


default search action
Computers & Security, Volume 67
Volume 67, June 2017
- Markus Wagner

, Alexander Rind
, Niklas Thür, Wolfgang Aigner
:
A knowledge-assisted visual malware analysis system: Design, validation, and reflection of KAMAS. 1-15 - Andrey Sapegin

, David Jaeger
, Feng Cheng
, Christoph Meinel:
Towards a system for complex analysis of security events in large-scale networks. 16-34 - Sara Qamar

, Zahid Anwar
, Mohammad Ashiqur Rahman
, Ehab Al-Shaer, Bei-tseng Chu:
Data-driven analytics for cyber-threat intelligence and information sharing. 35-58 - Debanjan Sadhya

, Sanjay Kumar Singh
:
Providing robust security measures to Bloom filter based biometric template protection schemes. 59-72 - Santosh Chandrasekhar, Ahmed Ibrahim

, Mukesh Singhal:
A novel access control protocol using proxy signatures for cloud-based health information exchange. 73-88 - Jaehyun Park

, Jiseong Noh, Myungchul Kim, Brent ByungHoon Kang:
Invi-server: Reducing the attack surfaces by making protected server invisible on networks. 89-106 - Kristian Skracic

, Predrag Pale
, Zvonko Kostanjcar:
Authentication approach using one-time challenge generation based on user behavior patterns captured in transactional data sets. 107-121 - Assadarat Khurat, Boontawee Suntisrivaraporn, Dieter Gollmann:

Privacy policies verification in composite services using OWL. 122-141 - Shuo Wang, Richard O. Sinnott

:
Protecting personal trajectories of social media users through differential privacy. 142-163 - Yizheng Chen, Panagiotis Kintis, Manos Antonakakis, Yacin Nadji, David Dagon, Michael Farrell:

Measuring lower bounds of the financial abuse to online advertisers: A four year case study of the TDSS/TDL4 Botnet. 164-180 - Nikolaos Tsalis, Alexios Mylonas

, Antonia Nisioti, Dimitris Gritzalis, Vasilios Katos:
Exploring the protection of private browsing in desktop browsers. 181-197 - Blake D. Bryant, Hossein Saiedian

:
A novel kill-chain framework for remote security log analysis with SIEM software. 198-210 - Ragib Hasan

, Rasib Khan
:
Unified authentication factors and fuzzy service access using interaction provenance. 211-231 - Zeqing Guo

, Weili Han, Liangxing Liu, Wenyuan Xu, Minyue Ni, Yunlei Zhao, Xiaoyang Sean Wang:
Socialized policy administration. 232-243 - Hyo Shin Choi, Won Sang Lee, So Young Sohn

:
Analyzing research trends in personal information privacy using topic modeling. 244-253 - Zareef A. Mohammed, Gurvirender P. Tejay:

Examining privacy concerns and ecommerce adoption in developing countries: The impact of culture in shaping individuals' perceptions toward technology. 254-265
- Dominik Herrmann, Hannes Federrath:

Editorial: 30th IFIP International Information Security Conference (IFIP SEC 2015). 266 - Fredrik Karlsson

, Karin Hedström
, Göran Goldkuhl:
Practice-based discourse analysis of information security policies. 267-279 - Maria Bartnes, Nils Brede Moe

:
Challenges in IT security preparedness exercises: A case study. 280-290 - Giampaolo Bella

, Rosario Giustolisi
, Gabriele Lenzini, Peter Y. A. Ryan
:
Trustworthy exams without trusted parties. 291-307 - Wouter Lueks, Gergely Alpár, Jaap-Henk Hoepman, Pim Vullers:

Fast revocation of attribute-based credentials for both users and verifiers. 308-323 - Asahiko Yamada

, Tatsuro Ikeda:
Enhanced PKI authentication with trusted product at claimant. 324-334 - Quoc Huy Do, Richard Bubel, Reiner Hähnle

:
Automatic detection and demonstrator generation for information flow leaks in object-oriented programs. 335-349 - Dang Vinh Pham, Dogan Kesdogan:

Towards a causality based analysis of anonymity protection in indeterministic mix systems. 350-368

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














