default search action
Search dblp for Publications
export results for "toc:db/journals/jcs/jcs14.bht:"
@article{DBLP:journals/jcs/AimeurBO06, author = {Esma A{\"{\i}}meur and Gilles Brassard and Flavien Serge Mani Onana}, title = {Blind Electronic Commerce}, journal = {J. Comput. Secur.}, volume = {14}, number = {6}, pages = {535--559}, year = {2006}, url = {https://doi.org/10.3233/jcs-2006-14603}, doi = {10.3233/JCS-2006-14603}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/AimeurBO06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/Bhargav-SpantzelSB06, author = {Abhilasha Bhargav{-}Spantzel and Anna Cinzia Squicciarini and Elisa Bertino}, title = {Establishing and protecting digital identity in federation systems}, journal = {J. Comput. Secur.}, volume = {14}, number = {3}, pages = {269--300}, year = {2006}, url = {https://doi.org/10.3233/jcs-2006-14303}, doi = {10.3233/JCS-2006-14303}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/Bhargav-SpantzelSB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/BlythT06, author = {Andrew Blyth and Paula Thomas}, title = {Performing real-time threat assessment of security incidents using data fusion of {IDS} logs}, journal = {J. Comput. Secur.}, volume = {14}, number = {6}, pages = {513--534}, year = {2006}, url = {https://doi.org/10.3233/jcs-2006-14602}, doi = {10.3233/JCS-2006-14602}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/BlythT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/BraghinGS06, author = {Chiara Braghin and Daniele Gorla and Vladimiro Sassone}, title = {Role-based access control for a distributed calculus}, journal = {J. Comput. Secur.}, volume = {14}, number = {2}, pages = {113--155}, year = {2006}, url = {https://doi.org/10.3233/jcs-2006-14202}, doi = {10.3233/JCS-2006-14202}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/BraghinGS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/CandebatG06, author = {Thibault Candebat and David Gray}, title = {Secure pseudonym management using mediated identity-based encryption}, journal = {J. Comput. Secur.}, volume = {14}, number = {3}, pages = {249--267}, year = {2006}, url = {https://doi.org/10.3233/jcs-2006-14302}, doi = {10.3233/JCS-2006-14302}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/CandebatG06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/CimatoCD06, author = {Stelvio Cimato and Antonella Cresti and Paolo D'Arco}, title = {A unified model for unconditionally secure key distribution}, journal = {J. Comput. Secur.}, volume = {14}, number = {1}, pages = {45--64}, year = {2006}, url = {https://doi.org/10.3233/jcs-2006-14102}, doi = {10.3233/JCS-2006-14102}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/CimatoCD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/CortierDL06, author = {V{\'{e}}ronique Cortier and St{\'{e}}phanie Delaune and Pascal Lafourcade}, title = {A survey of algebraic properties used in cryptographic protocols}, journal = {J. Comput. Secur.}, volume = {14}, number = {1}, pages = {1--43}, year = {2006}, url = {https://doi.org/10.3233/jcs-2006-14101}, doi = {10.3233/JCS-2006-14101}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/CortierDL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/EamaniS06, author = {Arun K. Eamani and A. Prasad Sistla}, title = {Language based policy analysis in a {SPKI} Trust Management System}, journal = {J. Comput. Secur.}, volume = {14}, number = {4}, pages = {327--357}, year = {2006}, url = {https://doi.org/10.3233/jcs-2006-14402}, doi = {10.3233/JCS-2006-14402}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/EamaniS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/Focardi06, author = {Riccardo Focardi}, title = {Preface}, journal = {J. Comput. Secur.}, volume = {14}, number = {2}, pages = {111}, year = {2006}, url = {https://doi.org/10.3233/jcs-2006-14201}, doi = {10.3233/JCS-2006-14201}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/Focardi06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/FocardiR06, author = {Riccardo Focardi and Sabina Rossi}, title = {Information flow security in dynamic contexts}, journal = {J. Comput. Secur.}, volume = {14}, number = {1}, pages = {65--110}, year = {2006}, url = {https://doi.org/10.3233/jcs-2006-14103}, doi = {10.3233/JCS-2006-14103}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/FocardiR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/Goto06, author = {Atsuhiro Goto}, title = {Preface}, journal = {J. Comput. Secur.}, volume = {14}, number = {3}, pages = {247}, year = {2006}, url = {https://doi.org/10.3233/jcs-2006-14301}, doi = {10.3233/JCS-2006-14301}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/Goto06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/LippertKWB06, author = {Marcus Lippert and Vangelis Karatsiolis and Alexander Wiesmaier and Johannes Buchmann}, title = {Life-cycle management of {X.509} certificates based on {LDAP} directories}, journal = {J. Comput. Secur.}, volume = {14}, number = {5}, pages = {419--439}, year = {2006}, url = {https://doi.org/10.3233/jcs-2006-14503}, doi = {10.3233/JCS-2006-14503}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/LippertKWB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/Lopez06, author = {Javier L{\'{o}}pez}, title = {Unleashing public-key cryptography in wireless sensor networks}, journal = {J. Comput. Secur.}, volume = {14}, number = {5}, pages = {469--482}, year = {2006}, url = {https://doi.org/10.3233/jcs-2006-14505}, doi = {10.3233/JCS-2006-14505}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/Lopez06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/McDanielP06, author = {Patrick D. McDaniel and Atul Prakash}, title = {Enforcing provisioning and authorization policy in the Antigone system}, journal = {J. Comput. Secur.}, volume = {14}, number = {6}, pages = {483--511}, year = {2006}, url = {https://doi.org/10.3233/jcs-2006-14601}, doi = {10.3233/JCS-2006-14601}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcs/McDanielP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/MyersSZ06, author = {Andrew C. Myers and Andrei Sabelfeld and Steve Zdancewic}, title = {Enforcing Robust Declassification and Qualified Robustness}, journal = {J. Comput. Secur.}, volume = {14}, number = {2}, pages = {157--196}, year = {2006}, url = {https://doi.org/10.3233/jcs-2006-14203}, doi = {10.3233/JCS-2006-14203}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/MyersSZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/NormanS06, author = {Gethin Norman and Vitaly Shmatikov}, title = {Analysis of probabilistic contract signing}, journal = {J. Comput. Secur.}, volume = {14}, number = {6}, pages = {561--589}, year = {2006}, url = {https://doi.org/10.3233/jcs-2006-14604}, doi = {10.3233/JCS-2006-14604}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/NormanS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/PereiraQ06, author = {Olivier Pereira and Jean{-}Jacques Quisquater}, title = {On the impossibility of building secure Cliques-type authenticated group key agreement protocols}, journal = {J. Comput. Secur.}, volume = {14}, number = {2}, pages = {197--246}, year = {2006}, url = {https://doi.org/10.3233/jcs-2006-14204}, doi = {10.3233/JCS-2006-14204}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/PereiraQ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/Price06, author = {Geraint Price}, title = {Public Key Infrastructures: {A} research agenda}, journal = {J. Comput. Secur.}, volume = {14}, number = {5}, pages = {391--417}, year = {2006}, url = {https://doi.org/10.3233/jcs-2006-14502}, doi = {10.3233/JCS-2006-14502}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/Price06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/Smith06, author = {Geoffrey Smith}, title = {Improved typings for probabilistic noninterference in a multi-threaded language}, journal = {J. Comput. Secur.}, volume = {14}, number = {6}, pages = {591--623}, year = {2006}, url = {https://doi.org/10.3233/jcs-2006-14605}, doi = {10.3233/JCS-2006-14605}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/Smith06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/Wang06, author = {Guilin Wang}, title = {Generic non-repudiation protocols supporting transparent off-line {TTP}}, journal = {J. Comput. Secur.}, volume = {14}, number = {5}, pages = {441--467}, year = {2006}, url = {https://doi.org/10.3233/jcs-2006-14504}, doi = {10.3233/JCS-2006-14504}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/Wang06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/XiaVWGK06, author = {Jianhong Xia and Sarma Vangala and Jiang Wu and Lixin Gao and Kevin A. Kwiat}, title = {Effective worm detection for various scan techniques}, journal = {J. Comput. Secur.}, volume = {14}, number = {4}, pages = {359--387}, year = {2006}, url = {https://doi.org/10.3233/jcs-2006-14403}, doi = {10.3233/JCS-2006-14403}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/XiaVWGK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/ZhouK06, author = {Jianying Zhou and Meng{-}Chow Kang}, title = {Preface}, journal = {J. Comput. Secur.}, volume = {14}, number = {5}, pages = {389--390}, year = {2006}, url = {https://doi.org/10.3233/jcs-2006-14501}, doi = {10.3233/JCS-2006-14501}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/ZhouK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/ZhuSXJ06, author = {Sencun Zhu and Sanjeev Setia and Shouhuai Xu and Sushil Jajodia}, title = {{GKMPAN:} An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks}, journal = {J. Comput. Secur.}, volume = {14}, number = {4}, pages = {301--325}, year = {2006}, url = {https://doi.org/10.3233/jcs-2006-14401}, doi = {10.3233/JCS-2006-14401}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/ZhuSXJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.