},
  title        = {Scalable Private Set Intersection Based on {OT} Extension},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {21},
  number       = {2},
  pages        = {7:1--7:35},
  year         = {2018},
  url          = {https://doi.org/10.1145/3154794},
  doi          = {10.1145/3154794},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/PinkasSZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ShiMA18,
  author       = {Hao Shi and
                  Jelena Mirkovic and
                  Abdulla Alwabel},
  title        = {Handling Anti-Virtual Machine Techniques in Malicious Software},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {21},
  number       = {1},
  pages        = {2:1--2:31},
  year         = {2018},
  url          = {https://doi.org/10.1145/3139292},
  doi          = {10.1145/3139292},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/ShiMA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/SonNCK18,
  author       = {Yunmok Son and
                  Juhwan Noh and
                  Jaeyeong Choi and
                  Yongdae Kim},
  title        = {GyrosFinger: Fingerprinting Drones for Location Tracking Based on
                  the Outputs of {MEMS} Gyroscopes},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {21},
  number       = {2},
  pages        = {10:1--10:25},
  year         = {2018},
  url          = {https://doi.org/10.1145/3177751},
  doi          = {10.1145/3177751},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/SonNCK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/StobertB18,
  author       = {Elizabeth Stobert and
                  Robert Biddle},
  title        = {The Password Life Cycle},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {21},
  number       = {3},
  pages        = {13:1--13:32},
  year         = {2018},
  url          = {https://doi.org/10.1145/3183341},
  doi          = {10.1145/3183341},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/StobertB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/WeiROR18,
  author       = {Fengguo Wei and
                  Sankardas Roy and
                  Xinming Ou and
                  Robby},
  title        = {Amandroid: {A} Precise and General Inter-component Data Flow Analysis
                  Framework for Security Vetting of Android Apps},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {21},
  number       = {3},
  pages        = {14:1--14:32},
  year         = {2018},
  url          = {https://doi.org/10.1145/3183575},
  doi          = {10.1145/3183575},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/WeiROR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/YeTFCWAW18,
  author       = {Guixin Ye and
                  Zhanyong Tang and
                  Dingyi Fang and
                  Xiaojiang Chen and
                  Willy Wolff and
                  Adam J. Aviv and
                  Zheng Wang},
  title        = {A Video-based Attack for Android Pattern Lock},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {21},
  number       = {4},
  pages        = {19:1--19:31},
  year         = {2018},
  url          = {https://doi.org/10.1145/3230740},
  doi          = {10.1145/3230740},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/YeTFCWAW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ZhangBA18,
  author       = {Yihua Zhang and
                  Marina Blanton and
                  Ghada Almashaqbeh},
  title        = {Implementing Support for Pointers to Private Data in a General-Purpose
                  Secure Multi-Party Compiler},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {21},
  number       = {2},
  pages        = {6:1--6:34},
  year         = {2018},
  url          = {https://doi.org/10.1145/3154600},
  doi          = {10.1145/3154600},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/ZhangBA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ZhangPK18,
  author       = {Yupeng Zhang and
                  Charalampos Papamanthou and
                  Jonathan Katz},
  title        = {Verifiable Graph Processing},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {21},
  number       = {4},
  pages        = {20:1--20:23},
  year         = {2018},
  url          = {https://doi.org/10.1145/3233181},
  doi          = {10.1145/3233181},
  timestamp    = {Thu, 29 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/ZhangPK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ZhaoD18,
  author       = {Siqi Zhao and
                  Xuhua Ding},
  title        = {{FIMCE:} {A} Fully Isolated Micro-Computing Environment for Multicore
                  Systems},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {21},
  number       = {3},
  pages        = {15:1--15:30},
  year         = {2018},
  url          = {https://doi.org/10.1145/3195181},
  doi          = {10.1145/3195181},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/ZhaoD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ArgyrosPSKP17,
  author       = {George Argyros and
                  Theofilos Petsios and
                  Suphannee Sivakorn and
                  Angelos D. Keromytis and
                  Iasonas Polakis},
  title        = {Evaluating the Privacy Guarantees of Location Proximity Services},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {19},
  number       = {4},
  pages        = {12:1--12:31},
  year         = {2017},
  url          = {https://doi.org/10.1145/3007209},
  doi          = {10.1145/3007209},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/ArgyrosPSKP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BrandenburgerCK17,
  author       = {Marcus Brandenburger and
                  Christian Cachin and
                  Nikola Knezevic},
  title        = {Don't Trust the Cloud, Verify: Integrity and Consistency for Cloud
                  Object Stores},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {20},
  number       = {3},
  pages        = {8:1--8:30},
  year         = {2017},
  url          = {https://doi.org/10.1145/3079762},
  doi          = {10.1145/3079762},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/BrandenburgerCK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/CheccoBL17,
  author       = {Alessandro Checco and
                  Giuseppe Bianchi and
                  Douglas J. Leith},
  title        = {{BLC:} Private Matrix Factorization Recommenders via Automatic Group
                  Learning},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {20},
  number       = {2},
  pages        = {4:1--4:25},
  year         = {2017},
  url          = {https://doi.org/10.1145/3041760},
  doi          = {10.1145/3041760},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/CheccoBL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/HumbertAHT17,
  author       = {Mathias Humbert and
                  Erman Ayday and
                  Jean{-}Pierre Hubaux and
                  Amalio Telenti},
  title        = {Quantifying Interdependent Risks in Genomic Privacy},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {20},
  number       = {1},
  pages        = {3:1--3:31},
  year         = {2017},
  url          = {https://doi.org/10.1145/3035538},
  doi          = {10.1145/3035538},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/HumbertAHT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/IkramOFCFJKS17,
  author       = {Muhammad Ikram and
                  Lucky Onwuzurike and
                  Shehroze Farooqi and
                  Emiliano De Cristofaro and
                  Arik Friedman and
                  Guillaume Jourjon and
                  Mohamed Ali K{\^{a}}afar and
                  M. Zubair Shafiq},
  title        = {Measuring, Characterizing, and Detecting Facebook Like Farms},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {20},
  number       = {4},
  pages        = {13:1--13:28},
  year         = {2017},
  url          = {https://doi.org/10.1145/3121134},
  doi          = {10.1145/3121134},
  timestamp    = {Wed, 27 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/IkramOFCFJKS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/MartinovicRRT17,
  author       = {Ivan Martinovic and
                  Kasper Bonne Rasmussen and
                  Marc Roeschlin and
                  Gene Tsudik},
  title        = {Pulse-Response: Exploring Human Body Impedance for Biometric Recognition},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {20},
  number       = {2},
  pages        = {6:1--6:31},
  year         = {2017},
  url          = {https://doi.org/10.1145/3064645},
  doi          = {10.1145/3064645},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/MartinovicRRT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/MatsumotoRSKP17,
  author       = {Stephanos Matsumoto and
                  Raphael M. Reischuk and
                  Pawel Szalachowski and
                  Tiffany Hyun{-}Jin Kim and
                  Adrian Perrig},
  title        = {Authentication Challenges in a Global Environment},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {20},
  number       = {1},
  pages        = {1:1--1:34},
  year         = {2017},
  url          = {https://doi.org/10.1145/3007208},
  doi          = {10.1145/3007208},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/MatsumotoRSKP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/MeutznerGNHK17,
  author       = {Hendrik Meutzner and
                  Santosh Gupta and
                  Viet{-}Hung Nguyen and
                  Thorsten Holz and
                  Dorothea Kolossa},
  title        = {Toward Improved Audio CAPTCHAs Based on Auditory Perception and Language
                  Understanding},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {19},
  number       = {4},
  pages        = {10:1--10:31},
  year         = {2017},
  url          = {https://doi.org/10.1145/2856820},
  doi          = {10.1145/2856820},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/MeutznerGNHK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/Munoz-GonzalezS17,
  author       = {Luis Mu{\~{n}}oz{-}Gonz{\'{a}}lez and
                  Daniele Sgandurra and
                  Andrea Paudice and
                  Emil C. Lupu},
  title        = {Efficient Attack Graph Analysis through Approximate Inference},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {20},
  number       = {3},
  pages        = {10:1--10:30},
  year         = {2017},
  url          = {https://doi.org/10.1145/3105760},
  doi          = {10.1145/3105760},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/Munoz-GonzalezS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/NoormanBMPMPVGM17,
  author       = {Job Noorman and
                  Jo Van Bulck and
                  Jan Tobias M{\"{u}}hlberg and
                  Frank Piessens and
                  Pieter Maene and
                  Bart Preneel and
                  Ingrid Verbauwhede and
                  Johannes G{\"{o}}tzfried and
                  Tilo M{\"{u}}ller and
                  Felix C. Freiling},
  title        = {Sancus 2.0: {A} Low-Cost Security Architecture for IoT Devices},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {20},
  number       = {3},
  pages        = {7:1--7:33},
  year         = {2017},
  url          = {https://doi.org/10.1145/3079763},
  doi          = {10.1145/3079763},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/NoormanBMPMPVGM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/OsterweilBCPSAC17,
  author       = {Leon J. Osterweil and
                  Matt Bishop and
                  Heather M. Conboy and
                  Huong Phan and
                  Borislava I. Simidchieva and
                  George S. Avrunin and
                  Lori A. Clarke and
                  Sean Peisert},
  title        = {Iterative Analysis to Improve Key Properties of Critical Human-Intensive
                  Processes: An Election Security Example},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {20},
  number       = {2},
  pages        = {5:1--5:31},
  year         = {2017},
  url          = {https://doi.org/10.1145/3041041},
  doi          = {10.1145/3041041},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/OsterweilBCPSAC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/PolyakovRSV17,
  author       = {Yuriy Polyakov and
                  Kurt Rohloff and
                  Gyana Sahu and
                  Vinod Vaikuntanathan},
  title        = {Fast Proxy Re-Encryption for Publish/Subscribe Systems},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {20},
  number       = {4},
  pages        = {14:1--14:31},
  year         = {2017},
  url          = {https://doi.org/10.1145/3128607},
  doi          = {10.1145/3128607},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/PolyakovRSV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ReavesBSBBTB17,
  author       = {Bradley Reaves and
                  Jasmine D. Bowers and
                  Nolen Scaife and
                  Adam Bates and
                  Arnav Bhartiya and
                  Patrick Traynor and
                  Kevin R. B. Butler},
  title        = {Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking
                  Applications},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {20},
  number       = {3},
  pages        = {11:1--11:31},
  year         = {2017},
  url          = {https://doi.org/10.1145/3092368},
  doi          = {10.1145/3092368},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/ReavesBSBBTB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/RulloMSB17,
  author       = {Antonino Rullo and
                  Daniele Midi and
                  Edoardo Serra and
                  Elisa Bertino},
  title        = {Pareto Optimal Security Resource Allocation for Internet of Things},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {20},
  number       = {4},
  pages        = {15:1--15:30},
  year         = {2017},
  url          = {https://doi.org/10.1145/3139293},
  doi          = {10.1145/3139293},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/RulloMSB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ShokriTT17,
  author       = {Reza Shokri and
                  George Theodorakopoulos and
                  Carmela Troncoso},
  title        = {Privacy Games Along Location Traces: {A} Game-Theoretic Framework
                  for Optimizing Location Privacy},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {19},
  number       = {4},
  pages        = {11:1--11:31},
  year         = {2017},
  url          = {https://doi.org/10.1145/3009908},
  doi          = {10.1145/3009908},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/ShokriTT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ShuYRJ17,
  author       = {Xiaokui Shu and
                  Danfeng (Daphne) Yao and
                  Naren Ramakrishnan and
                  Trent Jaeger},
  title        = {Long-Span Program Behavior Modeling and Attack Detection},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {20},
  number       = {4},
  pages        = {12:1--12:28},
  year         = {2017},
  url          = {https://doi.org/10.1145/3105761},
  doi          = {10.1145/3105761},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/ShuYRJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/SuCLBLJ17,
  author       = {Dong Su and
                  Jianneng Cao and
                  Ninghui Li and
                  Elisa Bertino and
                  Min Lyu and
                  Hongxia Jin},
  title        = {Differentially Private K-Means Clustering and a Hybrid Approach to
                  Private Optimization},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {20},
  number       = {4},
  pages        = {16:1--16:33},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133201},
  doi          = {10.1145/3133201},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/SuCLBLJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ToreiniSH17,
  author       = {Ehsan Toreini and
                  Siamak F. Shahandashti and
                  Feng Hao},
  title        = {Texture to the Rescue: Practical Paper Fingerprinting Based on Texture
                  Patterns},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {20},
  number       = {3},
  pages        = {9:1--9:29},
  year         = {2017},
  url          = {https://doi.org/10.1145/3092816},
  doi          = {10.1145/3092816},
  timestamp    = {Mon, 12 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/ToreiniSH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/Wagner17,
  author       = {Isabel Wagner},
  title        = {Evaluating the Strength of Genomic Privacy Metrics},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {20},
  number       = {1},
  pages        = {2:1--2:34},
  year         = {2017},
  url          = {https://doi.org/10.1145/3020003},
  doi          = {10.1145/3020003},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/Wagner17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/AonghusaL16,
  author       = {Pol Mac Aonghusa and
                  Douglas J. Leith},
  title        = {Don't Let Google Know I'm Lonely},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {19},
  number       = {1},
  pages        = {3:1--3:25},
  year         = {2016},
  url          = {https://doi.org/10.1145/2937754},
  doi          = {10.1145/2937754},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/AonghusaL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BenhamoudaJL16,
  author       = {Fabrice Benhamouda and
                  Marc Joye and
                  Beno{\^{\i}}t Libert},
  title        = {A New Framework for Privacy-Preserving Aggregation of Time-Series
                  Data},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {18},
  number       = {3},
  pages        = {10:1--10:21},
  year         = {2016},
  url          = {https://doi.org/10.1145/2873069},
  doi          = {10.1145/2873069},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/BenhamoudaJL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/CramptonGGJW16,
  author       = {Jason Crampton and
                  Andrei Gagarin and
                  Gregory Z. Gutin and
                  Mark Jones and
                  Magnus Wahlstr{\"{o}}m},
  title        = {On the Workflow Satisfiability Problem with Class-Independent Constraints
                  for Hierarchical Organizations},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {19},
  number       = {3},
  pages        = {8:1--8:29},
  year         = {2016},
  url          = {https://doi.org/10.1145/2988239},
  doi          = {10.1145/2988239},
  timestamp    = {Thu, 05 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/CramptonGGJW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/DongKC16,
  author       = {Zheng Dong and
                  Kevin Kane and
                  L. Jean Camp},
  title        = {Detection of Rogue Certificates from Trusted Certificate Authorities
                  Using Deep Neural Networks},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {19},
  number       = {2},
  pages        = {5:1--5:31},
  year         = {2016},
  url          = {https://doi.org/10.1145/2975591},
  doi          = {10.1145/2975591},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/DongKC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/EberzRLM16,
  author       = {Simon Eberz and
                  Kasper Bonne Rasmussen and
                  Vincent Lenders and
                  Ivan Martinovic},
  title        = {Looks Like Eve: Exposing Insider Threats Using Eye Movement Biometrics},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {19},
  number       = {1},
  pages        = {1:1--1:31},
  year         = {2016},
  url          = {https://doi.org/10.1145/2904018},
  doi          = {10.1145/2904018},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/EberzRLM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/GarayKM16,
  author       = {Juan A. Garay and
                  Vladimir Kolesnikov and
                  Rae McLellan},
  title        = {{MAC} Precomputation with Applications to Secure Memory},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {19},
  number       = {2},
  pages        = {6:1--6:21},
  year         = {2016},
  url          = {https://doi.org/10.1145/2943780},
  doi          = {10.1145/2943780},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/GarayKM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/GutierrezASAA16,
  author       = {Christopher N. Gutierrez and
                  Mohammed H. Almeshekah and
                  Eugene H. Spafford and
                  Mikhail J. Atallah and
                  Jeffrey Avery},
  title        = {Inhibiting and Detecting Offline Password Cracking Using ErsatzPasswords},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {19},
  number       = {3},
  pages        = {9:1--9:30},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2996457},
  timestamp    = {Mon, 02 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/GutierrezASAA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/JiLSHB16,
  author       = {Shouling Ji and
                  Weiqing Li and
                  Mudhakar Srivatsa and
                  Jing (Selena) He and
                  Raheem A. Beyah},
  title        = {General Graph Data De-Anonymization: From Mobility Traces to Social
                  Networks},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {18},
  number       = {4},
  pages        = {12:1--12:29},
  year         = {2016},
  url          = {https://doi.org/10.1145/2894760},
  doi          = {10.1145/2894760},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/JiLSHB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/MitropoulosSSK16,
  author       = {Dimitris Mitropoulos and
                  Konstantinos Stroggylos and
                  Diomidis Spinellis and
                  Angelos D. Keromytis},
  title        = {How to Train Your Browser: Preventing {XSS} Attacks Using Contextual
                  Script Fingerprints},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {19},
  number       = {1},
  pages        = {2:1--2:31},
  year         = {2016},
  url          = {https://doi.org/10.1145/2939374},
  doi          = {10.1145/2939374},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/MitropoulosSSK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/OzalpGNS16,
  author       = {Ismet Ozalp and
                  Mehmet Emre Gursoy and
                  Mehmet Ercan Nergiz and
                  Y{\"{u}}cel Saygin},
  title        = {Privacy-Preserving Publishing of Hierarchical Data},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {19},
  number       = {3},
  pages        = {7:1--7:29},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976738},
  doi          = {10.1145/2976738},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/OzalpGNS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/RahbariniaPA16,
  author       = {Babak Rahbarinia and
                  Roberto Perdisci and
                  Manos Antonakakis},
  title        = {Efficient and Accurate Behavior-Based Tracking of Malware-Control
                  Domains in Large {ISP} Networks},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {19},
  number       = {2},
  pages        = {4:1--4:31},
  year         = {2016},
  url          = {https://doi.org/10.1145/2960409},
  doi          = {10.1145/2960409},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/RahbariniaPA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/SerwaddaPWKS16,
  author       = {Abdul Serwadda and
                  Vir V. Phoha and
                  Zibo Wang and
                  Rajesh Kumar and
                  Diksha Shukla},
  title        = {Toward Robotic Robbery on the Touch Screen},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {18},
  number       = {4},
  pages        = {14:1--14:25},
  year         = {2016},
  url          = {https://doi.org/10.1145/2898353},
  doi          = {10.1145/2898353},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/SerwaddaPWKS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ShabtaiBRGES16,
  author       = {Asaf Shabtai and
                  Maya Bercovitch and
                  Lior Rokach and
                  Ya'akov (Kobi) Gal and
                  Yuval Elovici and
                  Erez Shmueli},
  title        = {Behavioral Study of Users When Interacting with Active Honeytokens},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {18},
  number       = {3},
  pages        = {9:1--9:21},
  year         = {2016},
  url          = {https://doi.org/10.1145/2854152},
  doi          = {10.1145/2854152},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/ShabtaiBRGES16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ShayKDHMSUBCC16,
  author       = {Richard Shay and
                  Saranga Komanduri and
                  Adam L. Durity and
                  Phillip (Seyoung) Huh and
                  Michelle L. Mazurek and
                  Sean M. Segreti and
                  Blase Ur and
                  Lujo Bauer and
                  Nicolas Christin and
                  Lorrie Faith Cranor},
  title        = {Designing Password Policies for Strength and Usability},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {18},
  number       = {4},
  pages        = {13:1--13:34},
  year         = {2016},
  url          = {https://doi.org/10.1145/2891411},
  doi          = {10.1145/2891411},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/ShayKDHMSUBCC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ZhengPW16,
  author       = {Nan Zheng and
                  Aaron Paloski and
                  Haining Wang},
  title        = {An Efficient User Verification System Using Angle-Based Mouse Movement
                  Biometrics},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {18},
  number       = {3},
  pages        = {11:1--11:27},
  year         = {2016},
  url          = {https://doi.org/10.1145/2893185},
  doi          = {10.1145/2893185},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/ZhengPW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/AlexanderPLC15,
  author       = {Perry Alexander and
                  Lee Pike and
                  Peter A. Loscocco and
                  George Coker},
  title        = {Model Checking Distributed Mandatory Access Control Policies},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {18},
  number       = {2},
  pages        = {6:1--6:25},
  year         = {2015},
  url          = {https://doi.org/10.1145/2785966},
  doi          = {10.1145/2785966},
  timestamp    = {Mon, 18 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/AlexanderPLC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/AliA15,
  author       = {Muhammad Qasim Ali and
                  Ehab Al{-}Shaer},
  title        = {Randomization-Based Intrusion Detection System for Advanced Metering
                  Infrastructure},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {18},
  number       = {2},
  pages        = {7:1--7:30},
  year         = {2015},
  url          = {https://doi.org/10.1145/2814936},
  doi          = {10.1145/2814936},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/AliA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/CarnavaletM15,
  author       = {Xavier de Carn{\'{e}} de Carnavalet and
                  Mohammad Mannan},
  title        = {A Large-Scale Evaluation of High-Impact Password Strength Meters},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {18},
  number       = {1},
  pages        = {1:1--1:32},
  year         = {2015},
  url          = {https://doi.org/10.1145/2739044},
  doi          = {10.1145/2739044},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/CarnavaletM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ChongM15,
  author       = {Stephen Chong and
                  Ron van der Meyden},
  title        = {Using Architecture to Reason about Information Security},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {18},
  number       = {2},
  pages        = {8:1--8:30},
  year         = {2015},
  url          = {https://doi.org/10.1145/2829949},
  doi          = {10.1145/2829949},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/ChongM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/CulnaneRST15,
  author       = {Chris Culnane and
                  Peter Y. A. Ryan and
                  Steve A. Schneider and
                  Vanessa Teague},
  title        = {vVote: {A} Verifiable Voting System},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {18},
  number       = {1},
  pages        = {3:1--3:30},
  year         = {2015},
  url          = {https://doi.org/10.1145/2746338},
  doi          = {10.1145/2746338},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/CulnaneRST15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/DingFD15,
  author       = {Steven H. H. Ding and
                  Benjamin C. M. Fung and
                  Mourad Debbabi},
  title        = {A Visualizable Evidence-Driven Approach for Authorship Attribution},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {17},
  number       = {3},
  pages        = {12:1--12:30},
  year         = {2015},
  url          = {https://doi.org/10.1145/2699910},
  doi          = {10.1145/2699910},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/DingFD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/DoychevKMR15,
  author       = {Goran Doychev and
                  Boris K{\"{o}}pf and
                  Laurent Mauborgne and
                  Jan Reineke},
  title        = {CacheAudit: {A} Tool for the Static Analysis of Cache Side Channels},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {18},
  number       = {1},
  pages        = {4:1--4:32},
  year         = {2015},
  url          = {https://doi.org/10.1145/2756550},
  doi          = {10.1145/2756550},
  timestamp    = {Wed, 04 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/DoychevKMR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ErwayKPT15,
  author       = {C. Christopher Erway and
                  Alptekin K{\"{u}}p{\c{c}}{\"{u}} and
                  Charalampos Papamanthou and
                  Roberto Tamassia},
  title        = {Dynamic Provable Data Possession},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {17},
  number       = {4},
  pages        = {15:1--15:29},
  year         = {2015},
  url          = {https://doi.org/10.1145/2699909},
  doi          = {10.1145/2699909},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/ErwayKPT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/KarameARGC15,
  author       = {Ghassan O. Karame and
                  Elli Androulaki and
                  Marc Roeschlin and
                  Arthur Gervais and
                  Srdjan Capkun},
  title        = {Misbehavior in Bitcoin: {A} Study of Double-Spending and Accountability},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {18},
  number       = {1},
  pages        = {2:1--2:32},
  year         = {2015},
  url          = {https://doi.org/10.1145/2732196},
  doi          = {10.1145/2732196},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/KarameARGC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/LeeSFKN15,
  author       = {Hyojeong Lee and
                  Jeff Seibert and
                  Dylan Fistrovic and
                  Charles Edwin Killian and
                  Cristina Nita{-}Rotaru},
  title        = {Gatling: Automatic Performance Attack Discovery in Large-Scale Distributed
                  Systems},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {17},
  number       = {4},
  pages        = {13:1--13:34},
  year         = {2015},
  url          = {https://doi.org/10.1145/2714565},
  doi          = {10.1145/2714565},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/LeeSFKN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/OrenK15,
  author       = {Yossef Oren and
                  Angelos D. Keromytis},
  title        = {Attacking the Internet Using Broadcast Digital Television},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {17},
  number       = {4},
  pages        = {16:1--16:27},
  year         = {2015},
  url          = {https://doi.org/10.1145/2723159},
  doi          = {10.1145/2723159},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/OrenK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/PietroO15,
  author       = {Roberto Di Pietro and
                  Gabriele Oligeri},
  title        = {Silence is Golden: Exploiting Jamming and Radio Silence to Communicate},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {17},
  number       = {3},
  pages        = {9:1--9:24},
  year         = {2015},
  url          = {https://doi.org/10.1145/2699906},
  doi          = {10.1145/2699906},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/PietroO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/RuppBHP15,
  author       = {Andy Rupp and
                  Foteini Baldimtsi and
                  Gesine Hinterw{\"{a}}lder and
                  Christof Paar},
  title        = {Cryptographic Theory Meets Practice: Efficient and Privacy-Preserving
                  Payments for Public Transport},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {17},
  number       = {3},
  pages        = {10:1--10:31},
  year         = {2015},
  url          = {https://doi.org/10.1145/2699904},
  doi          = {10.1145/2699904},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/RuppBHP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/SerraJPRS15,
  author       = {Edoardo Serra and
                  Sushil Jajodia and
                  Andrea Pugliese and
                  Antonino Rullo and
                  V. S. Subrahmanian},
  title        = {Pareto-Optimal Adversarial Defense of Enterprise Systems},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {17},
  number       = {3},
  pages        = {11:1--11:39},
  year         = {2015},
  url          = {https://doi.org/10.1145/2699907},
  doi          = {10.1145/2699907},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/SerraJPRS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/TanKYK15,
  author       = {Rui Tan and
                  Varun Badrinath Krishna and
                  David K. Y. Yau and
                  Zbigniew T. Kalbarczyk},
  title        = {Integrity Attacks on Real-Time Pricing in Electric Power Grids},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {18},
  number       = {2},
  pages        = {5:1--5:33},
  year         = {2015},
  url          = {https://doi.org/10.1145/2790298},
  doi          = {10.1145/2790298},
  timestamp    = {Fri, 12 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/TanKYK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ZhaoAH15,
  author       = {Ziming Zhao and
                  Gail{-}Joon Ahn and
                  Hongxin Hu},
  title        = {Picture Gesture Authentication: Empirical Analysis, Automated Attacks,
                  and Scheme Evaluation},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {17},
  number       = {4},
  pages        = {14:1--14:37},
  year         = {2015},
  url          = {https://doi.org/10.1145/2701423},
  doi          = {10.1145/2701423},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/ZhaoAH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/AllodiM14,
  author       = {Luca Allodi and
                  Fabio Massacci},
  title        = {Comparing Vulnerability Severity and Exploits Using Case-Control Studies},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {17},
  number       = {1},
  pages        = {1:1--1:20},
  year         = {2014},
  url          = {https://doi.org/10.1145/2630069},
  doi          = {10.1145/2630069},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/AllodiM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ArkoudasCC14,
  author       = {Konstantine Arkoudas and
                  Ritu Chadha and
                  C. Jason Chiang},
  title        = {Sophisticated Access Control via {SMT} and Logical Frameworks},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {16},
  number       = {4},
  pages        = {17},
  year         = {2014},
  url          = {https://doi.org/10.1145/2595222},
  doi          = {10.1145/2595222},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/ArkoudasCC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BasinC14,
  author       = {David A. Basin and
                  Cas Cremers},
  title        = {Know Your Enemy: Compromising Adversaries in Protocol Analysis},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {17},
  number       = {2},
  pages        = {7:1--7:31},
  year         = {2014},
  url          = {https://doi.org/10.1145/2658996},
  doi          = {10.1145/2658996},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/BasinC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BilgeSBKK14,
  author       = {Leyla Bilge and
                  Sevil Sen and
                  Davide Balzarotti and
                  Engin Kirda and
                  Christopher Kruegel},
  title        = {Exposure: {A} Passive {DNS} Analysis Service to Detect and Report
                  Malicious Domains},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {16},
  number       = {4},
  pages        = {14},
  year         = {2014},
  url          = {https://doi.org/10.1145/2584679},
  doi          = {10.1145/2584679},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/BilgeSBKK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ChapinS14,
  author       = {Peter C. Chapin and
                  Christian Skalka},
  title        = {SpartanRPC: Remote Procedure Call Authorization in Wireless Sensor
                  Networks},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {17},
  number       = {2},
  pages        = {5:1--5:30},
  year         = {2014},
  url          = {https://doi.org/10.1145/2644809},
  doi          = {10.1145/2644809},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/ChapinS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ChenLY14,
  author       = {Liqun Chen and
                  Hoon Wei Lim and
                  Guomin Yang},
  title        = {Cross-Domain Password-Based Authenticated Key Exchange Revisited},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {16},
  number       = {4},
  pages        = {15},
  year         = {2014},
  url          = {https://doi.org/10.1145/2584681},
  doi          = {10.1145/2584681},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/ChenLY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ChenSDM14,
  author       = {Teh{-}Chung Chen and
                  Torin Stepan and
                  Scott Dick and
                  James Miller},
  title        = {An Anti-Phishing System Employing Diffused Information},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {16},
  number       = {4},
  pages        = {16},
  year         = {2014},
  url          = {https://doi.org/10.1145/2584680},
  doi          = {10.1145/2584680},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/ChenSDM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/GiladH14,
  author       = {Yossi Gilad and
                  Amir Herzberg},
  title        = {Off-Path {TCP} Injection Attacks},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {16},
  number       = {4},
  pages        = {13},
  year         = {2014},
  url          = {https://doi.org/10.1145/2597173},
  doi          = {10.1145/2597173},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/GiladH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/GotzfriedM14,
  author       = {Johannes G{\"{o}}tzfried and
                  Tilo M{\"{u}}ller},
  title        = {Mutual Authentication and Trust Bootstrapping towards Secure Disk
                  Encryption},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {17},
  number       = {2},
  pages        = {6:1--6:23},
  year         = {2014},
  url          = {https://doi.org/10.1145/2663348},
  doi          = {10.1145/2663348},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/GotzfriedM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/JafariSFB14,
  author       = {Mohammad Jafari and
                  Reihaneh Safavi{-}Naini and
                  Philip W. L. Fong and
                  Ken Barker},
  title        = {A Framework for Expressing and Enforcing Purpose-Based Privacy Policies},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {17},
  number       = {1},
  pages        = {3:1--3:31},
  year         = {2014},
  url          = {https://doi.org/10.1145/2629689},
  doi          = {10.1145/2629689},
  timestamp    = {Wed, 30 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/JafariSFB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/LiGR14,
  author       = {Peng Li and
                  Debin Gao and
                  Michael K. Reiter},
  title        = {StopWatch: {A} Cloud Architecture for Timing Channel Mitigation},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {17},
  number       = {2},
  pages        = {8:1--8:28},
  year         = {2014},
  url          = {https://doi.org/10.1145/2670940},
  doi          = {10.1145/2670940},
  timestamp    = {Mon, 23 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/LiGR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/MarinovicDS14,
  author       = {Srdjan Marinovic and
                  Naranker Dulay and
                  Morris Sloman},
  title        = {Rumpole: An Introspective Break-Glass Access Control Language},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {17},
  number       = {1},
  pages        = {2:1--2:32},
  year         = {2014},
  url          = {https://doi.org/10.1145/2629502},
  doi          = {10.1145/2629502},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/MarinovicDS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/SytaCWWFJ14,
  author       = {Ewa Syta and
                  Henry Corrigan{-}Gibbs and
                  Shu{-}Chun Weng and
                  David Wolinsky and
                  Bryan Ford and
                  Aaron Johnson},
  title        = {Security Analysis of Accountable Anonymity in Dissent},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {17},
  number       = {1},
  pages        = {4:1--4:35},
  year         = {2014},
  url          = {https://doi.org/10.1145/2629621},
  doi          = {10.1145/2629621},
  timestamp    = {Wed, 28 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/SytaCWWFJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/AliAKK13,
  author       = {Muhammad Qasim Ali and
                  Ehab Al{-}Shaer and
                  Hassan Khan and
                  Syed Ali Khayam},
  title        = {Automated Anomaly Detector Adaptation using Adaptive Threshold Tuning},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {15},
  number       = {4},
  pages        = {17:1--17:30},
  year         = {2013},
  url          = {https://doi.org/10.1145/2445566.2445569},
  doi          = {10.1145/2445566.2445569},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/AliAKK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BasinJKZ13,
  author       = {David A. Basin and
                  Vincent Jug{\'{e}} and
                  Felix Klaedtke and
                  Eugen Zalinescu},
  title        = {Enforceable Security Policies Revisited},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {16},
  number       = {1},
  pages        = {3},
  year         = {2013},
  url          = {https://doi.org/10.1145/2487222.2487225},
  doi          = {10.1145/2487222.2487225},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/BasinJKZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BlantonZF13,
  author       = {Marina Blanton and
                  Yihua Zhang and
                  Keith B. Frikken},
  title        = {Secure and verifiable outsourcing of large-scale biometric computations},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {16},
  number       = {3},
  pages        = {11},
  year         = {2013},
  url          = {https://doi.org/10.1145/2535523},
  doi          = {10.1145/2535523},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/BlantonZF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ChengDD13,
  author       = {Yueqiang Cheng and
                  Xuhua Ding and
                  Robert H. Deng},
  title        = {DriverGuard: Virtualization-Based Fine-Grained Protection on {I/O}
                  Flows},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {16},
  number       = {2},
  pages        = {6},
  year         = {2013},
  url          = {https://doi.org/10.1145/2516951.2505123},
  doi          = {10.1145/2516951.2505123},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/ChengDD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/CobbBL13,
  author       = {William E. Cobb and
                  Rusty O. Baldwin and
                  Eric D. Laspe},
  title        = {Leakage Mapping: {A} Systematic Methodology for Assessing the Side-Channel
                  Information Leakage of Cryptographic Implementations},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {16},
  number       = {1},
  pages        = {2},
  year         = {2013},
  url          = {https://doi.org/10.1145/2487222.2487224},
  doi          = {10.1145/2487222.2487224},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/CobbBL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/CramptonGY13,
  author       = {Jason Crampton and
                  Gregory Z. Gutin and
                  Anders Yeo},
  title        = {On the Parameterized Complexity and Kernelization of the Workflow
                  Satisfiability Problem},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {16},
  number       = {1},
  pages        = {4},
  year         = {2013},
  url          = {https://doi.org/10.1145/2487222.2487226},
  doi          = {10.1145/2487222.2487226},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/CramptonGY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/DriessenHWPH13,
  author       = {Benedikt Driessen and
                  Ralf Hund and
                  Carsten Willems and
                  Christof Paar and
                  Thorsten Holz},
  title        = {An experimental security analysis of two satphone standards},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {16},
  number       = {3},
  pages        = {10},
  year         = {2013},
  url          = {https://doi.org/10.1145/2535522},
  doi          = {10.1145/2535522},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/DriessenHWPH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/FrankBB13,
  author       = {Mario Frank and
                  Joachim M. Buhmann and
                  David A. Basin},
  title        = {Role Mining with Probabilistic Models},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {15},
  number       = {4},
  pages        = {15:1--15:28},
  year         = {2013},
  url          = {https://doi.org/10.1145/2445566.2445567},
  doi          = {10.1145/2445566.2445567},
  timestamp    = {Mon, 29 Mar 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/FrankBB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/FuL13,
  author       = {Yangchun Fu and
                  Zhiqiang Lin},
  title        = {Bridging the Semantic Gap in Virtual Machine Introspection via Online
                  Kernel Data Redirection},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {16},
  number       = {2},
  pages        = {7},
  year         = {2013},
  url          = {https://doi.org/10.1145/2516951.2505124},
  doi          = {10.1145/2516951.2505124},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/FuL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/GiladH13,
  author       = {Yossi Gilad and
                  Amir Herzberg},
  title        = {Fragmentation Considered Vulnerable},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {15},
  number       = {4},
  pages        = {16:1--16:31},
  year         = {2013},
  url          = {https://doi.org/10.1145/2445566.2445568},
  doi          = {10.1145/2445566.2445568},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/GiladH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/JayaramanTGRC13,
  author       = {Karthick Jayaraman and
                  Mahesh V. Tripunitara and
                  Vijay Ganesh and
                  Martin C. Rinard and
                  Steve J. Chapin},
  title        = {Mohawk: Abstraction-Refinement and Bound-Estimation for Verifying
                  Access Control Policies},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {15},
  number       = {4},
  pages        = {18:1--18:28},
  year         = {2013},
  url          = {https://doi.org/10.1145/2445566.2445570},
  doi          = {10.1145/2445566.2445570},
  timestamp    = {Thu, 27 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/JayaramanTGRC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/LeonardHS13,
  author       = {Thomas Leonard and
                  Martin Hall{-}May and
                  Mike Surridge},
  title        = {Modelling Access Propagation in Dynamic Systems},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {16},
  number       = {2},
  pages        = {5},
  year         = {2013},
  url          = {https://doi.org/10.1145/2516951.2516952},
  doi          = {10.1145/2516951.2516952},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/LeonardHS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/PhilippaertsYMPLW13,
  author       = {Pieter Philippaerts and
                  Yves Younan and
                  Stijn Muylle and
                  Frank Piessens and
                  Sven Lachmund and
                  Thomas Walter},
  title        = {{CPM:} Masking Code Pointers to Prevent Code Injection Attacks},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {16},
  number       = {1},
  pages        = {1},
  year         = {2013},
  url          = {https://doi.org/10.1145/2487222.2487223},
  doi          = {10.1145/2487222.2487223},
  timestamp    = {Mon, 13 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/PhilippaertsYMPLW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/SerwaddaP13,
  author       = {Abdul Serwadda and
                  Vir V. Phoha},
  title        = {Examining a Large Keystroke Biometrics Dataset for Statistical-Attack
                  Openings},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {16},
  number       = {2},
  pages        = {8},
  year         = {2013},
  url          = {https://doi.org/10.1145/2516951.2516960},
  doi          = {10.1145/2516951.2516960},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/SerwaddaP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/SunTS0M13,
  author       = {Mengtao Sun and
                  Gang Tan and
                  Joseph Siefers and
                  Bin Zeng and
                  Greg Morrisett},
  title        = {Bringing java's wild native world under control},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {16},
  number       = {3},
  pages        = {9},
  year         = {2013},
  url          = {https://doi.org/10.1145/2535505},
  doi          = {10.1145/2535505},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/SunTS0M13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/WilliamsS13,
  author       = {Peter Williams and
                  Radu Sion},
  title        = {Access privacy and correctness on untrusted storage},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {16},
  number       = {3},
  pages        = {12},
  year         = {2013},
  url          = {https://doi.org/10.1145/2535524},
  doi          = {10.1145/2535524},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/WilliamsS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/AbadiP12,
  author       = {Mart{\'{\i}}n Abadi and
                  Gordon D. Plotkin},
  title        = {On Protection by Layout Randomization},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {15},
  number       = {2},
  pages        = {8:1--8:29},
  year         = {2012},
  url          = {https://doi.org/10.1145/2240276.2240279},
  doi          = {10.1145/2240276.2240279},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/AbadiP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BasinBK12,
  author       = {David A. Basin and
                  Samuel J. Burri and
                  G{\"{u}}nter Karjoth},
  title        = {Dynamic enforcement of abstract separation of duty constraints},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {15},
  number       = {3},
  pages        = {13:1--13:30},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382448.2382451},
  doi          = {10.1145/2382448.2382451},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/BasinBK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BhargavanFCZ12,
  author       = {Karthikeyan Bhargavan and
                  C{\'{e}}dric Fournet and
                  Ricardo Corin and
                  Eugen Zalinescu},
  title        = {Verified Cryptographic Implementations for {TLS}},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {15},
  number       = {1},
  pages        = {3:1--3:32},
  year         = {2012},
  url          = {https://doi.org/10.1145/2133375.2133378},
  doi          = {10.1145/2133375.2133378},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/BhargavanFCZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BrennanAG12,
  author       = {Michael Brennan and
                  Sadia Afroz and
                  Rachel Greenstadt},
  title        = {Adversarial stylometry: Circumventing authorship recognition to preserve
                  privacy and anonymity},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {15},
  number       = {3},
  pages        = {12:1--12:22},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382448.2382450},
  doi          = {10.1145/2382448.2382450},
  timestamp    = {Wed, 28 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/BrennanAG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/CamenischG12,
  author       = {Jan Camenisch and
                  Thomas Gro{\ss}},
  title        = {Efficient Attributes for Anonymous Credentials},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {15},
  number       = {1},
  pages        = {4:1--4:30},
  year         = {2012},
  url          = {https://doi.org/10.1145/2133375.2133379},
  doi          = {10.1145/2133375.2133379},
  timestamp    = {Tue, 12 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/CamenischG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/DanevCMB12,
  author       = {Boris Danev and
                  Srdjan Capkun and
                  Ramya Jayaram Masti and
                  Thomas S. Benjamin},
  title        = {Towards Practical Identification of {HF} {RFID} Devices},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {15},
  number       = {2},
  pages        = {7:1--7:24},
  year         = {2012},
  url          = {https://doi.org/10.1145/2240276.2240278},
  doi          = {10.1145/2240276.2240278},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/DanevCMB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/DannerDKL12,
  author       = {Norman Danner and
                  Sam DeFabbia{-}Kane and
                  Danny Krizanc and
                  Marc Liberatore},
  title        = {Effectiveness and detection of denial-of-service attacks in tor},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {15},
  number       = {3},
  pages        = {11:1--11:25},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382448.2382449},
  doi          = {10.1145/2382448.2382449},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/DannerDKL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/FeigenbaumJS12,
  author       = {Joan Feigenbaum and
                  Aaron Johnson and
                  Paul F. Syverson},
  title        = {Probabilistic analysis of onion routing in a black-box model},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {15},
  number       = {3},
  pages        = {14:1--14:28},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382448.2382452},
  doi          = {10.1145/2382448.2382452},
  timestamp    = {Wed, 28 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/FeigenbaumJS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/GiladH12,
  author       = {Yossi Gilad and
                  Amir Herzberg},
  title        = {{LOT:} {A} Defense Against {IP} Spoofing and Flooding Attacks},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {15},
  number       = {2},
  pages        = {6:1--6:30},
  year         = {2012},
  url          = {https://doi.org/10.1145/2240276.2240277},
  doi          = {10.1145/2240276.2240277},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/GiladH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/KhouryT12,
  author       = {Rapha{\"{e}}l Khoury and
                  Nadia Tawbi},
  title        = {Corrective Enforcement: {A} New Paradigm of Security Policy Enforcement
                  by Monitors},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {15},
  number       = {2},
  pages        = {10:1--10:27},
  year         = {2012},
  url          = {https://doi.org/10.1145/2240276.2240281},
  doi          = {10.1145/2240276.2240281},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/KhouryT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/MittalB12,
  author       = {Prateek Mittal and
                  Nikita Borisov},
  title        = {Information Leaks in Structured Peer-to-Peer Anonymous Communication
                  Systems},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {15},
  number       = {1},
  pages        = {5:1--5:28},
  year         = {2012},
  url          = {https://doi.org/10.1145/2133375.2133380},
  doi          = {10.1145/2133375.2133380},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/MittalB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/RoemerBSS12,
  author       = {Ryan Roemer and
                  Erik Buchanan and
                  Hovav Shacham and
                  Stefan Savage},
  title        = {Return-Oriented Programming: Systems, Languages, and Applications},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {15},
  number       = {1},
  pages        = {2:1--2:34},
  year         = {2012},
  url          = {https://doi.org/10.1145/2133375.2133377},
  doi          = {10.1145/2133375.2133377},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/RoemerBSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/SyversonJ12,
  author       = {Paul F. Syverson and
                  Somesh Jha},
  title        = {Guest Editorial: Special Issue on Computer and Communications Security},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {15},
  number       = {1},
  pages        = {1:1--1:2},
  year         = {2012},
  url          = {https://doi.org/10.1145/2133375.2133376},
  doi          = {10.1145/2133375.2133376},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/SyversonJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/YavuzNR12,
  author       = {Attila Altay Yavuz and
                  Peng Ning and
                  Michael K. Reiter},
  title        = {{BAF} and {FI-BAF:} Efficient and Publicly Verifiable Cryptographic
                  Schemes for Secure Logging in Resource-Constrained Systems},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {15},
  number       = {2},
  pages        = {9:1--9:28},
  year         = {2012},
  url          = {https://doi.org/10.1145/2240276.2240280},
  doi          = {10.1145/2240276.2240280},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/YavuzNR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/Appel11,
  author       = {Andrew W. Appel},
  title        = {Security Seals on Voting Machines: {A} Case Study},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {14},
  number       = {2},
  pages        = {18:1--18:29},
  year         = {2011},
  url          = {https://doi.org/10.1145/2019599.2019603},
  doi          = {10.1145/2019599.2019603},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/Appel11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/AtenieseBCHKKPS11,
  author       = {Giuseppe Ateniese and
                  Randal C. Burns and
                  Reza Curtmola and
                  Joseph Herring and
                  Osama Khan and
                  Lea Kissner and
                  Zachary N. J. Peterson and
                  Dawn Song},
  title        = {Remote data checking using provable data possession},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {14},
  number       = {1},
  pages        = {12:1--12:34},
  year         = {2011},
  url          = {https://doi.org/10.1145/1952982.1952994},
  doi          = {10.1145/1952982.1952994},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/AtenieseBCHKKPS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/AuTK11,
  author       = {Man Ho Au and
                  Patrick P. Tsang and
                  Apu Kapadia},
  title        = {{PEREA:} Practical TTP-free revocation of repeatedly misbehaving anonymous
                  users},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {14},
  number       = {4},
  pages        = {29:1--29:34},
  year         = {2011},
  url          = {https://doi.org/10.1145/2043628.2043630},
  doi          = {10.1145/2043628.2043630},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/AuTK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BasinCSS11,
  author       = {David A. Basin and
                  Srdjan Capkun and
                  Patrick Schaller and
                  Benedikt Schmidt},
  title        = {Formal Reasoning about Physical Properties of Security Protocols},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {14},
  number       = {2},
  pages        = {16:1--16:28},
  year         = {2011},
  url          = {https://doi.org/10.1145/2019599.2019601},
  doi          = {10.1145/2019599.2019601},
  timestamp    = {Tue, 08 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/BasinCSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BauerGR11,
  author       = {Lujo Bauer and
                  Scott Garriss and
                  Michael K. Reiter},
  title        = {Detecting and resolving policy misconfigurations in access-control
                  systems},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {14},
  number       = {1},
  pages        = {2:1--2:28},
  year         = {2011},
  url          = {https://doi.org/10.1145/1952982.1952984},
  doi          = {10.1145/1952982.1952984},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/BauerGR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BetheaCR11,
  author       = {Darrell Bethea and
                  Robert A. Cochran and
                  Michael K. Reiter},
  title        = {Server-side verification of client behavior in online games},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {14},
  number       = {4},
  pages        = {32:1--32:27},
  year         = {2011},
  url          = {https://doi.org/10.1145/2043628.2043633},
  doi          = {10.1145/2043628.2043633},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/BetheaCR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BohliP11,
  author       = {Jens{-}Matthias Bohli and
                  Andreas Pashalidis},
  title        = {Relations among privacy notions},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {14},
  number       = {1},
  pages        = {4:1--4:24},
  year         = {2011},
  url          = {https://doi.org/10.1145/1952982.1952986},
  doi          = {10.1145/1952982.1952986},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/BohliP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BrunsH11,
  author       = {Glenn Bruns and
                  Michael Huth},
  title        = {Access control via belnap logic: Intuitive, expressive, and analyzable
                  policy composition},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {14},
  number       = {1},
  pages        = {9:1--9:27},
  year         = {2011},
  url          = {https://doi.org/10.1145/1952982.1952991},
  doi          = {10.1145/1952982.1952991},
  timestamp    = {Mon, 11 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/BrunsH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BurkhartD11,
  author       = {Martin Burkhart and
                  Xenofontas A. Dimitropoulos},
  title        = {Privacy-preserving distributed network troubleshooting - bridging
                  the gap between theory and practice},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {14},
  number       = {4},
  pages        = {31:1--31:30},
  year         = {2011},
  url          = {https://doi.org/10.1145/2043628.2043632},
  doi          = {10.1145/2043628.2043632},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/BurkhartD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BurmesterM11,
  author       = {Mike Burmester and
                  Jorge Munilla},
  title        = {Lightweight {RFID} authentication with forward and backward security},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {14},
  number       = {1},
  pages        = {11:1--11:26},
  year         = {2011},
  url          = {https://doi.org/10.1145/1952982.1952993},
  doi          = {10.1145/1952982.1952993},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/BurmesterM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/Chan-TinHHK11,
  author       = {Eric Chan{-}Tin and
                  Victor Heorhiadi and
                  Nicholas Hopper and
                  Yongdae Kim},
  title        = {The Frog-Boiling Attack: Limitations of Secure Network Coordinate
                  Systems},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {14},
  number       = {3},
  pages        = {27:1--27:23},
  year         = {2011},
  url          = {https://doi.org/10.1145/2043621.2043627},
  doi          = {10.1145/2043621.2043627},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/Chan-TinHHK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ChanSS11,
  author       = {T.{-}H. Hubert Chan and
                  Elaine Shi and
                  Dawn Song},
  title        = {Private and Continual Release of Statistics},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {14},
  number       = {3},
  pages        = {26:1--26:24},
  year         = {2011},
  url          = {https://doi.org/10.1145/2043621.2043626},
  doi          = {10.1145/2043621.2043626},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/ChanSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/CoullGH11,
  author       = {Scott E. Coull and
                  Matthew Green and
                  Susan Hohenberger},
  title        = {Access controls for oblivious and anonymous systems},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {14},
  number       = {1},
  pages        = {10:1--10:28},
  year         = {2011},
  url          = {https://doi.org/10.1145/1952982.1952992},
  doi          = {10.1145/1952982.1952992},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/CoullGH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/Crampton11,
  author       = {Jason Crampton},
  title        = {Practical and efficient cryptographic enforcement of interval-based
                  access control policies},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {14},
  number       = {1},
  pages        = {14:1--14:30},
  year         = {2011},
  url          = {https://doi.org/10.1145/1952982.1952996},
  doi          = {10.1145/1952982.1952996},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/Crampton11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/CrosbyW11,
  author       = {Scott A. Crosby and
                  Dan S. Wallach},
  title        = {Authenticated Dictionaries: Real-World Costs and Trade-Offs},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {14},
  number       = {2},
  pages        = {17:1--17:30},
  year         = {2011},
  url          = {https://doi.org/10.1145/2019599.2019602},
  doi          = {10.1145/2019599.2019602},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/CrosbyW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/Demsky11,
  author       = {Brian Demsky},
  title        = {Cross-application data provenance and policy enforcement},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {14},
  number       = {1},
  pages        = {6:1--6:22},
  year         = {2011},
  url          = {https://doi.org/10.1145/1952982.1952988},
  doi          = {10.1145/1952982.1952988},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/Demsky11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/DongCN11,
  author       = {Jing Dong and
                  Reza Curtmola and
                  Cristina Nita{-}Rotaru},
  title        = {Practical defenses against pollution attacks in wireless network coding},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {14},
  number       = {1},
  pages        = {7:1--7:31},
  year         = {2011},
  url          = {https://doi.org/10.1145/1952982.1952989},
  doi          = {10.1145/1952982.1952989},
  timestamp    = {Thu, 06 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/DongCN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/GorantlaBNM11,
  author       = {M. Choudary Gorantla and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto and
                  Mark Manulis},
  title        = {Modeling key compromise impersonation attacks on group key exchange
                  protocols},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {14},
  number       = {4},
  pages        = {28:1--28:24},
  year         = {2011},
  url          = {https://doi.org/10.1145/2043628.2043629},
  doi          = {10.1145/2043628.2043629},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/GorantlaBNM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/JoshiC11,
  author       = {James Joshi and
                  Barbara Carminati},
  title        = {Guest Editorial {SACMAT} 2009 and 2010},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {14},
  number       = {3},
  pages        = {22:1--22:2},
  year         = {2011},
  url          = {https://doi.org/10.1145/2043621.2043622},
  doi          = {10.1145/2043621.2043622},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/JoshiC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/KrishnanNSW11,
  author       = {Ram Krishnan and
                  Jianwei Niu and
                  Ravi S. Sandhu and
                  William H. Winsborough},
  title        = {Group-Centric Secure Information-Sharing Models for Isolated Groups},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {14},
  number       = {3},
  pages        = {23:1--23:29},
  year         = {2011},
  url          = {https://doi.org/10.1145/2043621.2043623},
  doi          = {10.1145/2043621.2043623},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/KrishnanNSW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/LeightonB11,
  author       = {Gregory Leighton and
                  Denilson Barbosa},
  title        = {Access Control Policy Translation, Verification, and Minimization
                  within Heterogeneous Data Federations},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {14},
  number       = {3},
  pages        = {25:1--25:28},
  year         = {2011},
  url          = {https://doi.org/10.1145/2043621.2043625},
  doi          = {10.1145/2043621.2043625},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/LeightonB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/Li11,
  author       = {Ninghui Li},
  title        = {Introduction to special section SACMAT'08},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {14},
  number       = {1},
  pages        = {1:1},
  year         = {2011},
  url          = {https://doi.org/10.1145/1952982.1952983},
  doi          = {10.1145/1952982.1952983},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/Li11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/LiDLM11,
  author       = {Yingjiu Li and
                  Robert H. Deng and
                  Junzuo Lai and
                  Changshe Ma},
  title        = {On two {RFID} privacy notions and their relations},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {14},
  number       = {4},
  pages        = {30:1--30:23},
  year         = {2011},
  url          = {https://doi.org/10.1145/2043628.2043631},
  doi          = {10.1145/2043628.2043631},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/LiDLM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/LiuNR11,
  author       = {Yao Liu and
                  Peng Ning and
                  Michael K. Reiter},
  title        = {False data injection attacks against state estimation in electric
                  power grids},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {14},
  number       = {1},
  pages        = {13:1--13:33},
  year         = {2011},
  url          = {https://doi.org/10.1145/1952982.1952995},
  doi          = {10.1145/1952982.1952995},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/LiuNR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/MaoLCJ11,
  author       = {Ziqing Mao and
                  Ninghui Li and
                  Hong Chen and
                  Xuxian Jiang},
  title        = {Combining Discretionary Policy with Mandatory Information Flow in
                  Operating Systems},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {14},
  number       = {3},
  pages        = {24:1--24:27},
  year         = {2011},
  url          = {https://doi.org/10.1145/2043621.2043624},
  doi          = {10.1145/2043621.2043624},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/MaoLCJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/OligeriCPG11,
  author       = {Gabriele Oligeri and
                  Stefano Chessa and
                  Roberto Di Pietro and
                  Gaetano Giunta},
  title        = {Robust and efficient authentication of video stream broadcasting},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {14},
  number       = {1},
  pages        = {5:1--5:25},
  year         = {2011},
  url          = {https://doi.org/10.1145/1952982.1952987},
  doi          = {10.1145/1952982.1952987},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/OligeriCPG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/SchneiderWS11,
  author       = {Fred B. Schneider and
                  Kevin Walsh and
                  Emin G{\"{u}}n Sirer},
  title        = {Nexus authorization logic {(NAL):} Design rationale and applications},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {14},
  number       = {1},
  pages        = {8:1--8:28},
  year         = {2011},
  url          = {https://doi.org/10.1145/1952982.1952990},
  doi          = {10.1145/1952982.1952990},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/SchneiderWS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/SchreudersMP11,
  author       = {Z. Cliffe Schreuders and
                  Tanya Jane McGill and
                  Christian Payne},
  title        = {Empowering End Users to Confine Their Own Applications: The Results
                  of a Usability Study Comparing SELinux, AppArmor, and {FBAC-LSM}},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {14},
  number       = {2},
  pages        = {19:1--19:28},
  year         = {2011},
  url          = {https://doi.org/10.1145/2019599.2019604},
  doi          = {10.1145/2019599.2019604},
  timestamp    = {Mon, 05 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/SchreudersMP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/WangWGZ11,
  author       = {Tielei Wang and
                  Tao Wei and
                  Guofei Gu and
                  Wei Zou},
  title        = {Checksum-Aware Fuzzing Combined with Dynamic Taint Analysis and Symbolic
                  Execution},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {14},
  number       = {2},
  pages        = {15:1--15:28},
  year         = {2011},
  url          = {https://doi.org/10.1145/2019599.2019600},
  doi          = {10.1145/2019599.2019600},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/WangWGZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/WeiCBR11,
  author       = {Qiang Wei and
                  Jason Crampton and
                  Konstantin Beznosov and
                  Matei Ripeanu},
  title        = {Authorization recycling in hierarchical {RBAC} systems},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {14},
  number       = {1},
  pages        = {3:1--3:29},
  year         = {2011},
  url          = {https://doi.org/10.1145/1952982.1952985},
  doi          = {10.1145/1952982.1952985},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/WeiCBR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/WilliamsSS11,
  author       = {Peter Williams and
                  Radu Sion and
                  Miroslava Sot{\'{a}}kov{\'{a}}},
  title        = {Practical Oblivious Outsourced Storage},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {14},
  number       = {2},
  pages        = {20:1--20:28},
  year         = {2011},
  url          = {https://doi.org/10.1145/2019599.2019605},
  doi          = {10.1145/2019599.2019605},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/WilliamsSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/XiangHRC11,
  author       = {Guang Xiang and
                  Jason I. Hong and
                  Carolyn P. Ros{\'{e}} and
                  Lorrie Faith Cranor},
  title        = {{CANTINA+:} {A} Feature-Rich Machine Learning Framework for Detecting
                  Phishing Web Sites},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {14},
  number       = {2},
  pages        = {21:1--21:28},
  year         = {2011},
  url          = {https://doi.org/10.1145/2019599.2019606},
  doi          = {10.1145/2019599.2019606},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/XiangHRC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BartheRRS10,
  author       = {Gilles Barthe and
                  Tamara Rezk and
                  Alejandro Russo and
                  Andrei Sabelfeld},
  title        = {Security of multithreaded programs by compilation},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {3},
  pages        = {21:1--21:32},
  year         = {2010},
  url          = {https://doi.org/10.1145/1805974.1895977},
  doi          = {10.1145/1805974.1895977},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/BartheRRS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BeckerN10,
  author       = {Moritz Y. Becker and
                  Sebastian Nanz},
  title        = {A logic for state-modifying authorization policies},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {3},
  pages        = {20:1--20:28},
  year         = {2010},
  url          = {https://doi.org/10.1145/1805974.1805976},
  doi          = {10.1145/1805974.1805976},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/BeckerN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BishtMV10,
  author       = {Prithvi Bisht and
                  Parthasarathy Madhusudan and
                  V. N. Venkatakrishnan},
  title        = {{CANDID:} Dynamic candidate evaluations for automatic prevention of
                  {SQL} injection attacks},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {2},
  pages        = {14:1--14:39},
  year         = {2010},
  url          = {https://doi.org/10.1145/1698750.1698754},
  doi          = {10.1145/1698750.1698754},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/BishtMV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BiskupL10,
  author       = {Joachim Biskup and
                  Javier L{\'{o}}pez},
  title        = {Editorial {ESORICS} 2007},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {3},
  pages        = {19:1--19:2},
  year         = {2010},
  url          = {https://doi.org/10.1145/1805974.1805975},
  doi          = {10.1145/1805974.1805975},
  timestamp    = {Thu, 29 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/BiskupL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BobbaFKKGKP10,
  author       = {Rakeshbabu Bobba and
                  Omid Fatemieh and
                  Fariba Khan and
                  Arindam Khan and
                  Carl A. Gunter and
                  Himanshu Khurana and
                  Manoj Prabhakaran},
  title        = {Attribute-Based Messaging: Access Control and Confidentiality},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {4},
  pages        = {31:1--31:35},
  year         = {2010},
  url          = {https://doi.org/10.1145/1880022.1880025},
  doi          = {10.1145/1880022.1880025},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/BobbaFKKGKP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/CarminatiFCT10,
  author       = {Barbara Carminati and
                  Elena Ferrari and
                  Jianneng Cao and
                  Kian{-}Lee Tan},
  title        = {A framework to enforce access control over data streams},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {3},
  pages        = {28:1--28:31},
  year         = {2010},
  url          = {https://doi.org/10.1145/1805974.1805984},
  doi          = {10.1145/1805974.1805984},
  timestamp    = {Tue, 12 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/CarminatiFCT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/CirianiVFJPS10,
  author       = {Valentina Ciriani and
                  Sabrina De Capitani di Vimercati and
                  Sara Foresti and
                  Sushil Jajodia and
                  Stefano Paraboschi and
                  Pierangela Samarati},
  title        = {Combining fragmentation and encryption to protect privacy in data
                  storage},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {3},
  pages        = {22:1--22:33},
  year         = {2010},
  url          = {https://doi.org/10.1145/1805974.1805978},
  doi          = {10.1145/1805974.1805978},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/CirianiVFJPS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/HicksRCJM10,
  author       = {Boniface Hicks and
                  Sandra Julieta Rueda and
                  Luke St. Clair and
                  Trent Jaeger and
                  Patrick D. McDaniel},
  title        = {A logical specification and analysis for SELinux {MLS} policy},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {3},
  pages        = {26:1--26:31},
  year         = {2010},
  url          = {https://doi.org/10.1145/1805974.1805982},
  doi          = {10.1145/1805974.1805982},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/HicksRCJM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/HopperVC10,
  author       = {Nicholas Hopper and
                  Eugene Y. Vasserman and
                  Eric Chan{-}Tin},
  title        = {How much anonymity does network latency leak?},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {2},
  pages        = {13:1--13:28},
  year         = {2010},
  url          = {https://doi.org/10.1145/1698750.1698753},
  doi          = {10.1145/1698750.1698753},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/HopperVC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/JiangWX10,
  author       = {Xuxian Jiang and
                  Xinyuan Wang and
                  Dongyan Xu},
  title        = {Stealthy malware detection and monitoring through VMM-based "out-of-the-box"
                  semantic view reconstruction},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {2},
  pages        = {12:1--12:28},
  year         = {2010},
  url          = {https://doi.org/10.1145/1698750.1698752},
  doi          = {10.1145/1698750.1698752},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/JiangWX10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/KateZG10,
  author       = {Aniket Kate and
                  Gregory M. Zaverucha and
                  Ian Goldberg},
  title        = {Pairing-Based Onion Routing with Improved Forward Secrecy},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {4},
  pages        = {29:1--29:32},
  year         = {2010},
  url          = {https://doi.org/10.1145/1880022.1880023},
  doi          = {10.1145/1880022.1880023},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/KateZG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/LeeMW10,
  author       = {Adam J. Lee and
                  Kazuhiro Minami and
                  Marianne Winslett},
  title        = {On the consistency of distributed proofs with hidden subtrees},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {3},
  pages        = {25:1--25:32},
  year         = {2010},
  url          = {https://doi.org/10.1145/1805974.1805981},
  doi          = {10.1145/1805974.1805981},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/LeeMW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/LiHKR10,
  author       = {Feifei Li and
                  Marios Hadjieleftheriou and
                  George Kollios and
                  Leonid Reyzin},
  title        = {Authenticated Index Structures for Aggregation Queries},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {4},
  pages        = {32:1--32:35},
  year         = {2010},
  url          = {https://doi.org/10.1145/1880022.1880026},
  doi          = {10.1145/1880022.1880026},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/LiHKR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/LibertQY10,
  author       = {Beno{\^{\i}}t Libert and
                  Jean{-}Jacques Quisquater and
                  Moti Yung},
  title        = {Key Evolution Systems in Untrusted Update Environments},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {4},
  pages        = {37:1--37:34},
  year         = {2010},
  url          = {https://doi.org/10.1145/1880022.1880031},
  doi          = {10.1145/1880022.1880031},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/LibertQY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/LysyanskayaTT10,
  author       = {Anna Lysyanskaya and
                  Roberto Tamassia and
                  Nikos Triandopoulos},
  title        = {Authenticated error-correcting codes with applications to multicast
                  authentication},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {2},
  pages        = {17:1--17:34},
  year         = {2010},
  url          = {https://doi.org/10.1145/1698750.1698757},
  doi          = {10.1145/1698750.1698757},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/LysyanskayaTT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/MolloyCLWLBCL10,
  author       = {Ian M. Molloy and
                  Hong Chen and
                  Tiancheng Li and
                  Qihua Wang and
                  Ninghui Li and
                  Elisa Bertino and
                  Seraphin B. Calo and
                  Jorge Lobo},
  title        = {Mining Roles with Multiple Objectives},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {4},
  pages        = {36:1--36:35},
  year         = {2010},
  url          = {https://doi.org/10.1145/1880022.1880030},
  doi          = {10.1145/1880022.1880030},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/MolloyCLWLBCL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/MoranN10,
  author       = {Tal Moran and
                  Moni Naor},
  title        = {Split-ballot voting: Everlasting privacy with distributed trust},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {2},
  pages        = {16:1--16:43},
  year         = {2010},
  url          = {https://doi.org/10.1145/1698750.1698756},
  doi          = {10.1145/1698750.1698756},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/MoranN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/MukhamedovR10,
  author       = {Aybek Mukhamedov and
                  Mark Dermot Ryan},
  title        = {Identity Escrow Protocol and Anonymity Analysis in the Applied Pi-Calculus},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {4},
  pages        = {41:1--41:29},
  year         = {2010},
  url          = {https://doi.org/10.1145/1880022.1880035},
  doi          = {10.1145/1880022.1880035},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/MukhamedovR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/NiBLBKKT10,
  author       = {Qun Ni and
                  Elisa Bertino and
                  Jorge Lobo and
                  Carolyn Brodie and
                  Clare{-}Marie Karat and
                  John Karat and
                  Alberto Trombetta},
  title        = {Privacy-aware role-based access control},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {3},
  pages        = {24:1--24:31},
  year         = {2010},
  url          = {https://doi.org/10.1145/1805974.1805980},
  doi          = {10.1145/1805974.1805980},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/NiBLBKKT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/PenningtonGBSG10,
  author       = {Adam G. Pennington and
                  John Linwood Griffin and
                  John S. Bucy and
                  John D. Strunk and
                  Gregory R. Ganger},
  title        = {Storage-Based Intrusion Detection},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {4},
  pages        = {30:1--30:27},
  year         = {2010},
  url          = {https://doi.org/10.1145/1880022.1880024},
  doi          = {10.1145/1880022.1880024},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/PenningtonGBSG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/PonecGWB10,
  author       = {Miroslav Ponec and
                  Paul Giura and
                  Joel Wein and
                  Herv{\'{e}} Br{\"{o}}nnimann},
  title        = {New payload attribution methods for network forensic investigations},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {2},
  pages        = {15:1--15:32},
  year         = {2010},
  url          = {https://doi.org/10.1145/1698750.1698755},
  doi          = {10.1145/1698750.1698755},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/PonecGWB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/Sarkar10,
  author       = {Palash Sarkar},
  title        = {A Simple and Generic Construction of Authenticated Encryption with
                  Associated Data},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {4},
  pages        = {33:1--33:16},
  year         = {2010},
  url          = {https://doi.org/10.1145/1880022.1880027},
  doi          = {10.1145/1880022.1880027},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/Sarkar10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/SchultzLL10,
  author       = {David A. Schultz and
                  Barbara Liskov and
                  Moses D. Liskov},
  title        = {{MPSS:} Mobile Proactive Secret Sharing},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {4},
  pages        = {34:1--34:32},
  year         = {2010},
  url          = {https://doi.org/10.1145/1880022.1880028},
  doi          = {10.1145/1880022.1880028},
  timestamp    = {Fri, 25 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/SchultzLL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/Thuraisingham10,
  author       = {Bhavani Thuraisingham},
  title        = {Editorial {SACMAT} 2007},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {3},
  pages        = {23:1--23:2},
  year         = {2010},
  url          = {https://doi.org/10.1145/1805974.1805979},
  doi          = {10.1145/1805974.1805979},
  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/Thuraisingham10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/TsangAKS10,
  author       = {Patrick P. Tsang and
                  Man Ho Au and
                  Apu Kapadia and
                  Sean W. Smith},
  title        = {{BLAC:} Revoking Repeatedly Misbehaving Anonymous Users without Relying
                  on TTPs},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {4},
  pages        = {39:1--39:33},
  year         = {2010},
  url          = {https://doi.org/10.1145/1880022.1880033},
  doi          = {10.1145/1880022.1880033},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/TsangAKS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/VaidyaAG10,
  author       = {Jaideep Vaidya and
                  Vijayalakshmi Atluri and
                  Qi Guo},
  title        = {The role mining problem: {A} formal perspective},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {3},
  pages        = {27:1--27:31},
  year         = {2010},
  url          = {https://doi.org/10.1145/1805974.1895983},
  doi          = {10.1145/1805974.1895983},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/VaidyaAG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/VimercatiS10,
  author       = {Sabrina De Capitani di Vimercati and
                  Paul F. Syverson},
  title        = {Guest editorial: Special issue on computer and communications security},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {2},
  pages        = {11:1--11:2},
  year         = {2010},
  url          = {https://doi.org/10.1145/1698750.1698751},
  doi          = {10.1145/1698750.1698751},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/VimercatiS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/WangGJT10,
  author       = {XiaoFeng Wang and
                  Philippe Golle and
                  Markus Jakobsson and
                  Alex Tsow},
  title        = {Deterring voluntary trace disclosure in re-encryption mix-networks},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {2},
  pages        = {18:1--18:24},
  year         = {2010},
  url          = {https://doi.org/10.1145/1698750.1698758},
  doi          = {10.1145/1698750.1698758},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/WangGJT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/WangL10,
  author       = {Qihua Wang and
                  Ninghui Li},
  title        = {Satisfiability and Resiliency in Workflow Authorization Systems},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {4},
  pages        = {40:1--40:35},
  year         = {2010},
  url          = {https://doi.org/10.1145/1880022.1880034},
  doi          = {10.1145/1880022.1880034},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/WangL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/WrightBCMM10,
  author       = {Charles V. Wright and
                  Lucas Ballard and
                  Scott E. Coull and
                  Fabian Monrose and
                  Gerald M. Masson},
  title        = {Uncovering Spoken Phrases in Encrypted Voice over {IP} Conversations},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {4},
  pages        = {35:1--35:30},
  year         = {2010},
  url          = {https://doi.org/10.1145/1880022.1880029},
  doi          = {10.1145/1880022.1880029},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/WrightBCMM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ZageN10,
  author       = {David Zage and
                  Cristina Nita{-}Rotaru},
  title        = {Robust Decentralized Virtual Coordinate Systems in Adversarial Environments},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {4},
  pages        = {38:1--38:34},
  year         = {2010},
  url          = {https://doi.org/10.1145/1880022.1880032},
  doi          = {10.1145/1880022.1880032},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/ZageN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/AbadiBEL09,
  author       = {Mart{\'{\i}}n Abadi and
                  Mihai Budiu and
                  {\'{U}}lfar Erlingsson and
                  Jay Ligatti},
  title        = {Control-flow integrity principles, implementations, and applications},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {1},
  pages        = {4:1--4:40},
  year         = {2009},
  url          = {https://doi.org/10.1145/1609956.1609960},
  doi          = {10.1145/1609956.1609960},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/AbadiBEL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/AtallahBFF09,
  author       = {Mikhail J. Atallah and
                  Marina Blanton and
                  Nelly Fazio and
                  Keith B. Frikken},
  title        = {Dynamic and Efficient Key Management for Access Hierarchies},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {12},
  number       = {3},
  pages        = {18:1--18:43},
  year         = {2009},
  url          = {https://doi.org/10.1145/1455526.1455531},
  doi          = {10.1145/1455526.1455531},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/AtallahBFF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BethencourtSW09,
  author       = {John Bethencourt and
                  Dawn Xiaodong Song and
                  Brent Waters},
  title        = {New Techniques for Private Stream Searching},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {12},
  number       = {3},
  pages        = {16:1--16:32},
  year         = {2009},
  url          = {https://doi.org/10.1145/1455526.1455529},
  doi          = {10.1145/1455526.1455529},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/BethencourtSW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BurmesterLMT09,
  author       = {Mike Burmester and
                  Tri Van Le and
                  Breno de Medeiros and
                  Gene Tsudik},
  title        = {Universally Composable {RFID} Identification and Authentication Protocols},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {12},
  number       = {4},
  pages        = {21:1--21:33},
  year         = {2009},
  url          = {https://doi.org/10.1145/1513601.1513603},
  doi          = {10.1145/1513601.1513603},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/BurmesterLMT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/CabukBS09,
  author       = {Serdar Cabuk and
                  Carla E. Brodley and
                  Clay Shields},
  title        = {{IP} Covert Channel Detection},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {12},
  number       = {4},
  pages        = {22:1--22:29},
  year         = {2009},
  url          = {https://doi.org/10.1145/1513601.1513604},
  doi          = {10.1145/1513601.1513604},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/CabukBS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/CarminatiFP09,
  author       = {Barbara Carminati and
                  Elena Ferrari and
                  Andrea Perego},
  title        = {Enforcing access control in Web-based social networks},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {1},
  pages        = {6:1--6:38},
  year         = {2009},
  url          = {https://doi.org/10.1145/1609956.1609962},
  doi          = {10.1145/1609956.1609962},
  timestamp    = {Tue, 12 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/CarminatiFP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/CrosbyWR09,
  author       = {Scott A. Crosby and
                  Dan S. Wallach and
                  Rudolf H. Riedi},
  title        = {Opportunities and Limits of Remote Timing Attacks},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {12},
  number       = {3},
  pages        = {17:1--17:29},
  year         = {2009},
  url          = {https://doi.org/10.1145/1455526.1455530},
  doi          = {10.1145/1455526.1455530},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/CrosbyWR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/DorrendorfGP09,
  author       = {Leo Dorrendorf and
                  Zvi Gutterman and
                  Benny Pinkas},
  title        = {Cryptanalysis of the random number generator of the Windows operating
                  system},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {1},
  pages        = {10:1--10:32},
  year         = {2009},
  url          = {https://doi.org/10.1145/1609956.1609966},
  doi          = {10.1145/1609956.1609966},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/DorrendorfGP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/EtalleW09,
  author       = {Sandro Etalle and
                  William H. Winsborough},
  title        = {Maintaining control while delegating trust: Integrity constraints
                  in trust management},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {1},
  pages        = {5:1--5:27},
  year         = {2009},
  url          = {https://doi.org/10.1145/1609956.1609961},
  doi          = {10.1145/1609956.1609961},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/EtalleW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/JuelsW09,
  author       = {Ari Juels and
                  Stephen A. Weis},
  title        = {Defining strong privacy for {RFID}},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {1},
  pages        = {7:1--7:23},
  year         = {2009},
  url          = {https://doi.org/10.1145/1609956.1609963},
  doi          = {10.1145/1609956.1609963},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/JuelsW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/LiLW09,
  author       = {Jiangtao Li and
                  Ninghui Li and
                  William H. Winsborough},
  title        = {Automated trust negotiation using cryptographic credentials},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {1},
  pages        = {2:1--2:35},
  year         = {2009},
  url          = {https://doi.org/10.1145/1609956.1609958},
  doi          = {10.1145/1609956.1609958},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/LiLW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/LiWT09,
  author       = {Ninghui Li and
                  Qihua Wang and
                  Mahesh V. Tripunitara},
  title        = {Resiliency Policies in Access Control},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {12},
  number       = {4},
  pages        = {20:1--20:34},
  year         = {2009},
  url          = {https://doi.org/10.1145/1513601.1513602},
  doi          = {10.1145/1513601.1513602},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/LiWT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/LiangSVS09,
  author       = {Zhenkai Liang and
                  Weiqing Sun and
                  V. N. Venkatakrishnan and
                  R. Sekar},
  title        = {Alcatraz: An Isolated Environment for Experimenting with Untrusted
                  Software},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {12},
  number       = {3},
  pages        = {14:1--14:37},
  year         = {2009},
  url          = {https://doi.org/10.1145/1455526.1455527},
  doi          = {10.1145/1455526.1455527},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/LiangSVS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/LigattiBW09,
  author       = {Jay Ligatti and
                  Lujo Bauer and
                  David Walker},
  title        = {Run-Time Enforcement of Nonsafety Policies},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {12},
  number       = {3},
  pages        = {19:1--19:41},
  year         = {2009},
  url          = {https://doi.org/10.1145/1455526.1455532},
  doi          = {10.1145/1455526.1455532},
  timestamp    = {Mon, 08 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/LigattiBW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/Meadows09,
  author       = {Catherine Meadows},
  title        = {Introduction to {ACM} {TISSEC} special issue on {CCS} 2005},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {1},
  pages        = {1:1--1:2},
  year         = {2009},
  url          = {https://doi.org/10.1145/1609956.1609957},
  doi          = {10.1145/1609956.1609957},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/Meadows09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/SangS09,
  author       = {Yingpeng Sang and
                  Hong Shen},
  title        = {Efficient and secure protocols for privacy-preserving set operations},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {1},
  pages        = {9:1--9:35},
  year         = {2009},
  url          = {https://doi.org/10.1145/1609956.1609965},
  doi          = {10.1145/1609956.1609965},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/SangS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/YaoT09,
  author       = {Danfeng Yao and
                  Roberto Tamassia},
  title        = {Compact and Anonymous Role-Based Authorization Chain},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {12},
  number       = {3},
  pages        = {15:1--15:27},
  year         = {2009},
  url          = {https://doi.org/10.1145/1455526.1455528},
  doi          = {10.1145/1455526.1455528},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/YaoT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ZhuB09,
  author       = {Ye Zhu and
                  Riccardo Bettati},
  title        = {Compromising anonymous communication systems using blind source separation},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {1},
  pages        = {8:1--8:31},
  year         = {2009},
  url          = {https://doi.org/10.1145/1609956.1609964},
  doi          = {10.1145/1609956.1609964},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/ZhuB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ZhuangZT09,
  author       = {Li Zhuang and
                  Feng Zhou and
                  J. D. Tygar},
  title        = {Keyboard acoustic emanations revisited},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {1},
  pages        = {3:1--3:26},
  year         = {2009},
  url          = {https://doi.org/10.1145/1609956.1609959},
  doi          = {10.1145/1609956.1609959},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/ZhuangZT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/AntonatosALA08,
  author       = {Spyros Antonatos and
                  Periklis Akritidis and
                  Vinh The Lam and
                  Kostas G. Anagnostakis},
  title        = {Puppetnets: Misusing Web Browsers as a Distributed Attack Infrastructure},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {12},
  number       = {2},
  pages        = {12:1--12:38},
  year         = {2008},
  url          = {https://doi.org/10.1145/1455518.1477941},
  doi          = {10.1145/1455518.1477941},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/AntonatosALA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/AvoineJO08,
  author       = {Gildas Avoine and
                  Pascal Junod and
                  Philippe Oechslin},
  title        = {Characterization and Improvement of Time-Memory Trade-Off Based on
                  Perfect Tables},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {11},
  number       = {4},
  pages        = {17:1--17:22},
  year         = {2008},
  url          = {https://doi.org/10.1145/1380564.1380565},
  doi          = {10.1145/1380564.1380565},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/AvoineJO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/AwerbuchCHNR08,
  author       = {Baruch Awerbuch and
                  Reza Curtmola and
                  David Holmer and
                  Cristina Nita{-}Rotaru and
                  Herbert Rubens},
  title        = {{ODSBR:} An on-demand secure Byzantine resilient routing protocol
                  for wireless ad hoc networks},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {10},
  number       = {4},
  pages        = {6:1--6:35},
  year         = {2008},
  url          = {https://doi.org/10.1145/1284680.1341892},
  doi          = {10.1145/1284680.1341892},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/AwerbuchCHNR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BarkerSW08,
  author       = {Steve Barker and
                  Marek J. Sergot and
                  Duminda Wijesekera},
  title        = {Status-Based Access Control},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {12},
  number       = {1},
  pages        = {1:1--1:47},
  year         = {2008},
  url          = {https://doi.org/10.1145/1410234.1410235},
  doi          = {10.1145/1410234.1410235},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/BarkerSW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BoldyrevaGOY08,
  author       = {Alexandra Boldyreva and
                  Craig Gentry and
                  Adam O'Neill and
                  Dae Hyun Yum},
  title        = {New Multiparty Signature Schemes for Network Routing Applications},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {12},
  number       = {1},
  pages        = {3:1--3:39},
  year         = {2008},
  url          = {https://doi.org/10.1145/1410234.1410237},
  doi          = {10.1145/1410234.1410237},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/BoldyrevaGOY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BouganimNP08,
  author       = {Luc Bouganim and
                  Fran{\c{c}}ois Dang Ngoc and
                  Philippe Pucheral},
  title        = {Dynamic access-control policies on {XML} encrypted data},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {10},
  number       = {4},
  pages        = {4:1--4:37},
  year         = {2008},
  url          = {https://doi.org/10.1145/1284680.1284684},
  doi          = {10.1145/1284680.1284684},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/BouganimNP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BrandtS08,
  author       = {Felix Brandt and
                  Tuomas Sandholm},
  title        = {On the Existence of Unconditionally Privacy-Preserving Auction Protocols},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {11},
  number       = {2},
  pages        = {6:1--6:21},
  year         = {2008},
  url          = {https://doi.org/10.1145/1330332.1330338},
  doi          = {10.1145/1330332.1330338},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/BrandtS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/CadarGPDE08,
  author       = {Cristian Cadar and
                  Vijay Ganesh and
                  Peter M. Pawlowski and
                  David L. Dill and
                  Dawson R. Engler},
  title        = {{EXE:} Automatically Generating Inputs of Death},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {12},
  number       = {2},
  pages        = {10:1--10:38},
  year         = {2008},
  url          = {https://doi.org/10.1145/1455518.1455522},
  doi          = {10.1145/1455518.1455522},
  timestamp    = {Thu, 27 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/CadarGPDE08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ChakrabartiWWLF08,
  author       = {Deepayan Chakrabarti and
                  Yang Wang and
                  Chenxi Wang and
                  Jure Leskovec and
                  Christos Faloutsos},
  title        = {Epidemic thresholds in real networks},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {10},
  number       = {4},
  pages        = {1:1--1:26},
  year         = {2008},
  url          = {https://doi.org/10.1145/1284680.1284681},
  doi          = {10.1145/1284680.1284681},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/ChakrabartiWWLF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ChangS08,
  author       = {Katharine Chang and
                  Kang G. Shin},
  title        = {Distributed Authentication of Program Integrity Verification in Wireless
                  Sensor Networks},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {11},
  number       = {3},
  pages        = {14:1--14:35},
  year         = {2008},
  url          = {https://doi.org/10.1145/1341731.1341735},
  doi          = {10.1145/1341731.1341735},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/ChangS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/CheonHKO08,
  author       = {Jung Hee Cheon and
                  Nicholas Hopper and
                  Yongdae Kim and
                  Ivan Osipkov},
  title        = {Provably Secure Timed-Release Public Key Encryption},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {11},
  number       = {2},
  pages        = {4:1--4:44},
  year         = {2008},
  url          = {https://doi.org/10.1145/1330332.1330336},
  doi          = {10.1145/1330332.1330336},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/CheonHKO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/GaneriwalPCS08,
  author       = {Saurabh Ganeriwal and
                  Christina P{\"{o}}pper and
                  Srdjan Capkun and
                  Mani B. Srivastava},
  title        = {Secure Time Synchronization in Sensor Networks},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {11},
  number       = {4},
  pages        = {23:1--23:35},
  year         = {2008},
  url          = {https://doi.org/10.1145/1380564.1380571},
  doi          = {10.1145/1380564.1380571},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/GaneriwalPCS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/GassendDCTDT08,
  author       = {Blaise Gassend and
                  Marten van Dijk and
                  Dwaine E. Clarke and
                  Emina Torlak and
                  Srinivas Devadas and
                  Pim Tuyls},
  title        = {Controlled physical random functions and applications},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {10},
  number       = {4},
  pages        = {3:1--3:22},
  year         = {2008},
  url          = {https://doi.org/10.1145/1284680.1284683},
  doi          = {10.1145/1284680.1284683},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/GassendDCTDT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/GolleMM08,
  author       = {Philippe Golle and
                  Frank McSherry and
                  Ilya Mironov},
  title        = {Data Collection with Self-Enforcing Privacy},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {12},
  number       = {2},
  pages        = {9:1--9:24},
  year         = {2008},
  url          = {https://doi.org/10.1145/1455518.1477940},
  doi          = {10.1145/1455518.1477940},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/GolleMM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/HalpernO08,
  author       = {Joseph Y. Halpern and
                  Kevin R. O'Neill},
  title        = {Secrecy in Multiagent Systems},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {12},
  number       = {1},
  pages        = {5:1--5:47},
  year         = {2008},
  url          = {https://doi.org/10.1145/1410234.1410239},
  doi          = {10.1145/1410234.1410239},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/HalpernO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/HalpernW08,
  author       = {Joseph Y. Halpern and
                  Vicky Weissman},
  title        = {Using First-Order Logic to Reason about Policies},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {11},
  number       = {4},
  pages        = {21:1--21:41},
  year         = {2008},
  url          = {https://doi.org/10.1145/1380564.1380569},
  doi          = {10.1145/1380564.1380569},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/HalpernW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/JoshiBGZ08,
  author       = {James B. D. Joshi and
                  Elisa Bertino and
                  Arif Ghafoor and
                  Yue Zhang},
  title        = {Formal foundations for hybrid hierarchies in {GTRBAC}},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {10},
  number       = {4},
  pages        = {2:1--2:39},
  year         = {2008},
  url          = {https://doi.org/10.1145/1284680.1284682},
  doi          = {10.1145/1284680.1284682},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/JoshiBGZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/LeeS08,
  author       = {Jooyoung Lee and
                  Douglas R. Stinson},
  title        = {On the Construction of Practical Key Predistribution Schemes for Distributed
                  Sensor Networks Using Combinatorial Designs},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {11},
  number       = {2},
  pages        = {1:1--1:35},
  year         = {2008},
  url          = {https://doi.org/10.1145/1330332.1330333},
  doi          = {10.1145/1330332.1330333},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/LeeS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/LeeW08,
  author       = {Adam J. Lee and
                  Marianne Winslett},
  title        = {Enforcing Safety and Consistency Constraints in Policy-Based Authorization
                  Systems},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {12},
  number       = {2},
  pages        = {8:1--8:33},
  year         = {2008},
  url          = {https://doi.org/10.1145/1455518.1455520},
  doi          = {10.1145/1455518.1455520},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/LeeW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/LeeWBW08,
  author       = {Adam J. Lee and
                  Marianne Winslett and
                  Jim Basney and
                  Von Welch},
  title        = {The Traust Authorization Service},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {11},
  number       = {1},
  pages        = {2:1--2:33},
  year         = {2008},
  url          = {https://doi.org/10.1145/1330295.1330297},
  doi          = {10.1145/1330295.1330297},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/LeeWBW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/LiuNLWD08,
  author       = {Donggang Liu and
                  Peng Ning and
                  An Liu and
                  Cliff Wang and
                  Wenliang Du},
  title        = {Attack-Resistant Location Estimation in Wireless Sensor Networks},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {11},
  number       = {4},
  pages        = {22:1--22:39},
  year         = {2008},
  url          = {https://doi.org/10.1145/1380564.1380570},
  doi          = {10.1145/1380564.1380570},
  timestamp    = {Thu, 15 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/LiuNLWD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ManoBLJCSS08,
  author       = {Chad D. Mano and
                  Andrew Blaich and
                  Qi Liao and
                  Yingxin Jiang and
                  David A. Cieslak and
                  David Salyers and
                  Aaron Striegel},
  title        = {{RIPPS:} Rogue Identifying Packet Payload Slicer Detecting Unauthorized
                  Wireless Hosts Through Network Traffic Conditioning},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {11},
  number       = {2},
  pages        = {2:1--2:23},
  year         = {2008},
  url          = {https://doi.org/10.1145/1330332.1330334},
  doi          = {10.1145/1330332.1330334},
  timestamp    = {Fri, 29 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/ManoBLJCSS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/MazzoleniCSB08,
  author       = {Pietro Mazzoleni and
                  Bruno Crispo and
                  Swaminathan Sivasubramanian and
                  Elisa Bertino},
  title        = {{XACML} Policy Integration Algorithms},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {11},
  number       = {1},
  pages        = {4:1--4:29},
  year         = {2008},
  url          = {https://doi.org/10.1145/1330295.1330299},
  doi          = {10.1145/1330295.1330299},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/MazzoleniCSB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/OorschotT08,
  author       = {Paul C. van Oorschot and
                  Julie Thorpe},
  title        = {On predictive models and user-drawn graphical passwords},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {10},
  number       = {4},
  pages        = {5:1--5:33},
  year         = {2008},
  url          = {https://doi.org/10.1145/1284680.1284685},
  doi          = {10.1145/1284680.1284685},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/OorschotT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/PangT08,
  author       = {HweeHwa Pang and
                  Kian{-}Lee Tan},
  title        = {Verifying Completeness of Relational Query Answers from Online Servers},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {11},
  number       = {2},
  pages        = {5:1--5:50},
  year         = {2008},
  url          = {https://doi.org/10.1145/1330332.1330337},
  doi          = {10.1145/1330332.1330337},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/PangT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/PietroMMPR08,
  author       = {Roberto Di Pietro and
                  Luigi V. Mancini and
                  Alessandro Mei and
                  Alessandro Panconesi and
                  Jaikumar Radhakrishnan},
  title        = {Redoubtable Sensor Networks},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {11},
  number       = {3},
  pages        = {13:1--13:22},
  year         = {2008},
  url          = {https://doi.org/10.1145/1341731.1341734},
  doi          = {10.1145/1341731.1341734},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/PietroMMPR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/RadosavacMBK08,
  author       = {Svetlana Radosavac and
                  George V. Moustakides and
                  John S. Baras and
                  Iordanis Koutsopoulos},
  title        = {An Analytic Framework for Modeling and Detecting Access Layer Misbehavior
                  in Wireless Networks},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {11},
  number       = {4},
  pages        = {19:1--19:28},
  year         = {2008},
  url          = {https://doi.org/10.1145/1380564.1380567},
  doi          = {10.1145/1380564.1380567},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/RadosavacMBK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/Ray08,
  author       = {Indrakshi Ray},
  title        = {Editorial},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {11},
  number       = {1},
  pages        = {1:1},
  year         = {2008},
  url          = {https://doi.org/10.1145/1330295.1330296},
  doi          = {10.1145/1330295.1330296},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/Ray08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/RyuR08,
  author       = {Young U. Ryu and
                  Hyeun{-}Suk Rhee},
  title        = {Evaluation of Intrusion Detection Systems Under a Resource Constraint},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {11},
  number       = {4},
  pages        = {20:1--20:24},
  year         = {2008},
  url          = {https://doi.org/10.1145/1380564.1380566},
  doi          = {10.1145/1380564.1380566},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/RyuR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/TraynorCWHM08,
  author       = {Patrick Traynor and
                  Michael Chien and
                  Scott Weaver and
                  Boniface Hicks and
                  Patrick D. McDaniel},
  title        = {Noninvasive Methods for Host Certification},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {11},
  number       = {3},
  pages        = {16:1--16:23},
  year         = {2008},
  url          = {https://doi.org/10.1145/1341731.1341737},
  doi          = {10.1145/1341731.1341737},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/TraynorCWHM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/Tsudik08,
  author       = {Gene Tsudik},
  title        = {Editorial},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {11},
  number       = {3},
  pages        = {11:1},
  year         = {2008},
  url          = {https://doi.org/10.1145/1341731.1341732},
  doi          = {10.1145/1341731.1341732},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/Tsudik08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/WangD08,
  author       = {Wei Wang and
                  Thomas E. Daniels},
  title        = {A Graph Based Approach Toward Network Forensics Analysis},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {12},
  number       = {1},
  pages        = {4:1--4:33},
  year         = {2008},
  url          = {https://doi.org/10.1145/1410234.1410238},
  doi          = {10.1145/1410234.1410238},
  timestamp    = {Wed, 11 Dec 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/WangD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/WangLCXRK08,
  author       = {XiaoFeng Wang and
                  Zhuowei Li and
                  Jong Youl Choi and
                  Jun Xu and
                  Michael K. Reiter and
                  Chongkyung Kil},
  title        = {Fast and Black-box Exploit Detection and Signature Generation for
                  Commodity Software},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {12},
  number       = {2},
  pages        = {11:1--11:35},
  year         = {2008},
  url          = {https://doi.org/10.1145/1455518.1455523},
  doi          = {10.1145/1455518.1455523},
  timestamp    = {Wed, 02 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/WangLCXRK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/WrightALS08,
  author       = {Matthew K. Wright and
                  Micah Adler and
                  Brian Neil Levine and
                  Clay Shields},
  title        = {Passive-Logging Attacks Against Anonymous Communications Systems},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {11},
  number       = {2},
  pages        = {3:1--3:34},
  year         = {2008},
  url          = {https://doi.org/10.1145/1330332.1330335},
  doi          = {10.1145/1330332.1330335},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/WrightALS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/WrightV08,
  author       = {Rebecca N. Wright and
                  Sabrina De Capitani di Vimercati},
  title        = {Guest Editorial: Special Issue on Computer and Communications Security},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {12},
  number       = {2},
  pages        = {7:1--7:2},
  year         = {2008},
  url          = {https://doi.org/10.1145/1455518.1455519},
  doi          = {10.1145/1455518.1455519},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/WrightV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/XieYW08,
  author       = {Mengjun Xie and
                  Heng Yin and
                  Haining Wang},
  title        = {Thwarting E-mail Spam Laundering},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {12},
  number       = {2},
  pages        = {13:1--13:32},
  year         = {2008},
  url          = {https://doi.org/10.1145/1455518.1455525},
  doi          = {10.1145/1455518.1455525},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/XieYW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/XieZ08,
  author       = {Liang Xie and
                  Sencun Zhu},
  title        = {Message Dropping Attacks in Overlay Networks: Attack Detection and
                  Attacker Identification},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {11},
  number       = {3},
  pages        = {15:1--15:30},
  year         = {2008},
  url          = {https://doi.org/10.1145/1341731.1341736},
  doi          = {10.1145/1341731.1341736},
  timestamp    = {Sun, 19 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/XieZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/XuC08,
  author       = {Shouhuai Xu and
                  Srdjan Capkun},
  title        = {Distributed and Secure Bootstrapping of Mobile Ad Hoc Networks: Framework
                  and Constructions},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {12},
  number       = {1},
  pages        = {2:1--2:37},
  year         = {2008},
  url          = {https://doi.org/10.1145/1410234.1410236},
  doi          = {10.1145/1410234.1410236},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/XuC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/YangWZC08,
  author       = {Yi Yang and
                  Xinran Wang and
                  Sencun Zhu and
                  Guohong Cao},
  title        = {{SDAP:} {A} Secure Hop-by-Hop Data Aggregation Protocol for Sensor
                  Networks},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {11},
  number       = {4},
  pages        = {18:1--18:43},
  year         = {2008},
  url          = {https://doi.org/10.1145/1380564.1380568},
  doi          = {10.1145/1380564.1380568},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/YangWZC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/YaoFAT08,
  author       = {Danfeng Yao and
                  Keith B. Frikken and
                  Mikhail J. Atallah and
                  Roberto Tamassia},
  title        = {Private Information: To Reveal or not to Reveal},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {12},
  number       = {1},
  pages        = {6:1--6:27},
  year         = {2008},
  url          = {https://doi.org/10.1145/1410234.1410240},
  doi          = {10.1145/1410234.1410240},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/YaoFAT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ZhangNCS08,
  author       = {Xinwen Zhang and
                  Masayuki Nakae and
                  Michael J. Covington and
                  Ravi S. Sandhu},
  title        = {Toward a Usage-Based Security Framework for Collaborative Computing
                  Systems},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {11},
  number       = {1},
  pages        = {3:1--3:36},
  year         = {2008},
  url          = {https://doi.org/10.1145/1330295.1330298},
  doi          = {10.1145/1330295.1330298},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/ZhangNCS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ZhangYN08,
  author       = {Qing Zhang and
                  Ting Yu and
                  Peng Ning},
  title        = {A Framework for Identifying Compromised Nodes in Wireless Sensor Networks},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {11},
  number       = {3},
  pages        = {12:1--12:37},
  year         = {2008},
  url          = {https://doi.org/10.1145/1341731.1341733},
  doi          = {10.1145/1341731.1341733},
  timestamp    = {Fri, 09 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/ZhangYN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/AbadiBF07,
  author       = {Mart{\'{\i}}n Abadi and
                  Bruno Blanchet and
                  C{\'{e}}dric Fournet},
  title        = {Just fast keying in the pi calculus},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {10},
  number       = {3},
  pages        = {9},
  year         = {2007},
  url          = {https://doi.org/10.1145/1266977.1266978},
  doi          = {10.1145/1266977.1266978},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/AbadiBF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/AhmedT07,
  author       = {Tanvir Ahmed and
                  Anand R. Tripathi},
  title        = {Specification and verification of security requirements in a programming
                  model for decentralized {CSCW} systems},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {10},
  number       = {2},
  pages        = {7},
  year         = {2007},
  url          = {https://doi.org/10.1145/1237500.1237503},
  doi          = {10.1145/1237500.1237503},
  timestamp    = {Fri, 11 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/AhmedT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/Ahn07,
  author       = {Gail{-}Joon Ahn},
  title        = {Guest editorial: Special issue on access control models and technologies},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {10},
  number       = {1},
  pages        = {1},
  year         = {2007},
  url          = {https://doi.org/10.1145/1210263.1216576},
  doi          = {10.1145/1210263.1216576},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/Ahn07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BhargavanCFG07,
  author       = {Karthikeyan Bhargavan and
                  Ricardo Corin and
                  C{\'{e}}dric Fournet and
                  Andrew D. Gordon},
  title        = {Secure sessions for Web services},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {10},
  number       = {2},
  pages        = {8},
  year         = {2007},
  url          = {https://doi.org/10.1145/1237500.1237504},
  doi          = {10.1145/1237500.1237504},
  timestamp    = {Mon, 14 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/BhargavanCFG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BressonCP07,
  author       = {Emmanuel Bresson and
                  Olivier Chevassut and
                  David Pointcheval},
  title        = {Provably secure authenticated group Diffie-Hellman key exchange},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {10},
  number       = {3},
  pages        = {10},
  year         = {2007},
  url          = {https://doi.org/10.1145/1266977.1266979},
  doi          = {10.1145/1266977.1266979},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/BressonCP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/DamianiBCP07,
  author       = {Maria Luisa Damiani and
                  Elisa Bertino and
                  Barbara Catania and
                  Paolo Perlasca},
  title        = {{GEO-RBAC:} {A} spatially aware {RBAC}},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {10},
  number       = {1},
  pages        = {2},
  year         = {2007},
  url          = {https://doi.org/10.1145/1210263.1210265},
  doi          = {10.1145/1210263.1210265},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/DamianiBCP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/IwaiharaHCAW07,
  author       = {Mizuho Iwaihara and
                  Ryotaro Hayashi and
                  Somchai Chatvichienchai and
                  Chutiporn Anutariya and
                  Vilas Wuwongse},
  title        = {Relevancy-based access control and its evaluation on versioned {XML}
                  documents},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {10},
  number       = {1},
  pages        = {3},
  year         = {2007},
  url          = {https://doi.org/10.1145/1210263.1210266},
  doi          = {10.1145/1210263.1210266},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/IwaiharaHCAW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/LiTB07,
  author       = {Ninghui Li and
                  Mahesh V. Tripunitara and
                  Ziad Bizri},
  title        = {On mutually exclusive roles and separation-of-duty},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {10},
  number       = {2},
  pages        = {5},
  year         = {2007},
  url          = {https://doi.org/10.1145/1237500.1237501},
  doi          = {10.1145/1237500.1237501},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/LiTB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/OorschotWK07,
  author       = {Paul C. van Oorschot and
                  Tao Wan and
                  Evangelos Kranakis},
  title        = {On interdomain routing security and pretty secure {BGP} (psBGP)},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {10},
  number       = {3},
  pages        = {11},
  year         = {2007},
  url          = {https://doi.org/10.1145/1266977.1266980},
  doi          = {10.1145/1266977.1266980},
  timestamp    = {Mon, 06 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/OorschotWK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/PengBD07,
  author       = {Kun Peng and
                  Colin Boyd and
                  Ed Dawson},
  title        = {Batch zero-knowledge proof and verification and its applications},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {10},
  number       = {2},
  pages        = {6},
  year         = {2007},
  url          = {https://doi.org/10.1145/1237500.1237502},
  doi          = {10.1145/1237500.1237502},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/PengBD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/SquicciariniBFPT07,
  author       = {Anna Cinzia Squicciarini and
                  Elisa Bertino and
                  Elena Ferrari and
                  Federica Paci and
                  Bhavani Thuraisingham},
  title        = {PP-trust-X: {A} system for privacy preserving trust negotiations},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {10},
  number       = {3},
  pages        = {12},
  year         = {2007},
  url          = {https://doi.org/10.1145/1266977.1266981},
  doi          = {10.1145/1266977.1266981},
  timestamp    = {Tue, 12 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/SquicciariniBFPT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ZhouHRCB07,
  author       = {Jingmin Zhou and
                  Mark R. Heckman and
                  Brennen Reynolds and
                  Adam Carlson and
                  Matt Bishop},
  title        = {Modeling network intrusion detection alerts for correlation},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {10},
  number       = {1},
  pages        = {4},
  year         = {2007},
  url          = {https://doi.org/10.1145/1210263.1210267},
  doi          = {10.1145/1210263.1210267},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/ZhouHRCB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/AtenieseFGH06,
  author       = {Giuseppe Ateniese and
                  Kevin Fu and
                  Matthew Green and
                  Susan Hohenberger},
  title        = {Improved proxy re-encryption schemes with applications to secure distributed
                  storage},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {9},
  number       = {1},
  pages        = {1--30},
  year         = {2006},
  url          = {https://doi.org/10.1145/1127345.1127346},
  doi          = {10.1145/1127345.1127346},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/AtenieseFGH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BellaP06,
  author       = {Giampaolo Bella and
                  Lawrence C. Paulson},
  title        = {Accountability protocols: Formalized and verified},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {9},
  number       = {2},
  pages        = {138--161},
  year         = {2006},
  url          = {https://doi.org/10.1145/1151414.1151416},
  doi          = {10.1145/1151414.1151416},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/BellaP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ChandramouliBSU06,
  author       = {Rajarathnam Chandramouli and
                  Satish Bapatla and
                  K. P. Subbalakshmi and
                  R. N. Uma},
  title        = {Battery power-aware encryption},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {9},
  number       = {2},
  pages        = {162--180},
  year         = {2006},
  url          = {https://doi.org/10.1145/1151414.1151417},
  doi          = {10.1145/1151414.1151417},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/ChandramouliBSU06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/FutoranskyKSW06,
  author       = {Ariel Futoransky and
                  Emiliano Kargieman and
                  Carlos Sarraute and
                  Ariel Waissbein},
  title        = {Foundations and applications for secure triggers},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {9},
  number       = {1},
  pages        = {94--112},
  year         = {2006},
  url          = {https://doi.org/10.1145/1127345.1127349},
  doi          = {10.1145/1127345.1127349},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/FutoranskyKSW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/GennaroL06,
  author       = {Rosario Gennaro and
                  Yehuda Lindell},
  title        = {A framework for password-based authenticated key exchange\({}^{\mbox{1}}\)},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {9},
  number       = {2},
  pages        = {181--234},
  year         = {2006},
  url          = {https://doi.org/10.1145/1151414.1151418},
  doi          = {10.1145/1151414.1151418},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/GennaroL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/KoganSW06,
  author       = {Noam Kogan and
                  Yuval Shavitt and
                  Avishai Wool},
  title        = {A practical revocation scheme for broadcast encryption using smartcards},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {9},
  number       = {3},
  pages        = {325--351},
  year         = {2006},
  url          = {https://doi.org/10.1145/1178618.1178622},
  doi          = {10.1145/1178618.1178622},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/KoganSW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/KoganT06,
  author       = {Noam Kogan and
                  Tamir Tassa},
  title        = {Improved efficiency for revocation schemes via Newton interpolation},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {9},
  number       = {4},
  pages        = {461--486},
  year         = {2006},
  url          = {https://doi.org/10.1145/1187441.1187444},
  doi          = {10.1145/1187441.1187444},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/KoganT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/LiT06,
  author       = {Ninghui Li and
                  Mahesh V. Tripunitara},
  title        = {Security analysis in role-based access control},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {9},
  number       = {4},
  pages        = {391--420},
  year         = {2006},
  url          = {https://doi.org/10.1145/1187441.1187442},
  doi          = {10.1145/1187441.1187442},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/LiT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/MalvestutoMM06,
  author       = {Francesco M. Malvestuto and
                  Mauro Mezzini and
                  Marina Moscarini},
  title        = {Auditing sum-queries to make a statistical database secure},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {9},
  number       = {1},
  pages        = {31--60},
  year         = {2006},
  url          = {https://doi.org/10.1145/1127345.1127347},
  doi          = {10.1145/1127345.1127347},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/MalvestutoMM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/McDanielP06,
  author       = {Patrick D. McDaniel and
                  Atul Prakash},
  title        = {Methods and limitations of security policy reconciliation},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {9},
  number       = {3},
  pages        = {259--291},
  year         = {2006},
  url          = {https://doi.org/10.1145/1178618.1178620},
  doi          = {10.1145/1178618.1178620},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/McDanielP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/MellaFBK06,
  author       = {Giovanni Mella and
                  Elena Ferrari and
                  Elisa Bertino and
                  Yunhua Koglin},
  title        = {Controlled and cooperative updates of {XML} documents in byzantine
                  and failure-prone distributed systems},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {9},
  number       = {4},
  pages        = {421--460},
  year         = {2006},
  url          = {https://doi.org/10.1145/1187441.1187443},
  doi          = {10.1145/1187441.1187443},
  timestamp    = {Tue, 12 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/MellaFBK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/MurataTKH06,
  author       = {Makoto Murata and
                  Akihiko Tozawa and
                  Michiharu Kudo and
                  Satoshi Hada},
  title        = {{XML} access control using static analysis},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {9},
  number       = {3},
  pages        = {292--324},
  year         = {2006},
  url          = {https://doi.org/10.1145/1178618.1178621},
  doi          = {10.1145/1178618.1178621},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/MurataTKH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/MutzVVK06,
  author       = {Darren Mutz and
                  Fredrik Valeur and
                  Giovanni Vigna and
                  Christopher Kr{\"{u}}gel},
  title        = {Anomalous system call detection},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {9},
  number       = {1},
  pages        = {61--93},
  year         = {2006},
  url          = {https://doi.org/10.1145/1127345.1127348},
  doi          = {10.1145/1127345.1127348},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/MutzVVK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/OhSZ06,
  author       = {Sejong Oh and
                  Ravi S. Sandhu and
                  Xinwen Zhang},
  title        = {An effective role administration model using organization structure},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {9},
  number       = {2},
  pages        = {113--137},
  year         = {2006},
  url          = {https://doi.org/10.1145/1151414.1151415},
  doi          = {10.1145/1151414.1151415},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/OhSZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/OorschotS06,
  author       = {Paul C. van Oorschot and
                  Stuart G. Stubblebine},
  title        = {On countering online dictionary attacks with login histories and humans-in-the-loop},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {9},
  number       = {3},
  pages        = {235--258},
  year         = {2006},
  url          = {https://doi.org/10.1145/1178618.1178619},
  doi          = {10.1145/1178618.1178619},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/OorschotS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/WinsboroughL06,
  author       = {William H. Winsborough and
                  Ninghui Li},
  title        = {Safety in automated trust negotiation},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {9},
  number       = {3},
  pages        = {352--390},
  year         = {2006},
  url          = {https://doi.org/10.1145/1178618.1178623},
  doi          = {10.1145/1178618.1178623},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/WinsboroughL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/Atluri05,
  author       = {Vijay Atluri},
  title        = {Preface},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {8},
  number       = {1},
  pages        = {2},
  year         = {2005},
  url          = {https://doi.org/10.1145/1053283.1053285},
  doi          = {10.1145/1053283.1053285},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/Atluri05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BarrantesAFS05,
  author       = {Elena Gabriela Barrantes and
                  David H. Ackley and
                  Stephanie Forrest and
                  Darko Stefanovic},
  title        = {Randomized instruction set emulation},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {8},
  number       = {1},
  pages        = {3--40},
  year         = {2005},
  url          = {https://doi.org/10.1145/1053283.1053286},
  doi          = {10.1145/1053283.1053286},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/BarrantesAFS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BhattiGBJ05,
  author       = {Rafae Bhatti and
                  Arif Ghafoor and
                  Elisa Bertino and
                  James Joshi},
  title        = {{X-GTRBAC:} an XML-based policy specification framework and architecture
                  for enterprise-wide access control},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {8},
  number       = {2},
  pages        = {187--227},
  year         = {2005},
  url          = {https://doi.org/10.1145/1065545.1065547},
  doi          = {10.1145/1065545.1065547},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/BhattiGBJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BhattiSBGJ05,
  author       = {Rafae Bhatti and
                  Basit Shafiq and
                  Elisa Bertino and
                  Arif Ghafoor and
                  James Joshi},
  title        = {X-gtrbac admin: {A} decentralized administration model for enterprise-wide
                  access control},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {8},
  number       = {4},
  pages        = {388--423},
  year         = {2005},
  url          = {https://doi.org/10.1145/1108906.1108909},
  doi          = {10.1145/1108906.1108909},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/BhattiSBGJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/CeselliDVJPS05,
  author       = {Alberto Ceselli and
                  Ernesto Damiani and
                  Sabrina De Capitani di Vimercati and
                  Sushil Jajodia and
                  Stefano Paraboschi and
                  Pierangela Samarati},
  title        = {Modeling and assessing inference exposure in encrypted databases},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {8},
  number       = {1},
  pages        = {119--152},
  year         = {2005},
  url          = {https://doi.org/10.1145/1053283.1053289},
  doi          = {10.1145/1053283.1053289},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/CeselliDVJPS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/DojenC05,
  author       = {Reiner Dojen and
                  Tom Coffey},
  title        = {The concept of layered proving trees and its application to the automation
                  of security protocol verification},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {8},
  number       = {3},
  pages        = {287--311},
  year         = {2005},
  url          = {https://doi.org/10.1145/1085126.1085128},
  doi          = {10.1145/1085126.1085128},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/DojenC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/DuDHVKK05,
  author       = {Wenliang Du and
                  Jing Deng and
                  Yunghsiang S. Han and
                  Pramod K. Varshney and
                  Jonathan Katz and
                  Aram Khalili},
  title        = {A pairwise key predistribution scheme for wireless sensor networks},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {8},
  number       = {2},
  pages        = {228--258},
  year         = {2005},
  url          = {https://doi.org/10.1145/1065545.1065548},
  doi          = {10.1145/1065545.1065548},
  timestamp    = {Tue, 03 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/DuDHVKK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/Ferrari05,
  author       = {Elena Ferrari},
  title        = {Guest editorial: Special issue on access control models and technologies},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {8},
  number       = {4},
  pages        = {349--350},
  year         = {2005},
  url          = {https://doi.org/10.1145/1108906.1108907},
  doi          = {10.1145/1108906.1108907},
  timestamp    = {Tue, 12 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/Ferrari05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/GunettiP05,
  author       = {Daniele Gunetti and
                  Claudia Picardi},
  title        = {Keystroke analysis of free text},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {8},
  number       = {3},
  pages        = {312--347},
  year         = {2005},
  url          = {https://doi.org/10.1145/1085126.1085129},
  doi          = {10.1145/1085126.1085129},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/GunettiP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/HengartnerS05,
  author       = {Urs Hengartner and
                  Peter Steenkiste},
  title        = {Access control to people location information},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {8},
  number       = {4},
  pages        = {424--456},
  year         = {2005},
  url          = {https://doi.org/10.1145/1108906.1108910},
  doi          = {10.1145/1108906.1108910},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/HengartnerS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/LiuNL05,
  author       = {Donggang Liu and
                  Peng Ning and
                  Rongfang Li},
  title        = {Establishing pairwise keys in distributed sensor networks},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {8},
  number       = {1},
  pages        = {41--77},
  year         = {2005},
  url          = {https://doi.org/10.1145/1053283.1053287},
  doi          = {10.1145/1053283.1053287},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/LiuNL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/LiuZY05,
  author       = {Peng Liu and
                  Wanyu Zang and
                  Meng Yu},
  title        = {Incentive-based modeling and inference of attacker intent, objectives,
                  and strategies},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {8},
  number       = {1},
  pages        = {78--118},
  year         = {2005},
  url          = {https://doi.org/10.1145/1053283.1053288},
  doi          = {10.1145/1053283.1053288},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/LiuZY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/Sandhu05,
  author       = {Ravi S. Sandhu},
  title        = {Editorial},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {8},
  number       = {1},
  pages        = {1},
  year         = {2005},
  url          = {https://doi.org/10.1145/1053283.1053284},
  doi          = {10.1145/1053283.1053284},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/Sandhu05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/YeSA05,
  author       = {Zishuang (Eileen) Ye and
                  Sean W. Smith and
                  Denise L. Anthony},
  title        = {Trusted paths for browsers},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {8},
  number       = {2},
  pages        = {153--186},
  year         = {2005},
  url          = {https://doi.org/10.1145/1065545.1065546},
  doi          = {10.1145/1065545.1065546},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/YeSA05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ZhangPSP05,
  author       = {Xinwen Zhang and
                  Francesco Parisi{-}Presicce and
                  Ravi S. Sandhu and
                  Jaehong Park},
  title        = {Formal model and policy specification of usage control},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {8},
  number       = {4},
  pages        = {351--387},
  year         = {2005},
  url          = {https://doi.org/10.1145/1108906.1108908},
  doi          = {10.1145/1108906.1108908},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/ZhangPSP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ZhouSR05,
  author       = {Lidong Zhou and
                  Fred B. Schneider and
                  Robbert van Renesse},
  title        = {{APSS:} proactive secret sharing in asynchronous systems},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {8},
  number       = {3},
  pages        = {259--286},
  year         = {2005},
  url          = {https://doi.org/10.1145/1085126.1085127},
  doi          = {10.1145/1085126.1085127},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/ZhouSR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/AielloBBCIKR04,
  author       = {William Aiello and
                  Steven M. Bellovin and
                  Matt Blaze and
                  Ran Canetti and
                  John Ioannidis and
                  Angelos D. Keromytis and
                  Omer Reingold},
  title        = {Just fast keying: Key agreement in a hostile internet},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {7},
  number       = {2},
  pages        = {242--273},
  year         = {2004},
  url          = {https://doi.org/10.1145/996943.996946},
  doi          = {10.1145/996943.996946},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/AielloBBCIKR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/AmirKNT04,
  author       = {Yair Amir and
                  Yongdae Kim and
                  Cristina Nita{-}Rotaru and
                  Gene Tsudik},
  title        = {On the performance of group key agreement protocols},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {7},
  number       = {3},
  pages        = {457--488},
  year         = {2004},
  url          = {https://doi.org/10.1145/1015040.1015045},
  doi          = {10.1145/1015040.1015045},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/AmirKNT04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/Ateniese04,
  author       = {Giuseppe Ateniese},
  title        = {Verifiable encryption of digital signatures and applications},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {7},
  number       = {1},
  pages        = {1--20},
  year         = {2004},
  url          = {https://doi.org/10.1145/984334.984335},
  doi          = {10.1145/984334.984335},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/Ateniese04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BellareKN04,
  author       = {Mihir Bellare and
                  Tadayoshi Kohno and
                  Chanathip Namprempre},
  title        = {Breaking and provably repairing the {SSH} authenticated encryption
                  scheme: {A} case study of the Encode-then-Encrypt-and-MAC paradigm},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {7},
  number       = {2},
  pages        = {206--241},
  year         = {2004},
  url          = {https://doi.org/10.1145/996943.996945},
  doi          = {10.1145/996943.996945},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/BellareKN04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/CarrierS04,
  author       = {Brian D. Carrier and
                  Clay Shields},
  title        = {The session token protocol for forensics and traceback},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {7},
  number       = {3},
  pages        = {333--362},
  year         = {2004},
  url          = {https://doi.org/10.1145/1015040.1015041},
  doi          = {10.1145/1015040.1015041},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/CarrierS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/HessHJS04,
  author       = {Adam Hess and
                  Jason E. Holt and
                  Jared Jacobson and
                  Kent E. Seamons},
  title        = {Content-triggered trust negotiation},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {7},
  number       = {3},
  pages        = {428--456},
  year         = {2004},
  url          = {https://doi.org/10.1145/1015040.1015044},
  doi          = {10.1145/1015040.1015044},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/HessHJS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/HuangM04,
  author       = {Dijiang Huang and
                  Deep Medhi},
  title        = {A key-chain-based keying scheme for many-to-many secure group communication},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {7},
  number       = {4},
  pages        = {523--552},
  year         = {2004},
  url          = {https://doi.org/10.1145/1042031.1042033},
  doi          = {10.1145/1042031.1042033},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/HuangM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/JaegerEZ04,
  author       = {Trent Jaeger and
                  Antony Edwards and
                  Xiaolan Zhang},
  title        = {Consistency analysis of authorization hook placement in the Linux
                  security modules framework},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {7},
  number       = {2},
  pages        = {175--205},
  year         = {2004},
  url          = {https://doi.org/10.1145/996943.996944},
  doi          = {10.1145/996943.996944},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/JaegerEZ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/KimPT04,
  author       = {Yongdae Kim and
                  Adrian Perrig and
                  Gene Tsudik},
  title        = {Tree-based group key agreement},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {7},
  number       = {1},
  pages        = {60--96},
  year         = {2004},
  url          = {https://doi.org/10.1145/984334.984337},
  doi          = {10.1145/984334.984337},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/KimPT04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/LeviCK04,
  author       = {Albert Levi and
                  M. Ufuk {\c{C}}aglayan and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Use of nested certificates for efficient, dynamic, and trust preserving
                  public key infrastructure},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {7},
  number       = {1},
  pages        = {21--59},
  year         = {2004},
  url          = {https://doi.org/10.1145/984334.984336},
  doi          = {10.1145/984334.984336},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/LeviCK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/MontenegroC04,
  author       = {Gabriel Montenegro and
                  Claude Castelluccia},
  title        = {Crypto-based identifiers (CBIDs): Concepts and applications},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {7},
  number       = {1},
  pages        = {97--127},
  year         = {2004},
  url          = {https://doi.org/10.1145/984334.984338},
  doi          = {10.1145/984334.984338},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/MontenegroC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/NingCRX04,
  author       = {Peng Ning and
                  Yun Cui and
                  Douglas S. Reeves and
                  Dingbang Xu},
  title        = {Techniques and tools for analyzing intrusion alerts},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {7},
  number       = {2},
  pages        = {274--318},
  year         = {2004},
  url          = {https://doi.org/10.1145/996943.996947},
  doi          = {10.1145/996943.996947},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/NingCRX04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/NingX04,
  author       = {Peng Ning and
                  Dingbang Xu},
  title        = {Hypothesizing and reasoning about attacks missed by intrusion detection
                  systems},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {7},
  number       = {4},
  pages        = {591--627},
  year         = {2004},
  url          = {https://doi.org/10.1145/1042031.1042036},
  doi          = {10.1145/1042031.1042036},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/NingX04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ParkS04,
  author       = {Jaehong Park and
                  Ravi S. Sandhu},
  title        = {The UCON\({}_{\mbox{ABC}}\) usage control model},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {7},
  number       = {1},
  pages        = {128--174},
  year         = {2004},
  url          = {https://doi.org/10.1145/984334.984339},
  doi          = {10.1145/984334.984339},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/ParkS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ShachamBR04,
  author       = {Hovav Shacham and
                  Dan Boneh and
                  Eric Rescorla},
  title        = {Client-side caching for {TLS}},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {7},
  number       = {4},
  pages        = {553--575},
  year         = {2004},
  url          = {https://doi.org/10.1145/1042031.1042034},
  doi          = {10.1145/1042031.1042034},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/ShachamBR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/StrembeckN04,
  author       = {Mark Strembeck and
                  Gustaf Neumann},
  title        = {An integrated approach to engineer and enforce context constraints
                  in {RBAC} environments},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {7},
  number       = {3},
  pages        = {392--427},
  year         = {2004},
  url          = {https://doi.org/10.1145/1015040.1015043},
  doi          = {10.1145/1015040.1015043},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/StrembeckN04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/StubblefieldIR04,
  author       = {Adam Stubblefield and
                  John Ioannidis and
                  Aviel D. Rubin},
  title        = {A key recovery attack on the 802.11b wired equivalent privacy protocol
                  {(WEP)}},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {7},
  number       = {2},
  pages        = {319--332},
  year         = {2004},
  url          = {https://doi.org/10.1145/996943.996948},
  doi          = {10.1145/996943.996948},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/StubblefieldIR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/WalcottB04,
  author       = {Tom Walcott and
                  Matt Bishop},
  title        = {Traducement: {A} model for record security},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {7},
  number       = {4},
  pages        = {576--590},
  year         = {2004},
  url          = {https://doi.org/10.1145/1042031.1042035},
  doi          = {10.1145/1042031.1042035},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/WalcottB04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/WeddeL04,
  author       = {Horst F. Wedde and
                  Mario Lischka},
  title        = {Modular authorization and administration},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {7},
  number       = {3},
  pages        = {363--391},
  year         = {2004},
  url          = {https://doi.org/10.1145/1015040.1015042},
  doi          = {10.1145/1015040.1015042},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/WeddeL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/WrightALS04,
  author       = {Matthew K. Wright and
                  Micah Adler and
                  Brian Neil Levine and
                  Clay Shields},
  title        = {The predecessor attack: An analysis of a threat to anonymous communications
                  systems},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {7},
  number       = {4},
  pages        = {489--522},
  year         = {2004},
  url          = {https://doi.org/10.1145/1042031.1042032},
  doi          = {10.1145/1042031.1042032},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/WrightALS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BarkerS03,
  author       = {Steve Barker and
                  Peter J. Stuckey},
  title        = {Flexible access control policy specification with constraint logic
                  programming},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {6},
  number       = {4},
  pages        = {501--546},
  year         = {2003},
  url          = {https://doi.org/10.1145/950191.950194},
  doi          = {10.1145/950191.950194},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/BarkerS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BertinoCFP03,
  author       = {Elisa Bertino and
                  Barbara Catania and
                  Elena Ferrari and
                  Paolo Perlasca},
  title        = {A logical framework for reasoning about access control models},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {6},
  number       = {1},
  pages        = {71--127},
  year         = {2003},
  url          = {https://doi.org/10.1145/605434.605437},
  doi          = {10.1145/605434.605437},
  timestamp    = {Tue, 12 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/BertinoCFP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ChariC03,
  author       = {Suresh Chari and
                  Pau{-}Chen Cheng},
  title        = {BlueBoX: {A} policy-driven, host-based intrusion detection system},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {6},
  number       = {2},
  pages        = {173--200},
  year         = {2003},
  url          = {https://doi.org/10.1145/762476.762477},
  doi          = {10.1145/762476.762477},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/ChariC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/CramptonL03,
  author       = {Jason Crampton and
                  George Loizou},
  title        = {Administrative scope: {A} foundation for role-based administrative
                  models},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {6},
  number       = {2},
  pages        = {201--231},
  year         = {2003},
  url          = {https://doi.org/10.1145/762476.762478},
  doi          = {10.1145/762476.762478},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/CramptonL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/EllisonD03,
  author       = {Carl M. Ellison and
                  Steve Dohrmann},
  title        = {Public-key support for group collaboration},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {6},
  number       = {4},
  pages        = {547--565},
  year         = {2003},
  url          = {https://doi.org/10.1145/950191.950195},
  doi          = {10.1145/950191.950195},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/EllisonD03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/HalpernP03,
  author       = {Joseph Y. Halpern and
                  Riccardo Pucella},
  title        = {On the relationship between strand spaces and multi-agent systems},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {6},
  number       = {1},
  pages        = {43--70},
  year         = {2003},
  url          = {https://doi.org/10.1145/605434.605436},
  doi          = {10.1145/605434.605436},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/HalpernP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/JaegerZC03,
  author       = {Trent Jaeger and
                  Xiaolan Zhang and
                  Antony Edwards},
  title        = {Policy management using access control spaces},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {6},
  number       = {3},
  pages        = {327--364},
  year         = {2003},
  url          = {https://doi.org/10.1145/937527.937528},
  doi          = {10.1145/937527.937528},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/JaegerZC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/Julisch03,
  author       = {Klaus Julisch},
  title        = {Clustering intrusion detection alarms to support root cause analysis},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {6},
  number       = {4},
  pages        = {443--471},
  year         = {2003},
  url          = {https://doi.org/10.1145/950191.950192},
  doi          = {10.1145/950191.950192},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/Julisch03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/Karjoth03,
  author       = {G{\"{u}}nter Karjoth},
  title        = {Access control with {IBM} Tivoli access manager},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {6},
  number       = {2},
  pages        = {232--257},
  year         = {2003},
  url          = {https://doi.org/10.1145/762476.762479},
  doi          = {10.1145/762476.762479},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/Karjoth03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/LiGF03,
  author       = {Ninghui Li and
                  Benjamin N. Grosof and
                  Joan Feigenbaum},
  title        = {Delegation logic: {A} logic-based approach to distributed authorization},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {6},
  number       = {1},
  pages        = {128--171},
  year         = {2003},
  url          = {https://doi.org/10.1145/605434.605438},
  doi          = {10.1145/605434.605438},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/LiGF03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ParkCS03,
  author       = {Jung{-}Min Park and
                  Edwin K. P. Chong and
                  Howard Jay Siegel},
  title        = {Efficient multicast stream authentication using erasure codes},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {6},
  number       = {2},
  pages        = {258--285},
  year         = {2003},
  url          = {https://doi.org/10.1145/762476.762480},
  doi          = {10.1145/762476.762480},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/ParkCS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/PersianoV03,
  author       = {Pino Persiano and
                  Ivan Visconti},
  title        = {A secure and private system for subscription-based remote services},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {6},
  number       = {4},
  pages        = {472--500},
  year         = {2003},
  url          = {https://doi.org/10.1145/950191.950193},
  doi          = {10.1145/950191.950193},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/PersianoV03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/RogawayBB03,
  author       = {Phillip Rogaway and
                  Mihir Bellare and
                  John Black},
  title        = {{OCB:} {A} block-cipher mode of operation for efficient authenticated
                  encryption},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {6},
  number       = {3},
  pages        = {365--403},
  year         = {2003},
  url          = {https://doi.org/10.1145/937527.937529},
  doi          = {10.1145/937527.937529},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/RogawayBB03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ThompsonEM03,
  author       = {Mary R. Thompson and
                  Abdelilah Essiari and
                  Srilekha Mudumbai},
  title        = {Certificate-based authorization policy in a {PKI} environment},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {6},
  number       = {4},
  pages        = {566--588},
  year         = {2003},
  url          = {https://doi.org/10.1145/950191.950196},
  doi          = {10.1145/950191.950196},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/ThompsonEM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/WijesekeraJ03,
  author       = {Duminda Wijesekera and
                  Sushil Jajodia},
  title        = {A propositional policy algebra for access control},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {6},
  number       = {2},
  pages        = {286--325},
  year         = {2003},
  url          = {https://doi.org/10.1145/762476.762481},
  doi          = {10.1145/762476.762481},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/WijesekeraJ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/YuWS03,
  author       = {Ting Yu and
                  Marianne Winslett and
                  Kent E. Seamons},
  title        = {Supporting structured credentials and sensitive policies through interoperable
                  strategies for automated trust negotiation},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {6},
  number       = {1},
  pages        = {1--42},
  year         = {2003},
  url          = {https://doi.org/10.1145/605434.605435},
  doi          = {10.1145/605434.605435},
  timestamp    = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/YuWS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ZhangAC03,
  author       = {Longhua Zhang and
                  Gail{-}Joon Ahn and
                  Bei{-}tseng Chu},
  title        = {A rule-based framework for role-based delegation and revocation},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {6},
  number       = {3},
  pages        = {404--441},
  year         = {2003},
  url          = {https://doi.org/10.1145/937527.937530},
  doi          = {10.1145/937527.937530},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/ZhangAC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/AtluriG02,
  author       = {Vijayalakshmi Atluri and
                  Avigdor Gal},
  title        = {An authorization model for temporal and derived data: securing information
                  portals},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {5},
  number       = {1},
  pages        = {62--94},
  year         = {2002},
  url          = {https://doi.org/10.1145/504909.504912},
  doi          = {10.1145/504909.504912},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/AtluriG02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BaconMY02,
  author       = {Jean Bacon and
                  Ken Moody and
                  Walt Yao},
  title        = {A model of {OASIS} role-based access control and its support for active
                  security},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {5},
  number       = {4},
  pages        = {492--540},
  year         = {2002},
  url          = {https://doi.org/10.1145/581271.581276},
  doi          = {10.1145/581271.581276},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/BaconMY02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BergadanoGP02,
  author       = {Francesco Bergadano and
                  Daniele Gunetti and
                  Claudia Picardi},
  title        = {User authentication through keystroke dynamics},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {5},
  number       = {4},
  pages        = {367--397},
  year         = {2002},
  url          = {https://doi.org/10.1145/581271.581272},
  doi          = {10.1145/581271.581272},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/BergadanoGP02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BernaschiGM02,
  author       = {Massimo Bernaschi and
                  Emanuele Gabrielli and
                  Luigi V. Mancini},
  title        = {Remus: a security-enhanced operating system},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {5},
  number       = {1},
  pages        = {36--61},
  year         = {2002},
  url          = {https://doi.org/10.1145/504909.504911},
  doi          = {10.1145/504909.504911},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/BernaschiGM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BertinoF02,
  author       = {Elisa Bertino and
                  Elena Ferrari},
  title        = {Secure and selective dissemination of {XML} documents},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {5},
  number       = {3},
  pages        = {290--331},
  year         = {2002},
  url          = {https://doi.org/10.1145/545186.545190},
  doi          = {10.1145/545186.545190},
  timestamp    = {Tue, 12 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/BertinoF02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BlazeIK02,
  author       = {Matt Blaze and
                  John Ioannidis and
                  Angelos D. Keromytis},
  title        = {Trust management for IPsec},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {5},
  number       = {2},
  pages        = {95--118},
  year         = {2002},
  url          = {https://doi.org/10.1145/505586.505587},
  doi          = {10.1145/505586.505587},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/BlazeIK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BonattiVS02,
  author       = {Piero A. Bonatti and
                  Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {An algebra for composing access control policies},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {5},
  number       = {1},
  pages        = {1--35},
  year         = {2002},
  url          = {https://doi.org/10.1145/504909.504910},
  doi          = {10.1145/504909.504910},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/BonattiVS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/DamianiVPS02,
  author       = {Ernesto Damiani and
                  Sabrina De Capitani di Vimercati and
                  Stefano Paraboschi and
                  Pierangela Samarati},
  title        = {A fine-grained access control system for {XML} documents},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {5},
  number       = {2},
  pages        = {169--202},
  year         = {2002},
  url          = {https://doi.org/10.1145/505586.505590},
  doi          = {10.1145/505586.505590},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/DamianiVPS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/DeanFS02,
  author       = {Drew Dean and
                  Matthew K. Franklin and
                  Adam Stubblefield},
  title        = {An algebraic approach to {IP} traceback},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {5},
  number       = {2},
  pages        = {119--137},
  year         = {2002},
  url          = {https://doi.org/10.1145/505586.505588},
  doi          = {10.1145/505586.505588},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/DeanFS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/GordonL02,
  author       = {Lawrence A. Gordon and
                  Martin P. Loeb},
  title        = {The economics of information security investment},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {5},
  number       = {4},
  pages        = {438--457},
  year         = {2002},
  url          = {https://doi.org/10.1145/581271.581274},
  doi          = {10.1145/581271.581274},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/GordonL02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/HarbitterM02,
  author       = {Alan Harbitter and
                  Daniel A. Menasc{\'{e}}},
  title        = {A methodology for analyzing the performance of authentication protocols},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {5},
  number       = {4},
  pages        = {458--491},
  year         = {2002},
  url          = {https://doi.org/10.1145/581271.581275},
  doi          = {10.1145/581271.581275},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/HarbitterM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/KochMP02,
  author       = {Manuel Koch and
                  Luigi V. Mancini and
                  Francesco Parisi{-}Presicce},
  title        = {A graph-based formalism for {RBAC}},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {5},
  number       = {3},
  pages        = {332--365},
  year         = {2002},
  url          = {https://doi.org/10.1145/545186.545191},
  doi          = {10.1145/545186.545191},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/KochMP02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/LoughryU02,
  author       = {Joe Loughry and
                  David A. Umphress},
  title        = {Information leakage from optical emanations},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {5},
  number       = {3},
  pages        = {262--289},
  year         = {2002},
  url          = {https://doi.org/10.1145/545186.545189},
  doi          = {10.1145/545186.545189},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/LoughryU02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/MichaelG02,
  author       = {Christoph C. Michael and
                  Anup K. Ghosh},
  title        = {Simple, state-based approaches to program-based anomaly detection},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {5},
  number       = {3},
  pages        = {203--237},
  year         = {2002},
  url          = {https://doi.org/10.1145/545186.545187},
  doi          = {10.1145/545186.545187},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/MichaelG02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/RudysW02,
  author       = {Algis Rudys and
                  Dan S. Wallach},
  title        = {Termination in language-based systems},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {5},
  number       = {2},
  pages        = {138--168},
  year         = {2002},
  url          = {https://doi.org/10.1145/505586.505589},
  doi          = {10.1145/505586.505589},
  timestamp    = {Mon, 29 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/RudysW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/SwiftHBDGCGJ02,
  author       = {Michael M. Swift and
                  Anne Hopkins and
                  Peter Brundrett and
                  Cliff Van Dyke and
                  Praerit Garg and
                  Shannon Chan and
                  Mario Goertzel and
                  Gregory Jensenworth},
  title        = {Improving the granularity of access control for Windows 2000},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {5},
  number       = {4},
  pages        = {398--437},
  year         = {2002},
  url          = {https://doi.org/10.1145/581271.581273},
  doi          = {10.1145/581271.581273},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/SwiftHBDGCGJ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ViegaBKM02,
  author       = {John Viega and
                  J. T. Bloch and
                  Tadayoshi Kohno and
                  Gary McGraw},
  title        = {Token-based scanning of source code for security problems},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {5},
  number       = {3},
  pages        = {238--261},
  year         = {2002},
  url          = {https://doi.org/10.1145/545186.545188},
  doi          = {10.1145/545186.545188},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/ViegaBKM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BertinoBF01,
  author       = {Elisa Bertino and
                  Piero A. Bonatti and
                  Elena Ferrari},
  title        = {{TRBAC:} {A} temporal role-based access control model},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {4},
  number       = {3},
  pages        = {191--233},
  year         = {2001},
  url          = {https://doi.org/10.1145/501978.501979},
  doi          = {10.1145/501978.501979},
  timestamp    = {Tue, 12 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/BertinoBF01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BertinoCF01,
  author       = {Elisa Bertino and
                  Barbara Catania and
                  Elena Ferrari},
  title        = {A nested transaction model for multilevel secure database management
                  systems},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {4},
  number       = {4},
  pages        = {321--370},
  year         = {2001},
  url          = {https://doi.org/10.1145/503339.503340},
  doi          = {10.1145/503339.503340},
  timestamp    = {Tue, 12 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/BertinoCF01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ChangWJ01,
  author       = {Ho{-}Yen Chang and
                  Shyhtsun Felix Wu and
                  Y. Frank Jou},
  title        = {Real-time protocol analysis for detecting link-state routing protocol
                  attacks},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {4},
  number       = {1},
  pages        = {1--36},
  year         = {2001},
  url          = {https://doi.org/10.1145/383775.383776},
  doi          = {10.1145/383775.383776},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/ChangWJ01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/FerraioloSGKC01,
  author       = {David F. Ferraiolo and
                  Ravi S. Sandhu and
                  Serban I. Gavrila and
                  D. Richard Kuhn and
                  Ramaswamy Chandramouli},
  title        = {Proposed {NIST} standard for role-based access control},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {4},
  number       = {3},
  pages        = {224--274},
  year         = {2001},
  url          = {https://doi.org/10.1145/501978.501980},
  doi          = {10.1145/501978.501980},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/FerraioloSGKC01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/JaegerT01,
  author       = {Trent Jaeger and
                  Jonathon Tidswell},
  title        = {Practical safety in flexible access control models},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {4},
  number       = {2},
  pages        = {158--190},
  year         = {2001},
  url          = {https://doi.org/10.1145/501963.501966},
  doi          = {10.1145/501963.501966},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/JaegerT01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/Kaliski01,
  author       = {Burton S. Kaliski Jr.},
  title        = {An unknown key-share attack on the {MQV} key agreement protocol},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {4},
  number       = {3},
  pages        = {275--288},
  year         = {2001},
  url          = {https://doi.org/10.1145/501978.501981},
  doi          = {10.1145/501978.501981},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/Kaliski01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/KihlstromMM01,
  author       = {Kim Potter Kihlstrom and
                  Louise E. Moser and
                  P. M. Melliar{-}Smith},
  title        = {The SecureRing group communication system},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {4},
  number       = {4},
  pages        = {371--406},
  year         = {2001},
  url          = {https://doi.org/10.1145/503339.503341},
  doi          = {10.1145/503339.503341},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/KihlstromMM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/NingJW01,
  author       = {Peng Ning and
                  Sushil Jajodia and
                  Xiaoyang Sean Wang},
  title        = {Abstraction-based intrusion detection in distributed environments},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {4},
  number       = {4},
  pages        = {407--452},
  year         = {2001},
  url          = {https://doi.org/10.1145/503339.503342},
  doi          = {10.1145/503339.503342},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/NingJW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ParkSA01,
  author       = {Joon S. Park and
                  Ravi S. Sandhu and
                  Gail{-}Joon Ahn},
  title        = {Role-based access control on the web},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {4},
  number       = {1},
  pages        = {37--71},
  year         = {2001},
  url          = {https://doi.org/10.1145/383775.383777},
  doi          = {10.1145/383775.383777},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/ParkSA01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/RodehBD01,
  author       = {Ohad Rodeh and
                  Kenneth P. Birman and
                  Danny Dolev},
  title        = {The architecture and performance of security protocols in the ensemble
                  group communication system: Using diamonds to guard the castle},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {4},
  number       = {3},
  pages        = {289--319},
  year         = {2001},
  url          = {https://doi.org/10.1145/501978.501982},
  doi          = {10.1145/501978.501982},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/RodehBD01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/SamaratiRJ01,
  author       = {Pierangela Samarati and
                  Michael K. Reiter and
                  Sushil Jajodia},
  title        = {An authorization model for a public key management service},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {4},
  number       = {4},
  pages        = {453--482},
  year         = {2001},
  url          = {https://doi.org/10.1145/503339.503343},
  doi          = {10.1145/503339.503343},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/SamaratiRJ01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ShandsJYS01,
  author       = {Deborah Shands and
                  Jay Jacobs and
                  Richard Yee and
                  E. John Sebes},
  title        = {Secure virtual enclaves: Supporting coalition use of distributed application
                  technologies},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {4},
  number       = {2},
  pages        = {103--133},
  year         = {2001},
  url          = {https://doi.org/10.1145/501963.501964},
  doi          = {10.1145/501963.501964},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/ShandsJYS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/Smith01,
  author       = {Richard E. Smith},
  title        = {Cost profile of a highly assured, secure operating system},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {4},
  number       = {1},
  pages        = {72--101},
  year         = {2001},
  url          = {https://doi.org/10.1145/383775.383778},
  doi          = {10.1145/383775.383778},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/Smith01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/SteinerBEW01,
  author       = {Michael Steiner and
                  Peter Buhler and
                  Thomas Eirich and
                  Michael Waidner},
  title        = {Secure password-based cipher suite for {TLS}},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {4},
  number       = {2},
  pages        = {134--157},
  year         = {2001},
  url          = {https://doi.org/10.1145/501963.501965},
  doi          = {10.1145/501963.501965},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/SteinerBEW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/AhnS00,
  author       = {Gail{-}Joon Ahn and
                  Ravi S. Sandhu},
  title        = {Role-based authorization constraints specification},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {3},
  number       = {4},
  pages        = {207--226},
  year         = {2000},
  url          = {https://doi.org/10.1145/382912.382913},
  doi          = {10.1145/382912.382913},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/AhnS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/Axelsson00,
  author       = {Stefan Axelsson},
  title        = {The base-rate fallacy and the difficulty of intrusion detection},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {3},
  number       = {3},
  pages        = {186--205},
  year         = {2000},
  url          = {https://doi.org/10.1145/357830.357849},
  doi          = {10.1145/357830.357849},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/Axelsson00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/CramerS00,
  author       = {Ronald Cramer and
                  Victor Shoup},
  title        = {Signature schemes based on the strong {RSA} assumption},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {3},
  number       = {3},
  pages        = {161--185},
  year         = {2000},
  url          = {https://doi.org/10.1145/357830.357847},
  doi          = {10.1145/357830.357847},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/CramerS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/DolevO00,
  author       = {Shlomi Dolev and
                  Rafail Ostrovsky},
  title        = {Xor-trees for efficient anonymous multicast and reception},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {3},
  number       = {2},
  pages        = {63--84},
  year         = {2000},
  url          = {https://doi.org/10.1145/354876.354877},
  doi          = {10.1145/354876.354877},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/DolevO00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/Frincke00,
  author       = {Deborah A. Frincke},
  title        = {Balancing cooperation and risk in intrusion detection},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {3},
  number       = {1},
  pages        = {1--29},
  year         = {2000},
  url          = {https://doi.org/10.1145/353323.353324},
  doi          = {10.1145/353323.353324},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/Frincke00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/LeeS00,
  author       = {Wenke Lee and
                  Salvatore J. Stolfo},
  title        = {A framework for constructing features and models for intrusion detection
                  systems},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {3},
  number       = {4},
  pages        = {227--261},
  year         = {2000},
  url          = {https://doi.org/10.1145/382912.382914},
  doi          = {10.1145/382912.382914},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/LeeS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/McHugh00,
  author       = {John McHugh},
  title        = {Testing Intrusion detection systems: a critique of the 1998 and 1999
                  {DARPA} intrusion detection system evaluations as performed by Lincoln
                  Laboratory},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {3},
  number       = {4},
  pages        = {262--294},
  year         = {2000},
  url          = {https://doi.org/10.1145/382912.382923},
  doi          = {10.1145/382912.382923},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/McHugh00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/MolvaP00,
  author       = {Refik Molva and
                  Alain Pannetrat},
  title        = {Scalable multicast security with dynamic recipient groups},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {3},
  number       = {3},
  pages        = {136--160},
  year         = {2000},
  url          = {https://doi.org/10.1145/357830.357834},
  doi          = {10.1145/357830.357834},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/MolvaP00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/OsbornSM00,
  author       = {Sylvia L. Osborn and
                  Ravi S. Sandhu and
                  Qamar Munawer},
  title        = {Configuring role-based access control to enforce mandatory and discretionary
                  access control policies},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {3},
  number       = {2},
  pages        = {85--106},
  year         = {2000},
  url          = {https://doi.org/10.1145/354876.354878},
  doi          = {10.1145/354876.354878},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/OsbornSM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/Schneider00,
  author       = {Fred B. Schneider},
  title        = {Enforceable security policies},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {3},
  number       = {1},
  pages        = {30--50},
  year         = {2000},
  url          = {https://doi.org/10.1145/353323.353382},
  doi          = {10.1145/353323.353382},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/Schneider00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/Spinellis00,
  author       = {Diomidis Spinellis},
  title        = {Reflection as a mechanism for software integrity verification},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {3},
  number       = {1},
  pages        = {51--62},
  year         = {2000},
  url          = {https://doi.org/10.1145/353323.353383},
  doi          = {10.1145/353323.353383},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/Spinellis00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/Wool00,
  author       = {Avishai Wool},
  title        = {Key management for encrypted broadcast},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {3},
  number       = {2},
  pages        = {107--134},
  year         = {2000},
  url          = {https://doi.org/10.1145/354876.354879},
  doi          = {10.1145/354876.354879},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/Wool00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BertinoFA99,
  author       = {Elisa Bertino and
                  Elena Ferrari and
                  Vijayalakshmi Atluri},
  title        = {The Specification and Enforcement of Authorization Constraints in
                  Workflow Management Systems},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {2},
  number       = {1},
  pages        = {65--104},
  year         = {1999},
  url          = {https://doi.org/10.1145/300830.300837},
  doi          = {10.1145/300830.300837},
  timestamp    = {Tue, 12 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/BertinoFA99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/FerraioloBK99,
  author       = {David F. Ferraiolo and
                  John F. Barkley and
                  D. Richard Kuhn},
  title        = {A Role-Based Access Control Model and Reference Implementation within
                  a Corporate Intranet},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {2},
  number       = {1},
  pages        = {34--64},
  year         = {1999},
  url          = {https://doi.org/10.1145/300830.300834},
  doi          = {10.1145/300830.300834},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/FerraioloBK99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/GabberGKMM99,
  author       = {Eran Gabber and
                  Phillip B. Gibbons and
                  David M. Kristol and
                  Yossi Matias and
                  Alain J. Mayer},
  title        = {On secure and pseudonymous client-relationships with multiple servers},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {2},
  number       = {4},
  pages        = {390--415},
  year         = {1999},
  url          = {https://doi.org/10.1145/330382.330386},
  doi          = {10.1145/330382.330386},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/GabberGKMM99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/HaleviK99,
  author       = {Shai Halevi and
                  Hugo Krawczyk},
  title        = {Public-Key Cryptography and Password Protocols},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {2},
  number       = {3},
  pages        = {230--268},
  year         = {1999},
  url          = {https://doi.org/10.1145/322510.322514},
  doi          = {10.1145/322510.322514},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/HaleviK99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/HeviaK99,
  author       = {Alejandro Hevia and
                  Marcos A. Kiwi},
  title        = {Strength of two data encryption standard implementations under timing
                  attacks},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {2},
  number       = {4},
  pages        = {416--437},
  year         = {1999},
  url          = {https://doi.org/10.1145/330382.330390},
  doi          = {10.1145/330382.330390},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/HeviaK99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/JaegerPLI99,
  author       = {Trent Jaeger and
                  Atul Prakash and
                  Jochen Liedtke and
                  Nayeem Islam},
  title        = {Flexible Control of Downloaded Executable Content},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {2},
  number       = {2},
  pages        = {177--228},
  year         = {1999},
  url          = {https://doi.org/10.1145/317087.317091},
  doi          = {10.1145/317087.317091},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/JaegerPLI99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/LaneB99,
  author       = {Terran Lane and
                  Carla E. Brodley},
  title        = {Temporal Sequence Learning and Data Reduction for Anomaly Detection},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {2},
  number       = {3},
  pages        = {295--331},
  year         = {1999},
  url          = {https://doi.org/10.1145/322510.322526},
  doi          = {10.1145/322510.322526},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/LaneB99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/NyanchamaO99,
  author       = {Matunda Nyanchama and
                  Sylvia L. Osborn},
  title        = {The Role Graph Model and Conflict of Interest},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {2},
  number       = {1},
  pages        = {3--33},
  year         = {1999},
  url          = {https://doi.org/10.1145/300830.300832},
  doi          = {10.1145/300830.300832},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/NyanchamaO99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/Paulson99,
  author       = {Lawrence C. Paulson},
  title        = {Inductive Analysis of the Internet Protocol {TLS}},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {2},
  number       = {3},
  pages        = {332--351},
  year         = {1999},
  url          = {https://doi.org/10.1145/322510.322530},
  doi          = {10.1145/322510.322530},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/Paulson99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ReiterS99,
  author       = {Michael K. Reiter and
                  Stuart G. Stubblebine},
  title        = {Authentication Metric Analysis and Design},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {2},
  number       = {2},
  pages        = {138--158},
  year         = {1999},
  url          = {https://doi.org/10.1145/317087.317088},
  doi          = {10.1145/317087.317088},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/ReiterS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/Sandhu99,
  author       = {Ravi S. Sandhu},
  title        = {Editorial},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {2},
  number       = {1},
  pages        = {1--2},
  year         = {1999},
  url          = {https://doi.org/10.1145/300830.317086},
  doi          = {10.1145/300830.317086},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/Sandhu99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/SandhuBM99,
  author       = {Ravi S. Sandhu and
                  Venkata Bhamidipati and
                  Qamar Munawer},
  title        = {The {ARBAC97} Model for Role-Based Administration of Roles},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {2},
  number       = {1},
  pages        = {105--135},
  year         = {1999},
  url          = {https://doi.org/10.1145/300830.300839},
  doi          = {10.1145/300830.300839},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/SandhuBM99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/SchneierK99,
  author       = {Bruce Schneier and
                  John Kelsey},
  title        = {Secure Audit Logs to Support Computer Forensics},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {2},
  number       = {2},
  pages        = {159--176},
  year         = {1999},
  url          = {https://doi.org/10.1145/317087.317089},
  doi          = {10.1145/317087.317089},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/SchneierK99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/StubblebineSG99,
  author       = {Stuart G. Stubblebine and
                  Paul F. Syverson and
                  David M. Goldschlag},
  title        = {Unlinkable serial transactions: protocols and applications},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {2},
  number       = {4},
  pages        = {354--389},
  year         = {1999},
  url          = {https://doi.org/10.1145/330382.330384},
  doi          = {10.1145/330382.330384},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/StubblebineSG99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/XuS99,
  author       = {Jun Xu and
                  Mukesh Singhal},
  title        = {Design of a High-Performance {ATM} Firewall},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {2},
  number       = {3},
  pages        = {269--294},
  year         = {1999},
  url          = {https://doi.org/10.1145/322510.322520},
  doi          = {10.1145/322510.322520},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/XuS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BergadanoCR98,
  author       = {Francesco Bergadano and
                  Bruno Crispo and
                  Giancarlo Ruffo},
  title        = {High Dictionary Compression for Proactive Password Checking},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {1},
  number       = {1},
  pages        = {3--25},
  year         = {1998},
  url          = {https://doi.org/10.1145/290163.290164},
  doi          = {10.1145/290163.290164},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/BergadanoCR98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BertinoVFS98,
  author       = {Elisa Bertino and
                  Sabrina De Capitani di Vimercati and
                  Elena Ferrari and
                  Pierangela Samarati},
  title        = {Exception-Based Information Flow Control in Object-Oriented Systems},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {1},
  number       = {1},
  pages        = {26--65},
  year         = {1998},
  url          = {https://doi.org/10.1145/290163.290167},
  doi          = {10.1145/290163.290167},
  timestamp    = {Tue, 12 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/BertinoVFS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ReiterR98,
  author       = {Michael K. Reiter and
                  Aviel D. Rubin},
  title        = {Crowds: Anonymity for Web Transactions},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {1},
  number       = {1},
  pages        = {66--92},
  year         = {1998},
  url          = {https://doi.org/10.1145/290163.290168},
  doi          = {10.1145/290163.290168},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/ReiterR98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/Sandhu98,
  author       = {Ravi S. Sandhu},
  title        = {Editorial},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {1},
  number       = {1},
  pages        = {1--2},
  year         = {1998},
  url          = {https://doi.org/10.1145/290163.290166},
  doi          = {10.1145/290163.290166},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/Sandhu98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/SandhuC98,
  author       = {Ravi S. Sandhu and
                  Fang Chen},
  title        = {The Multilevel Relational {(MLR)} Data Model},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {1},
  number       = {1},
  pages        = {93--132},
  year         = {1998},
  url          = {https://doi.org/10.1145/290163.290171},
  doi          = {10.1145/290163.290171},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/SandhuC98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}