default search action
Search dblp for Publications
export results for "toc:db/journals/tissec/tissec21.bht:"
@article{DBLP:journals/tissec/AbdouO18, author = {AbdelRahman Abdou and Paul C. van Oorschot}, title = {Server Location Verification {(SLV)} and Server Location Pinning: Augmenting {TLS} Authentication}, journal = {{ACM} Trans. Priv. Secur.}, volume = {21}, number = {1}, pages = {1:1--1:26}, year = {2018}, url = {https://doi.org/10.1145/3139294}, doi = {10.1145/3139294}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/AbdouO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/AlrabaeeSWD18, author = {Saed Alrabaee and Paria Shirani and Lingyu Wang and Mourad Debbabi}, title = {\emph{FOSSIL}: {A} Resilient and Efficient System for Identifying {FOSS} Functions in Malware Binaries}, journal = {{ACM} Trans. Priv. Secur.}, volume = {21}, number = {2}, pages = {8:1--8:34}, year = {2018}, url = {https://doi.org/10.1145/3175492}, doi = {10.1145/3175492}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/AlrabaeeSWD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BhattacharyaM18, author = {Sarani Bhattacharya and Debdeep Mukhopadhyay}, title = {Utilizing Performance Counters for Compromising Public Key Ciphers}, journal = {{ACM} Trans. Priv. Secur.}, volume = {21}, number = {1}, pages = {5:1--5:31}, year = {2018}, url = {https://doi.org/10.1145/3156015}, doi = {10.1145/3156015}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/BhattacharyaM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BotacinGG18, author = {Marcus Botacin and Paulo L{\'{\i}}cio de Geus and Andr{\'{e}} Gr{\'{e}}gio}, title = {Enhancing Branch Monitoring for Security Purposes: From Control Flow Integrity to Malware Analysis and Debugging}, journal = {{ACM} Trans. Priv. Secur.}, volume = {21}, number = {1}, pages = {4:1--4:30}, year = {2018}, url = {https://doi.org/10.1145/3152162}, doi = {10.1145/3152162}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/BotacinGG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/CarminatiPCLMZ18, author = {Michele Carminati and Mario Polino and Andrea Continella and Andrea Lanzi and Federico Maggi and Stefano Zanero}, title = {Security Evaluation of a Banking Fraud Analysis System}, journal = {{ACM} Trans. Priv. Secur.}, volume = {21}, number = {3}, pages = {11:1--11:31}, year = {2018}, url = {https://doi.org/10.1145/3178370}, doi = {10.1145/3178370}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/CarminatiPCLMZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/FarrisSCGJ18, author = {Katheryn A. Farris and Ankit Shah and George Cybenko and Rajesh Ganesan and Sushil Jajodia}, title = {{VULCON:} {A} System for Vulnerability Prioritization, Mitigation, and Management}, journal = {{ACM} Trans. Priv. Secur.}, volume = {21}, number = {4}, pages = {16:1--16:28}, year = {2018}, url = {https://doi.org/10.1145/3196884}, doi = {10.1145/3196884}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/FarrisSCGJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/GiacobazziM18, author = {Roberto Giacobazzi and Isabella Mastroeni}, title = {Abstract Non-Interference: {A} Unifying Framework for Weakening Information-flow}, journal = {{ACM} Trans. Priv. Secur.}, volume = {21}, number = {2}, pages = {9:1--9:31}, year = {2018}, url = {https://doi.org/10.1145/3175660}, doi = {10.1145/3175660}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/GiacobazziM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/GongL18, author = {Neil Zhenqiang Gong and Bin Liu}, title = {Attribute Inference Attacks in Online Social Networks}, journal = {{ACM} Trans. Priv. Secur.}, volume = {21}, number = {1}, pages = {3:1--3:30}, year = {2018}, url = {https://doi.org/10.1145/3154793}, doi = {10.1145/3154793}, timestamp = {Mon, 31 Oct 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/GongL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/KelbertP18, author = {Florian Kelbert and Alexander Pretschner}, title = {Data Usage Control for Distributed Systems}, journal = {{ACM} Trans. Priv. Secur.}, volume = {21}, number = {3}, pages = {12:1--12:32}, year = {2018}, url = {https://doi.org/10.1145/3183342}, doi = {10.1145/3183342}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/KelbertP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/KimKKYSK18, author = {Jinsu Kim and Dongyoung Koo and Yuna Kim and Hyunsoo Yoon and Junbum Shin and Sungwook Kim}, title = {Efficient Privacy-Preserving Matrix Factorization for Recommendation via Fully Homomorphic Encryption}, journal = {{ACM} Trans. Priv. Secur.}, volume = {21}, number = {4}, pages = {17:1--17:30}, year = {2018}, url = {https://doi.org/10.1145/3212509}, doi = {10.1145/3212509}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/KimKKYSK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/LevesqueCSF18, author = {Fanny Lalonde L{\'{e}}vesque and Sonia Chiasson and Anil Somayaji and Jos{\'{e}} M. Fernandez}, title = {Technological and Human Factors of Malware Attacks: {A} Computer Security Clinical Trial Approach}, journal = {{ACM} Trans. Priv. Secur.}, volume = {21}, number = {4}, pages = {18:1--18:30}, year = {2018}, url = {https://doi.org/10.1145/3210311}, doi = {10.1145/3210311}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/LevesqueCSF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/PinkasSZ18, author = {Benny Pinkas and Thomas Schneider and Michael Zohner}, title = {Scalable Private Set Intersection Based on {OT} Extension}, journal = {{ACM} Trans. Priv. Secur.}, volume = {21}, number = {2}, pages = {7:1--7:35}, year = {2018}, url = {https://doi.org/10.1145/3154794}, doi = {10.1145/3154794}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/PinkasSZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ShiMA18, author = {Hao Shi and Jelena Mirkovic and Abdulla Alwabel}, title = {Handling Anti-Virtual Machine Techniques in Malicious Software}, journal = {{ACM} Trans. Priv. Secur.}, volume = {21}, number = {1}, pages = {2:1--2:31}, year = {2018}, url = {https://doi.org/10.1145/3139292}, doi = {10.1145/3139292}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/ShiMA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/SonNCK18, author = {Yunmok Son and Juhwan Noh and Jaeyeong Choi and Yongdae Kim}, title = {GyrosFinger: Fingerprinting Drones for Location Tracking Based on the Outputs of {MEMS} Gyroscopes}, journal = {{ACM} Trans. Priv. Secur.}, volume = {21}, number = {2}, pages = {10:1--10:25}, year = {2018}, url = {https://doi.org/10.1145/3177751}, doi = {10.1145/3177751}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/SonNCK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/StobertB18, author = {Elizabeth Stobert and Robert Biddle}, title = {The Password Life Cycle}, journal = {{ACM} Trans. Priv. Secur.}, volume = {21}, number = {3}, pages = {13:1--13:32}, year = {2018}, url = {https://doi.org/10.1145/3183341}, doi = {10.1145/3183341}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/StobertB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/WeiROR18, author = {Fengguo Wei and Sankardas Roy and Xinming Ou and Robby}, title = {Amandroid: {A} Precise and General Inter-component Data Flow Analysis Framework for Security Vetting of Android Apps}, journal = {{ACM} Trans. Priv. Secur.}, volume = {21}, number = {3}, pages = {14:1--14:32}, year = {2018}, url = {https://doi.org/10.1145/3183575}, doi = {10.1145/3183575}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/WeiROR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/YeTFCWAW18, author = {Guixin Ye and Zhanyong Tang and Dingyi Fang and Xiaojiang Chen and Willy Wolff and Adam J. Aviv and Zheng Wang}, title = {A Video-based Attack for Android Pattern Lock}, journal = {{ACM} Trans. Priv. Secur.}, volume = {21}, number = {4}, pages = {19:1--19:31}, year = {2018}, url = {https://doi.org/10.1145/3230740}, doi = {10.1145/3230740}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/YeTFCWAW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ZhangBA18, author = {Yihua Zhang and Marina Blanton and Ghada Almashaqbeh}, title = {Implementing Support for Pointers to Private Data in a General-Purpose Secure Multi-Party Compiler}, journal = {{ACM} Trans. Priv. Secur.}, volume = {21}, number = {2}, pages = {6:1--6:34}, year = {2018}, url = {https://doi.org/10.1145/3154600}, doi = {10.1145/3154600}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/ZhangBA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ZhangPK18, author = {Yupeng Zhang and Charalampos Papamanthou and Jonathan Katz}, title = {Verifiable Graph Processing}, journal = {{ACM} Trans. Priv. Secur.}, volume = {21}, number = {4}, pages = {20:1--20:23}, year = {2018}, url = {https://doi.org/10.1145/3233181}, doi = {10.1145/3233181}, timestamp = {Thu, 29 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/ZhangPK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ZhaoD18, author = {Siqi Zhao and Xuhua Ding}, title = {{FIMCE:} {A} Fully Isolated Micro-Computing Environment for Multicore Systems}, journal = {{ACM} Trans. Priv. Secur.}, volume = {21}, number = {3}, pages = {15:1--15:30}, year = {2018}, url = {https://doi.org/10.1145/3195181}, doi = {10.1145/3195181}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/ZhaoD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.