default search action
Search dblp for Publications
export results for "toc:db/journals/tissec/tissec7.bht:"
@article{DBLP:journals/tissec/AielloBBCIKR04, author = {William Aiello and Steven M. Bellovin and Matt Blaze and Ran Canetti and John Ioannidis and Angelos D. Keromytis and Omer Reingold}, title = {Just fast keying: Key agreement in a hostile internet}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {7}, number = {2}, pages = {242--273}, year = {2004}, url = {https://doi.org/10.1145/996943.996946}, doi = {10.1145/996943.996946}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/AielloBBCIKR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/AmirKNT04, author = {Yair Amir and Yongdae Kim and Cristina Nita{-}Rotaru and Gene Tsudik}, title = {On the performance of group key agreement protocols}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {7}, number = {3}, pages = {457--488}, year = {2004}, url = {https://doi.org/10.1145/1015040.1015045}, doi = {10.1145/1015040.1015045}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/AmirKNT04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/Ateniese04, author = {Giuseppe Ateniese}, title = {Verifiable encryption of digital signatures and applications}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {7}, number = {1}, pages = {1--20}, year = {2004}, url = {https://doi.org/10.1145/984334.984335}, doi = {10.1145/984334.984335}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/Ateniese04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BellareKN04, author = {Mihir Bellare and Tadayoshi Kohno and Chanathip Namprempre}, title = {Breaking and provably repairing the {SSH} authenticated encryption scheme: {A} case study of the Encode-then-Encrypt-and-MAC paradigm}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {7}, number = {2}, pages = {206--241}, year = {2004}, url = {https://doi.org/10.1145/996943.996945}, doi = {10.1145/996943.996945}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/BellareKN04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/CarrierS04, author = {Brian D. Carrier and Clay Shields}, title = {The session token protocol for forensics and traceback}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {7}, number = {3}, pages = {333--362}, year = {2004}, url = {https://doi.org/10.1145/1015040.1015041}, doi = {10.1145/1015040.1015041}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/CarrierS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/HessHJS04, author = {Adam Hess and Jason E. Holt and Jared Jacobson and Kent E. Seamons}, title = {Content-triggered trust negotiation}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {7}, number = {3}, pages = {428--456}, year = {2004}, url = {https://doi.org/10.1145/1015040.1015044}, doi = {10.1145/1015040.1015044}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/HessHJS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/HuangM04, author = {Dijiang Huang and Deep Medhi}, title = {A key-chain-based keying scheme for many-to-many secure group communication}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {7}, number = {4}, pages = {523--552}, year = {2004}, url = {https://doi.org/10.1145/1042031.1042033}, doi = {10.1145/1042031.1042033}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/HuangM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/JaegerEZ04, author = {Trent Jaeger and Antony Edwards and Xiaolan Zhang}, title = {Consistency analysis of authorization hook placement in the Linux security modules framework}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {7}, number = {2}, pages = {175--205}, year = {2004}, url = {https://doi.org/10.1145/996943.996944}, doi = {10.1145/996943.996944}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/JaegerEZ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/KimPT04, author = {Yongdae Kim and Adrian Perrig and Gene Tsudik}, title = {Tree-based group key agreement}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {7}, number = {1}, pages = {60--96}, year = {2004}, url = {https://doi.org/10.1145/984334.984337}, doi = {10.1145/984334.984337}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/KimPT04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/LeviCK04, author = {Albert Levi and M. Ufuk {\c{C}}aglayan and {\c{C}}etin Kaya Ko{\c{c}}}, title = {Use of nested certificates for efficient, dynamic, and trust preserving public key infrastructure}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {7}, number = {1}, pages = {21--59}, year = {2004}, url = {https://doi.org/10.1145/984334.984336}, doi = {10.1145/984334.984336}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/LeviCK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/MontenegroC04, author = {Gabriel Montenegro and Claude Castelluccia}, title = {Crypto-based identifiers (CBIDs): Concepts and applications}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {7}, number = {1}, pages = {97--127}, year = {2004}, url = {https://doi.org/10.1145/984334.984338}, doi = {10.1145/984334.984338}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/MontenegroC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/NingCRX04, author = {Peng Ning and Yun Cui and Douglas S. Reeves and Dingbang Xu}, title = {Techniques and tools for analyzing intrusion alerts}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {7}, number = {2}, pages = {274--318}, year = {2004}, url = {https://doi.org/10.1145/996943.996947}, doi = {10.1145/996943.996947}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/NingCRX04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/NingX04, author = {Peng Ning and Dingbang Xu}, title = {Hypothesizing and reasoning about attacks missed by intrusion detection systems}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {7}, number = {4}, pages = {591--627}, year = {2004}, url = {https://doi.org/10.1145/1042031.1042036}, doi = {10.1145/1042031.1042036}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/NingX04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ParkS04, author = {Jaehong Park and Ravi S. Sandhu}, title = {The UCON\({}_{\mbox{ABC}}\) usage control model}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {7}, number = {1}, pages = {128--174}, year = {2004}, url = {https://doi.org/10.1145/984334.984339}, doi = {10.1145/984334.984339}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/ParkS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ShachamBR04, author = {Hovav Shacham and Dan Boneh and Eric Rescorla}, title = {Client-side caching for {TLS}}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {7}, number = {4}, pages = {553--575}, year = {2004}, url = {https://doi.org/10.1145/1042031.1042034}, doi = {10.1145/1042031.1042034}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/ShachamBR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/StrembeckN04, author = {Mark Strembeck and Gustaf Neumann}, title = {An integrated approach to engineer and enforce context constraints in {RBAC} environments}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {7}, number = {3}, pages = {392--427}, year = {2004}, url = {https://doi.org/10.1145/1015040.1015043}, doi = {10.1145/1015040.1015043}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/StrembeckN04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/StubblefieldIR04, author = {Adam Stubblefield and John Ioannidis and Aviel D. Rubin}, title = {A key recovery attack on the 802.11b wired equivalent privacy protocol {(WEP)}}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {7}, number = {2}, pages = {319--332}, year = {2004}, url = {https://doi.org/10.1145/996943.996948}, doi = {10.1145/996943.996948}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/StubblefieldIR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/WalcottB04, author = {Tom Walcott and Matt Bishop}, title = {Traducement: {A} model for record security}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {7}, number = {4}, pages = {576--590}, year = {2004}, url = {https://doi.org/10.1145/1042031.1042035}, doi = {10.1145/1042031.1042035}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/WalcottB04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/WeddeL04, author = {Horst F. Wedde and Mario Lischka}, title = {Modular authorization and administration}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {7}, number = {3}, pages = {363--391}, year = {2004}, url = {https://doi.org/10.1145/1015040.1015042}, doi = {10.1145/1015040.1015042}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/WeddeL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/WrightALS04, author = {Matthew K. Wright and Micah Adler and Brian Neil Levine and Clay Shields}, title = {The predecessor attack: An analysis of a threat to anonymous communications systems}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {7}, number = {4}, pages = {489--522}, year = {2004}, url = {https://doi.org/10.1145/1042031.1042032}, doi = {10.1145/1042031.1042032}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/WrightALS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.