Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "stream:streams/journals/ftsec:"
@article{DBLP:journals/ftsec/YaoGAGLLLL24, author = {Yuguang Yao and Xiao Guo and Vishal Asnani and Yifan Gong and Jiancheng Liu and Xue Lin and Xiaoming Liu and Sijia Liu}, title = {Reverse Engineering of Deceptions on Machine- and Human-Centric Attacks}, journal = {Found. Trends Priv. Secur.}, volume = {6}, number = {2}, pages = {53--152}, year = {2024}, url = {https://doi.org/10.1561/3300000039}, doi = {10.1561/3300000039}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ftsec/YaoGAGLLLL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ftsec/BarrettBBCCCCCDFFHHJKKMMRSSTY23, author = {Clark W. Barrett and Brad Boyd and Elie Bursztein and Nicholas Carlini and Brad Chen and Jihye Choi and Amrita Roy Chowdhury and Mihai Christodorescu and Anupam Datta and Soheil Feizi and Kathleen Fisher and Tatsunori Hashimoto and Dan Hendrycks and Somesh Jha and Daniel Kang and Florian Kerschbaum and Eric Mitchell and John C. Mitchell and Zulfikar Ramzan and Khawaja Shams and Dawn Song and Ankur Taly and Diyi Yang}, title = {Identifying and Mitigating the Security Risks of Generative {AI}}, journal = {Found. Trends Priv. Secur.}, volume = {6}, number = {1}, pages = {1--52}, year = {2023}, url = {https://doi.org/10.1561/3300000041}, doi = {10.1561/3300000041}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ftsec/BarrettBBCCCCCDFFHHJKKMMRSSTY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ftsec/CapponiIS23, author = {Agostino Capponi and Garud Iyengar and Jay Sethuraman}, title = {Decentralized Finance: Protocols, Risks, and Governance}, journal = {Found. Trends Priv. Secur.}, volume = {5}, number = {3}, pages = {144--188}, year = {2023}, url = {https://doi.org/10.1561/3300000036}, doi = {10.1561/3300000036}, timestamp = {Fri, 22 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ftsec/CapponiIS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ftsec/MashimaCRLC23, author = {Daisuke Mashima and Yao Chen and Muhammad M. Roomi and Subhash Lakshminarayana and Deming Chen}, title = {Cybersecurity for Modern Smart Grid Against Emerging Threats}, journal = {Found. Trends Priv. Secur.}, volume = {5}, number = {4}, pages = {189--285}, year = {2023}, url = {https://doi.org/10.1561/3300000035}, doi = {10.1561/3300000035}, timestamp = {Wed, 27 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ftsec/MashimaCRLC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ftsec/ChakrabortiCKNS22, author = {Anrin Chakraborti and Reza Curtmola and Jonathan Katz and Jason Nieh and Ahmad{-}Reza Sadeghi and Radu Sion and Yinqian Zhang}, title = {Cloud Computing Security: Foundations and Research Directions}, journal = {Found. Trends Priv. Secur.}, volume = {3}, number = {2}, pages = {103--213}, year = {2022}, url = {https://doi.org/10.1561/3300000028}, doi = {10.1561/3300000028}, timestamp = {Tue, 22 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ftsec/ChakrabortiCKNS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ftsec/DasFHD22, author = {Sauvik Das and Cori Faklaris and Jason I. Hong and Laura A. Dabbish}, title = {The Security {\&} Privacy Acceptance Framework {(SPAF)}}, journal = {Found. Trends Priv. Secur.}, volume = {5}, number = {1-2}, pages = {1--143}, year = {2022}, url = {https://doi.org/10.1561/3300000026}, doi = {10.1561/3300000026}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ftsec/DasFHD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ftsec/GunnAELNN22, author = {Lachlan J. Gunn and N. Asokan and Jan{-}Erik Ekberg and Hans Liljestrand and Vijayanand Nayani and Thomas Nyman}, title = {Hardware Platform Security for Mobile Devices}, journal = {Found. Trends Priv. Secur.}, volume = {3}, number = {3-4}, pages = {214--394}, year = {2022}, url = {https://doi.org/10.1561/3300000024}, doi = {10.1561/3300000024}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ftsec/GunnAELNN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ftsec/KozyriCM22, author = {Elisavet Kozyri and Stephen Chong and Andrew C. Myers}, title = {Expressing Information Flow Properties}, journal = {Found. Trends Priv. Secur.}, volume = {3}, number = {1}, pages = {1--102}, year = {2022}, url = {https://doi.org/10.1561/3300000008}, doi = {10.1561/3300000008}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ftsec/KozyriCM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ftsec/RouffW22, author = {Christopher A. Rouff and Lanier A. Watkins}, title = {Assured Autonomy Survey}, journal = {Found. Trends Priv. Secur.}, volume = {4}, number = {1}, pages = {1--116}, year = {2022}, url = {https://doi.org/10.1561/3300000027}, doi = {10.1561/3300000027}, timestamp = {Mon, 01 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ftsec/RouffW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ftsec/Thaler22, author = {Justin Thaler}, title = {Proofs, Arguments, and Zero-Knowledge}, journal = {Found. Trends Priv. Secur.}, volume = {4}, number = {2-4}, pages = {117--660}, year = {2022}, url = {https://doi.org/10.1561/3300000030}, doi = {10.1561/3300000030}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ftsec/Thaler22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ftsec/FeigenbaumJW20, author = {Joan Feigenbaum and Aaron D. Jaggard and Rebecca N. Wright}, title = {Accountability in Computing: Concepts and Mechanisms}, journal = {Found. Trends Priv. Secur.}, volume = {2}, number = {4}, pages = {247--399}, year = {2020}, url = {https://doi.org/10.1561/3300000002}, doi = {10.1561/3300000002}, timestamp = {Thu, 07 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ftsec/FeigenbaumJW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ftsec/EvansKR18, author = {David Evans and Vladimir Kolesnikov and Mike Rosulek}, title = {A Pragmatic Introduction to Secure Multi-Party Computation}, journal = {Found. Trends Priv. Secur.}, volume = {2}, number = {2-3}, pages = {70--246}, year = {2018}, url = {https://doi.org/10.1561/3300000019}, doi = {10.1561/3300000019}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ftsec/EvansKR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ftsec/BenthallGN17, author = {Sebastian Benthall and Seda F. G{\"{u}}rses and Helen Nissenbaum}, title = {Contextual Integrity through the Lens of Computer Science}, journal = {Found. Trends Priv. Secur.}, volume = {2}, number = {1}, pages = {1--69}, year = {2017}, url = {https://doi.org/10.1561/3300000016}, doi = {10.1561/3300000016}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ftsec/BenthallGN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ftsec/Chatzikokolakis17, author = {Konstantinos Chatzikokolakis and Ehab ElSalamouny and Catuscia Palamidessi and Anna Pazii}, title = {Methods for Location Privacy: {A} comparative overview}, journal = {Found. Trends Priv. Secur.}, volume = {1}, number = {4}, pages = {199--257}, year = {2017}, url = {https://doi.org/10.1561/3300000017}, doi = {10.1561/3300000017}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ftsec/Chatzikokolakis17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ftsec/Tan17, author = {Gang Tan}, title = {Principles and Implementation Techniques of Software-Based Fault Isolation}, journal = {Found. Trends Priv. Secur.}, volume = {1}, number = {3}, pages = {137--198}, year = {2017}, url = {https://doi.org/10.1561/3300000013}, doi = {10.1561/3300000013}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ftsec/Tan17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ftsec/Blanchet16, author = {Bruno Blanchet}, title = {Modeling and Verifying Security Protocols with the Applied Pi Calculus and ProVerif}, journal = {Found. Trends Priv. Secur.}, volume = {1}, number = {1-2}, pages = {1--135}, year = {2016}, url = {https://doi.org/10.1561/3300000004}, doi = {10.1561/3300000004}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ftsec/Blanchet16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.