Search dblp for Publications

export results for "stream:streams/journals/ftsec:"

 download as .bib file

@article{DBLP:journals/ftsec/YaoGAGLLLL24,
  author       = {Yuguang Yao and
                  Xiao Guo and
                  Vishal Asnani and
                  Yifan Gong and
                  Jiancheng Liu and
                  Xue Lin and
                  Xiaoming Liu and
                  Sijia Liu},
  title        = {Reverse Engineering of Deceptions on Machine- and Human-Centric Attacks},
  journal      = {Found. Trends Priv. Secur.},
  volume       = {6},
  number       = {2},
  pages        = {53--152},
  year         = {2024},
  url          = {https://doi.org/10.1561/3300000039},
  doi          = {10.1561/3300000039},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ftsec/YaoGAGLLLL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ftsec/BarrettBBCCCCCDFFHHJKKMMRSSTY23,
  author       = {Clark W. Barrett and
                  Brad Boyd and
                  Elie Bursztein and
                  Nicholas Carlini and
                  Brad Chen and
                  Jihye Choi and
                  Amrita Roy Chowdhury and
                  Mihai Christodorescu and
                  Anupam Datta and
                  Soheil Feizi and
                  Kathleen Fisher and
                  Tatsunori Hashimoto and
                  Dan Hendrycks and
                  Somesh Jha and
                  Daniel Kang and
                  Florian Kerschbaum and
                  Eric Mitchell and
                  John C. Mitchell and
                  Zulfikar Ramzan and
                  Khawaja Shams and
                  Dawn Song and
                  Ankur Taly and
                  Diyi Yang},
  title        = {Identifying and Mitigating the Security Risks of Generative {AI}},
  journal      = {Found. Trends Priv. Secur.},
  volume       = {6},
  number       = {1},
  pages        = {1--52},
  year         = {2023},
  url          = {https://doi.org/10.1561/3300000041},
  doi          = {10.1561/3300000041},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ftsec/BarrettBBCCCCCDFFHHJKKMMRSSTY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ftsec/CapponiIS23,
  author       = {Agostino Capponi and
                  Garud Iyengar and
                  Jay Sethuraman},
  title        = {Decentralized Finance: Protocols, Risks, and Governance},
  journal      = {Found. Trends Priv. Secur.},
  volume       = {5},
  number       = {3},
  pages        = {144--188},
  year         = {2023},
  url          = {https://doi.org/10.1561/3300000036},
  doi          = {10.1561/3300000036},
  timestamp    = {Fri, 22 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ftsec/CapponiIS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ftsec/MashimaCRLC23,
  author       = {Daisuke Mashima and
                  Yao Chen and
                  Muhammad M. Roomi and
                  Subhash Lakshminarayana and
                  Deming Chen},
  title        = {Cybersecurity for Modern Smart Grid Against Emerging Threats},
  journal      = {Found. Trends Priv. Secur.},
  volume       = {5},
  number       = {4},
  pages        = {189--285},
  year         = {2023},
  url          = {https://doi.org/10.1561/3300000035},
  doi          = {10.1561/3300000035},
  timestamp    = {Wed, 27 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ftsec/MashimaCRLC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ftsec/ChakrabortiCKNS22,
  author       = {Anrin Chakraborti and
                  Reza Curtmola and
                  Jonathan Katz and
                  Jason Nieh and
                  Ahmad{-}Reza Sadeghi and
                  Radu Sion and
                  Yinqian Zhang},
  title        = {Cloud Computing Security: Foundations and Research Directions},
  journal      = {Found. Trends Priv. Secur.},
  volume       = {3},
  number       = {2},
  pages        = {103--213},
  year         = {2022},
  url          = {https://doi.org/10.1561/3300000028},
  doi          = {10.1561/3300000028},
  timestamp    = {Tue, 22 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ftsec/ChakrabortiCKNS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ftsec/DasFHD22,
  author       = {Sauvik Das and
                  Cori Faklaris and
                  Jason I. Hong and
                  Laura A. Dabbish},
  title        = {The Security {\&} Privacy Acceptance Framework {(SPAF)}},
  journal      = {Found. Trends Priv. Secur.},
  volume       = {5},
  number       = {1-2},
  pages        = {1--143},
  year         = {2022},
  url          = {https://doi.org/10.1561/3300000026},
  doi          = {10.1561/3300000026},
  timestamp    = {Thu, 05 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ftsec/DasFHD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ftsec/GunnAELNN22,
  author       = {Lachlan J. Gunn and
                  N. Asokan and
                  Jan{-}Erik Ekberg and
                  Hans Liljestrand and
                  Vijayanand Nayani and
                  Thomas Nyman},
  title        = {Hardware Platform Security for Mobile Devices},
  journal      = {Found. Trends Priv. Secur.},
  volume       = {3},
  number       = {3-4},
  pages        = {214--394},
  year         = {2022},
  url          = {https://doi.org/10.1561/3300000024},
  doi          = {10.1561/3300000024},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ftsec/GunnAELNN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ftsec/KozyriCM22,
  author       = {Elisavet Kozyri and
                  Stephen Chong and
                  Andrew C. Myers},
  title        = {Expressing Information Flow Properties},
  journal      = {Found. Trends Priv. Secur.},
  volume       = {3},
  number       = {1},
  pages        = {1--102},
  year         = {2022},
  url          = {https://doi.org/10.1561/3300000008},
  doi          = {10.1561/3300000008},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ftsec/KozyriCM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ftsec/RouffW22,
  author       = {Christopher A. Rouff and
                  Lanier A. Watkins},
  title        = {Assured Autonomy Survey},
  journal      = {Found. Trends Priv. Secur.},
  volume       = {4},
  number       = {1},
  pages        = {1--116},
  year         = {2022},
  url          = {https://doi.org/10.1561/3300000027},
  doi          = {10.1561/3300000027},
  timestamp    = {Mon, 01 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ftsec/RouffW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ftsec/Thaler22,
  author       = {Justin Thaler},
  title        = {Proofs, Arguments, and Zero-Knowledge},
  journal      = {Found. Trends Priv. Secur.},
  volume       = {4},
  number       = {2-4},
  pages        = {117--660},
  year         = {2022},
  url          = {https://doi.org/10.1561/3300000030},
  doi          = {10.1561/3300000030},
  timestamp    = {Thu, 05 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ftsec/Thaler22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ftsec/FeigenbaumJW20,
  author       = {Joan Feigenbaum and
                  Aaron D. Jaggard and
                  Rebecca N. Wright},
  title        = {Accountability in Computing: Concepts and Mechanisms},
  journal      = {Found. Trends Priv. Secur.},
  volume       = {2},
  number       = {4},
  pages        = {247--399},
  year         = {2020},
  url          = {https://doi.org/10.1561/3300000002},
  doi          = {10.1561/3300000002},
  timestamp    = {Thu, 07 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ftsec/FeigenbaumJW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ftsec/EvansKR18,
  author       = {David Evans and
                  Vladimir Kolesnikov and
                  Mike Rosulek},
  title        = {A Pragmatic Introduction to Secure Multi-Party Computation},
  journal      = {Found. Trends Priv. Secur.},
  volume       = {2},
  number       = {2-3},
  pages        = {70--246},
  year         = {2018},
  url          = {https://doi.org/10.1561/3300000019},
  doi          = {10.1561/3300000019},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ftsec/EvansKR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ftsec/BenthallGN17,
  author       = {Sebastian Benthall and
                  Seda F. G{\"{u}}rses and
                  Helen Nissenbaum},
  title        = {Contextual Integrity through the Lens of Computer Science},
  journal      = {Found. Trends Priv. Secur.},
  volume       = {2},
  number       = {1},
  pages        = {1--69},
  year         = {2017},
  url          = {https://doi.org/10.1561/3300000016},
  doi          = {10.1561/3300000016},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ftsec/BenthallGN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ftsec/Chatzikokolakis17,
  author       = {Konstantinos Chatzikokolakis and
                  Ehab ElSalamouny and
                  Catuscia Palamidessi and
                  Anna Pazii},
  title        = {Methods for Location Privacy: {A} comparative overview},
  journal      = {Found. Trends Priv. Secur.},
  volume       = {1},
  number       = {4},
  pages        = {199--257},
  year         = {2017},
  url          = {https://doi.org/10.1561/3300000017},
  doi          = {10.1561/3300000017},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ftsec/Chatzikokolakis17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ftsec/Tan17,
  author       = {Gang Tan},
  title        = {Principles and Implementation Techniques of Software-Based Fault Isolation},
  journal      = {Found. Trends Priv. Secur.},
  volume       = {1},
  number       = {3},
  pages        = {137--198},
  year         = {2017},
  url          = {https://doi.org/10.1561/3300000013},
  doi          = {10.1561/3300000013},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ftsec/Tan17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ftsec/Blanchet16,
  author       = {Bruno Blanchet},
  title        = {Modeling and Verifying Security Protocols with the Applied Pi Calculus
                  and ProVerif},
  journal      = {Found. Trends Priv. Secur.},
  volume       = {1},
  number       = {1-2},
  pages        = {1--135},
  year         = {2016},
  url          = {https://doi.org/10.1561/3300000004},
  doi          = {10.1561/3300000004},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ftsec/Blanchet16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics