Search dblp for Publications

export results for "toc:db/journals/tissec/tissec7.bht:"

 download as .bib file

@article{DBLP:journals/tissec/AielloBBCIKR04,
  author       = {William Aiello and
                  Steven M. Bellovin and
                  Matt Blaze and
                  Ran Canetti and
                  John Ioannidis and
                  Angelos D. Keromytis and
                  Omer Reingold},
  title        = {Just fast keying: Key agreement in a hostile internet},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {7},
  number       = {2},
  pages        = {242--273},
  year         = {2004},
  url          = {https://doi.org/10.1145/996943.996946},
  doi          = {10.1145/996943.996946},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/AielloBBCIKR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/AmirKNT04,
  author       = {Yair Amir and
                  Yongdae Kim and
                  Cristina Nita{-}Rotaru and
                  Gene Tsudik},
  title        = {On the performance of group key agreement protocols},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {7},
  number       = {3},
  pages        = {457--488},
  year         = {2004},
  url          = {https://doi.org/10.1145/1015040.1015045},
  doi          = {10.1145/1015040.1015045},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/AmirKNT04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/Ateniese04,
  author       = {Giuseppe Ateniese},
  title        = {Verifiable encryption of digital signatures and applications},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {7},
  number       = {1},
  pages        = {1--20},
  year         = {2004},
  url          = {https://doi.org/10.1145/984334.984335},
  doi          = {10.1145/984334.984335},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/Ateniese04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BellareKN04,
  author       = {Mihir Bellare and
                  Tadayoshi Kohno and
                  Chanathip Namprempre},
  title        = {Breaking and provably repairing the {SSH} authenticated encryption
                  scheme: {A} case study of the Encode-then-Encrypt-and-MAC paradigm},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {7},
  number       = {2},
  pages        = {206--241},
  year         = {2004},
  url          = {https://doi.org/10.1145/996943.996945},
  doi          = {10.1145/996943.996945},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/BellareKN04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/CarrierS04,
  author       = {Brian D. Carrier and
                  Clay Shields},
  title        = {The session token protocol for forensics and traceback},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {7},
  number       = {3},
  pages        = {333--362},
  year         = {2004},
  url          = {https://doi.org/10.1145/1015040.1015041},
  doi          = {10.1145/1015040.1015041},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/CarrierS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/HessHJS04,
  author       = {Adam Hess and
                  Jason E. Holt and
                  Jared Jacobson and
                  Kent E. Seamons},
  title        = {Content-triggered trust negotiation},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {7},
  number       = {3},
  pages        = {428--456},
  year         = {2004},
  url          = {https://doi.org/10.1145/1015040.1015044},
  doi          = {10.1145/1015040.1015044},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/HessHJS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/HuangM04,
  author       = {Dijiang Huang and
                  Deep Medhi},
  title        = {A key-chain-based keying scheme for many-to-many secure group communication},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {7},
  number       = {4},
  pages        = {523--552},
  year         = {2004},
  url          = {https://doi.org/10.1145/1042031.1042033},
  doi          = {10.1145/1042031.1042033},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/HuangM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/JaegerEZ04,
  author       = {Trent Jaeger and
                  Antony Edwards and
                  Xiaolan Zhang},
  title        = {Consistency analysis of authorization hook placement in the Linux
                  security modules framework},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {7},
  number       = {2},
  pages        = {175--205},
  year         = {2004},
  url          = {https://doi.org/10.1145/996943.996944},
  doi          = {10.1145/996943.996944},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/JaegerEZ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/KimPT04,
  author       = {Yongdae Kim and
                  Adrian Perrig and
                  Gene Tsudik},
  title        = {Tree-based group key agreement},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {7},
  number       = {1},
  pages        = {60--96},
  year         = {2004},
  url          = {https://doi.org/10.1145/984334.984337},
  doi          = {10.1145/984334.984337},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/KimPT04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/LeviCK04,
  author       = {Albert Levi and
                  M. Ufuk {\c{C}}aglayan and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Use of nested certificates for efficient, dynamic, and trust preserving
                  public key infrastructure},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {7},
  number       = {1},
  pages        = {21--59},
  year         = {2004},
  url          = {https://doi.org/10.1145/984334.984336},
  doi          = {10.1145/984334.984336},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/LeviCK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/MontenegroC04,
  author       = {Gabriel Montenegro and
                  Claude Castelluccia},
  title        = {Crypto-based identifiers (CBIDs): Concepts and applications},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {7},
  number       = {1},
  pages        = {97--127},
  year         = {2004},
  url          = {https://doi.org/10.1145/984334.984338},
  doi          = {10.1145/984334.984338},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/MontenegroC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/NingCRX04,
  author       = {Peng Ning and
                  Yun Cui and
                  Douglas S. Reeves and
                  Dingbang Xu},
  title        = {Techniques and tools for analyzing intrusion alerts},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {7},
  number       = {2},
  pages        = {274--318},
  year         = {2004},
  url          = {https://doi.org/10.1145/996943.996947},
  doi          = {10.1145/996943.996947},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/NingCRX04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/NingX04,
  author       = {Peng Ning and
                  Dingbang Xu},
  title        = {Hypothesizing and reasoning about attacks missed by intrusion detection
                  systems},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {7},
  number       = {4},
  pages        = {591--627},
  year         = {2004},
  url          = {https://doi.org/10.1145/1042031.1042036},
  doi          = {10.1145/1042031.1042036},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/NingX04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ParkS04,
  author       = {Jaehong Park and
                  Ravi S. Sandhu},
  title        = {The UCON\({}_{\mbox{ABC}}\) usage control model},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {7},
  number       = {1},
  pages        = {128--174},
  year         = {2004},
  url          = {https://doi.org/10.1145/984334.984339},
  doi          = {10.1145/984334.984339},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/ParkS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ShachamBR04,
  author       = {Hovav Shacham and
                  Dan Boneh and
                  Eric Rescorla},
  title        = {Client-side caching for {TLS}},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {7},
  number       = {4},
  pages        = {553--575},
  year         = {2004},
  url          = {https://doi.org/10.1145/1042031.1042034},
  doi          = {10.1145/1042031.1042034},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/ShachamBR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/StrembeckN04,
  author       = {Mark Strembeck and
                  Gustaf Neumann},
  title        = {An integrated approach to engineer and enforce context constraints
                  in {RBAC} environments},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {7},
  number       = {3},
  pages        = {392--427},
  year         = {2004},
  url          = {https://doi.org/10.1145/1015040.1015043},
  doi          = {10.1145/1015040.1015043},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/StrembeckN04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/StubblefieldIR04,
  author       = {Adam Stubblefield and
                  John Ioannidis and
                  Aviel D. Rubin},
  title        = {A key recovery attack on the 802.11b wired equivalent privacy protocol
                  {(WEP)}},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {7},
  number       = {2},
  pages        = {319--332},
  year         = {2004},
  url          = {https://doi.org/10.1145/996943.996948},
  doi          = {10.1145/996943.996948},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/StubblefieldIR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/WalcottB04,
  author       = {Tom Walcott and
                  Matt Bishop},
  title        = {Traducement: {A} model for record security},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {7},
  number       = {4},
  pages        = {576--590},
  year         = {2004},
  url          = {https://doi.org/10.1145/1042031.1042035},
  doi          = {10.1145/1042031.1042035},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/WalcottB04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/WeddeL04,
  author       = {Horst F. Wedde and
                  Mario Lischka},
  title        = {Modular authorization and administration},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {7},
  number       = {3},
  pages        = {363--391},
  year         = {2004},
  url          = {https://doi.org/10.1145/1015040.1015042},
  doi          = {10.1145/1015040.1015042},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/WeddeL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/WrightALS04,
  author       = {Matthew K. Wright and
                  Micah Adler and
                  Brian Neil Levine and
                  Clay Shields},
  title        = {The predecessor attack: An analysis of a threat to anonymous communications
                  systems},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {7},
  number       = {4},
  pages        = {489--522},
  year         = {2004},
  url          = {https://doi.org/10.1145/1042031.1042032},
  doi          = {10.1145/1042031.1042032},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/WrightALS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}