


default search action
ACM Transactions on Information and System Security (TISSEC), Volume 11
Volume 11, Number 1, February 2008
- Indrakshi Ray:

Editorial. 1:1 - Adam J. Lee

, Marianne Winslett, Jim Basney
, Von Welch:
The Traust Authorization Service. 2:1-2:33 - Xinwen Zhang, Masayuki Nakae, Michael J. Covington, Ravi S. Sandhu:

Toward a Usage-Based Security Framework for Collaborative Computing Systems. 3:1-3:36 - Pietro Mazzoleni, Bruno Crispo, Swaminathan Sivasubramanian, Elisa Bertino:

XACML Policy Integration Algorithms. 4:1-4:29
Volume 11, Number 2, May 2008
- Jooyoung Lee, Douglas R. Stinson:

On the Construction of Practical Key Predistribution Schemes for Distributed Sensor Networks Using Combinatorial Designs. 1:1-1:35 - Chad D. Mano, Andrew Blaich, Qi Liao, Yingxin Jiang, David A. Cieslak, David Salyers, Aaron Striegel

:
RIPPS: Rogue Identifying Packet Payload Slicer Detecting Unauthorized Wireless Hosts Through Network Traffic Conditioning. 2:1-2:23 - Matthew K. Wright

, Micah Adler, Brian Neil Levine, Clay Shields:
Passive-Logging Attacks Against Anonymous Communications Systems. 3:1-3:34 - Jung Hee Cheon, Nicholas Hopper, Yongdae Kim

, Ivan Osipkov:
Provably Secure Timed-Release Public Key Encryption. 4:1-4:44 - HweeHwa Pang

, Kian-Lee Tan
:
Verifying Completeness of Relational Query Answers from Online Servers. 5:1-5:50 - Felix Brandt, Tuomas Sandholm:

On the Existence of Unconditionally Privacy-Preserving Auction Protocols. 6:1-6:21
Volume 11, Number 3, March 2008
- Gene Tsudik:

Editorial. 11:1 - Qing Zhang, Ting Yu, Peng Ning:

A Framework for Identifying Compromised Nodes in Wireless Sensor Networks. 12:1-12:37 - Roberto Di Pietro

, Luigi V. Mancini
, Alessandro Mei, Alessandro Panconesi, Jaikumar Radhakrishnan:
Redoubtable Sensor Networks. 13:1-13:22 - Katharine Chang, Kang G. Shin:

Distributed Authentication of Program Integrity Verification in Wireless Sensor Networks. 14:1-14:35 - Liang Xie, Sencun Zhu:

Message Dropping Attacks in Overlay Networks: Attack Detection and Attacker Identification. 15:1-15:30 - Patrick Traynor, Michael Chien, Scott Weaver, Boniface Hicks, Patrick D. McDaniel:

Noninvasive Methods for Host Certification. 16:1-16:23
Volume 11, Number 4, July 2008
- Gildas Avoine, Pascal Junod

, Philippe Oechslin:
Characterization and Improvement of Time-Memory Trade-Off Based on Perfect Tables. 17:1-17:22 - Yi Yang, Xinran Wang, Sencun Zhu, Guohong Cao:

SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks. 18:1-18:43 - Svetlana Radosavac, George V. Moustakides, John S. Baras, Iordanis Koutsopoulos:

An Analytic Framework for Modeling and Detecting Access Layer Misbehavior in Wireless Networks. 19:1-19:28 - Young U. Ryu

, Hyeun-Suk Rhee:
Evaluation of Intrusion Detection Systems Under a Resource Constraint. 20:1-20:24 - Joseph Y. Halpern, Vicky Weissman:

Using First-Order Logic to Reason about Policies. 21:1-21:41 - Donggang Liu, Peng Ning, An Liu, Cliff Wang, Wenliang Du:

Attack-Resistant Location Estimation in Wireless Sensor Networks. 22:1-22:39 - Saurabh Ganeriwal, Christina Pöpper

, Srdjan Capkun, Mani B. Srivastava:
Secure Time Synchronization in Sensor Networks. 23:1-23:35

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














