Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/tissec/tissec13.bht:"
@article{DBLP:journals/tissec/BartheRRS10, author = {Gilles Barthe and Tamara Rezk and Alejandro Russo and Andrei Sabelfeld}, title = {Security of multithreaded programs by compilation}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {3}, pages = {21:1--21:32}, year = {2010}, url = {https://doi.org/10.1145/1805974.1895977}, doi = {10.1145/1805974.1895977}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/BartheRRS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BeckerN10, author = {Moritz Y. Becker and Sebastian Nanz}, title = {A logic for state-modifying authorization policies}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {3}, pages = {20:1--20:28}, year = {2010}, url = {https://doi.org/10.1145/1805974.1805976}, doi = {10.1145/1805974.1805976}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/BeckerN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BishtMV10, author = {Prithvi Bisht and Parthasarathy Madhusudan and V. N. Venkatakrishnan}, title = {{CANDID:} Dynamic candidate evaluations for automatic prevention of {SQL} injection attacks}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {2}, pages = {14:1--14:39}, year = {2010}, url = {https://doi.org/10.1145/1698750.1698754}, doi = {10.1145/1698750.1698754}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/BishtMV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BiskupL10, author = {Joachim Biskup and Javier L{\'{o}}pez}, title = {Editorial {ESORICS} 2007}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {3}, pages = {19:1--19:2}, year = {2010}, url = {https://doi.org/10.1145/1805974.1805975}, doi = {10.1145/1805974.1805975}, timestamp = {Thu, 29 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/BiskupL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BobbaFKKGKP10, author = {Rakeshbabu Bobba and Omid Fatemieh and Fariba Khan and Arindam Khan and Carl A. Gunter and Himanshu Khurana and Manoj Prabhakaran}, title = {Attribute-Based Messaging: Access Control and Confidentiality}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {4}, pages = {31:1--31:35}, year = {2010}, url = {https://doi.org/10.1145/1880022.1880025}, doi = {10.1145/1880022.1880025}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/BobbaFKKGKP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/CarminatiFCT10, author = {Barbara Carminati and Elena Ferrari and Jianneng Cao and Kian{-}Lee Tan}, title = {A framework to enforce access control over data streams}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {3}, pages = {28:1--28:31}, year = {2010}, url = {https://doi.org/10.1145/1805974.1805984}, doi = {10.1145/1805974.1805984}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/CarminatiFCT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/CirianiVFJPS10, author = {Valentina Ciriani and Sabrina De Capitani di Vimercati and Sara Foresti and Sushil Jajodia and Stefano Paraboschi and Pierangela Samarati}, title = {Combining fragmentation and encryption to protect privacy in data storage}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {3}, pages = {22:1--22:33}, year = {2010}, url = {https://doi.org/10.1145/1805974.1805978}, doi = {10.1145/1805974.1805978}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/CirianiVFJPS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/HicksRCJM10, author = {Boniface Hicks and Sandra Julieta Rueda and Luke St. Clair and Trent Jaeger and Patrick D. McDaniel}, title = {A logical specification and analysis for SELinux {MLS} policy}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {3}, pages = {26:1--26:31}, year = {2010}, url = {https://doi.org/10.1145/1805974.1805982}, doi = {10.1145/1805974.1805982}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/HicksRCJM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/HopperVC10, author = {Nicholas Hopper and Eugene Y. Vasserman and Eric Chan{-}Tin}, title = {How much anonymity does network latency leak?}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {2}, pages = {13:1--13:28}, year = {2010}, url = {https://doi.org/10.1145/1698750.1698753}, doi = {10.1145/1698750.1698753}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/HopperVC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/JiangWX10, author = {Xuxian Jiang and Xinyuan Wang and Dongyan Xu}, title = {Stealthy malware detection and monitoring through VMM-based "out-of-the-box" semantic view reconstruction}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {2}, pages = {12:1--12:28}, year = {2010}, url = {https://doi.org/10.1145/1698750.1698752}, doi = {10.1145/1698750.1698752}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/JiangWX10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/KateZG10, author = {Aniket Kate and Gregory M. Zaverucha and Ian Goldberg}, title = {Pairing-Based Onion Routing with Improved Forward Secrecy}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {4}, pages = {29:1--29:32}, year = {2010}, url = {https://doi.org/10.1145/1880022.1880023}, doi = {10.1145/1880022.1880023}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/KateZG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/LeeMW10, author = {Adam J. Lee and Kazuhiro Minami and Marianne Winslett}, title = {On the consistency of distributed proofs with hidden subtrees}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {3}, pages = {25:1--25:32}, year = {2010}, url = {https://doi.org/10.1145/1805974.1805981}, doi = {10.1145/1805974.1805981}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/LeeMW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/LiHKR10, author = {Feifei Li and Marios Hadjieleftheriou and George Kollios and Leonid Reyzin}, title = {Authenticated Index Structures for Aggregation Queries}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {4}, pages = {32:1--32:35}, year = {2010}, url = {https://doi.org/10.1145/1880022.1880026}, doi = {10.1145/1880022.1880026}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/LiHKR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/LibertQY10, author = {Beno{\^{\i}}t Libert and Jean{-}Jacques Quisquater and Moti Yung}, title = {Key Evolution Systems in Untrusted Update Environments}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {4}, pages = {37:1--37:34}, year = {2010}, url = {https://doi.org/10.1145/1880022.1880031}, doi = {10.1145/1880022.1880031}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/LibertQY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/LysyanskayaTT10, author = {Anna Lysyanskaya and Roberto Tamassia and Nikos Triandopoulos}, title = {Authenticated error-correcting codes with applications to multicast authentication}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {2}, pages = {17:1--17:34}, year = {2010}, url = {https://doi.org/10.1145/1698750.1698757}, doi = {10.1145/1698750.1698757}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/LysyanskayaTT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/MolloyCLWLBCL10, author = {Ian M. Molloy and Hong Chen and Tiancheng Li and Qihua Wang and Ninghui Li and Elisa Bertino and Seraphin B. Calo and Jorge Lobo}, title = {Mining Roles with Multiple Objectives}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {4}, pages = {36:1--36:35}, year = {2010}, url = {https://doi.org/10.1145/1880022.1880030}, doi = {10.1145/1880022.1880030}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/MolloyCLWLBCL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/MoranN10, author = {Tal Moran and Moni Naor}, title = {Split-ballot voting: Everlasting privacy with distributed trust}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {2}, pages = {16:1--16:43}, year = {2010}, url = {https://doi.org/10.1145/1698750.1698756}, doi = {10.1145/1698750.1698756}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/MoranN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/MukhamedovR10, author = {Aybek Mukhamedov and Mark Dermot Ryan}, title = {Identity Escrow Protocol and Anonymity Analysis in the Applied Pi-Calculus}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {4}, pages = {41:1--41:29}, year = {2010}, url = {https://doi.org/10.1145/1880022.1880035}, doi = {10.1145/1880022.1880035}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/MukhamedovR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/NiBLBKKT10, author = {Qun Ni and Elisa Bertino and Jorge Lobo and Carolyn Brodie and Clare{-}Marie Karat and John Karat and Alberto Trombetta}, title = {Privacy-aware role-based access control}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {3}, pages = {24:1--24:31}, year = {2010}, url = {https://doi.org/10.1145/1805974.1805980}, doi = {10.1145/1805974.1805980}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/NiBLBKKT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/PenningtonGBSG10, author = {Adam G. Pennington and John Linwood Griffin and John S. Bucy and John D. Strunk and Gregory R. Ganger}, title = {Storage-Based Intrusion Detection}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {4}, pages = {30:1--30:27}, year = {2010}, url = {https://doi.org/10.1145/1880022.1880024}, doi = {10.1145/1880022.1880024}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/PenningtonGBSG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/PonecGWB10, author = {Miroslav Ponec and Paul Giura and Joel Wein and Herv{\'{e}} Br{\"{o}}nnimann}, title = {New payload attribution methods for network forensic investigations}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {2}, pages = {15:1--15:32}, year = {2010}, url = {https://doi.org/10.1145/1698750.1698755}, doi = {10.1145/1698750.1698755}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/PonecGWB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/Sarkar10, author = {Palash Sarkar}, title = {A Simple and Generic Construction of Authenticated Encryption with Associated Data}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {4}, pages = {33:1--33:16}, year = {2010}, url = {https://doi.org/10.1145/1880022.1880027}, doi = {10.1145/1880022.1880027}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/Sarkar10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/SchultzLL10, author = {David A. Schultz and Barbara Liskov and Moses D. Liskov}, title = {{MPSS:} Mobile Proactive Secret Sharing}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {4}, pages = {34:1--34:32}, year = {2010}, url = {https://doi.org/10.1145/1880022.1880028}, doi = {10.1145/1880022.1880028}, timestamp = {Fri, 25 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/SchultzLL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/Thuraisingham10, author = {Bhavani Thuraisingham}, title = {Editorial {SACMAT} 2007}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {3}, pages = {23:1--23:2}, year = {2010}, url = {https://doi.org/10.1145/1805974.1805979}, doi = {10.1145/1805974.1805979}, timestamp = {Wed, 29 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/Thuraisingham10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/TsangAKS10, author = {Patrick P. Tsang and Man Ho Au and Apu Kapadia and Sean W. Smith}, title = {{BLAC:} Revoking Repeatedly Misbehaving Anonymous Users without Relying on TTPs}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {4}, pages = {39:1--39:33}, year = {2010}, url = {https://doi.org/10.1145/1880022.1880033}, doi = {10.1145/1880022.1880033}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/TsangAKS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/VaidyaAG10, author = {Jaideep Vaidya and Vijayalakshmi Atluri and Qi Guo}, title = {The role mining problem: {A} formal perspective}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {3}, pages = {27:1--27:31}, year = {2010}, url = {https://doi.org/10.1145/1805974.1895983}, doi = {10.1145/1805974.1895983}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/VaidyaAG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/VimercatiS10, author = {Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Guest editorial: Special issue on computer and communications security}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {2}, pages = {11:1--11:2}, year = {2010}, url = {https://doi.org/10.1145/1698750.1698751}, doi = {10.1145/1698750.1698751}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/VimercatiS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/WangGJT10, author = {XiaoFeng Wang and Philippe Golle and Markus Jakobsson and Alex Tsow}, title = {Deterring voluntary trace disclosure in re-encryption mix-networks}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {2}, pages = {18:1--18:24}, year = {2010}, url = {https://doi.org/10.1145/1698750.1698758}, doi = {10.1145/1698750.1698758}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/WangGJT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/WangL10, author = {Qihua Wang and Ninghui Li}, title = {Satisfiability and Resiliency in Workflow Authorization Systems}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {4}, pages = {40:1--40:35}, year = {2010}, url = {https://doi.org/10.1145/1880022.1880034}, doi = {10.1145/1880022.1880034}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/WangL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/WrightBCMM10, author = {Charles V. Wright and Lucas Ballard and Scott E. Coull and Fabian Monrose and Gerald M. Masson}, title = {Uncovering Spoken Phrases in Encrypted Voice over {IP} Conversations}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {4}, pages = {35:1--35:30}, year = {2010}, url = {https://doi.org/10.1145/1880022.1880029}, doi = {10.1145/1880022.1880029}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/WrightBCMM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ZageN10, author = {David Zage and Cristina Nita{-}Rotaru}, title = {Robust Decentralized Virtual Coordinate Systems in Adversarial Environments}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {4}, pages = {38:1--38:34}, year = {2010}, url = {https://doi.org/10.1145/1880022.1880032}, doi = {10.1145/1880022.1880032}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/ZageN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/AbadiBEL09, author = {Mart{\'{\i}}n Abadi and Mihai Budiu and {\'{U}}lfar Erlingsson and Jay Ligatti}, title = {Control-flow integrity principles, implementations, and applications}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {1}, pages = {4:1--4:40}, year = {2009}, url = {https://doi.org/10.1145/1609956.1609960}, doi = {10.1145/1609956.1609960}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/AbadiBEL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/CarminatiFP09, author = {Barbara Carminati and Elena Ferrari and Andrea Perego}, title = {Enforcing access control in Web-based social networks}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {1}, pages = {6:1--6:38}, year = {2009}, url = {https://doi.org/10.1145/1609956.1609962}, doi = {10.1145/1609956.1609962}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/CarminatiFP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/DorrendorfGP09, author = {Leo Dorrendorf and Zvi Gutterman and Benny Pinkas}, title = {Cryptanalysis of the random number generator of the Windows operating system}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {1}, pages = {10:1--10:32}, year = {2009}, url = {https://doi.org/10.1145/1609956.1609966}, doi = {10.1145/1609956.1609966}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/DorrendorfGP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/EtalleW09, author = {Sandro Etalle and William H. Winsborough}, title = {Maintaining control while delegating trust: Integrity constraints in trust management}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {1}, pages = {5:1--5:27}, year = {2009}, url = {https://doi.org/10.1145/1609956.1609961}, doi = {10.1145/1609956.1609961}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/EtalleW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/JuelsW09, author = {Ari Juels and Stephen A. Weis}, title = {Defining strong privacy for {RFID}}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {1}, pages = {7:1--7:23}, year = {2009}, url = {https://doi.org/10.1145/1609956.1609963}, doi = {10.1145/1609956.1609963}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/JuelsW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/LiLW09, author = {Jiangtao Li and Ninghui Li and William H. Winsborough}, title = {Automated trust negotiation using cryptographic credentials}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {1}, pages = {2:1--2:35}, year = {2009}, url = {https://doi.org/10.1145/1609956.1609958}, doi = {10.1145/1609956.1609958}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/LiLW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/Meadows09, author = {Catherine Meadows}, title = {Introduction to {ACM} {TISSEC} special issue on {CCS} 2005}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {1}, pages = {1:1--1:2}, year = {2009}, url = {https://doi.org/10.1145/1609956.1609957}, doi = {10.1145/1609956.1609957}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/Meadows09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/SangS09, author = {Yingpeng Sang and Hong Shen}, title = {Efficient and secure protocols for privacy-preserving set operations}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {1}, pages = {9:1--9:35}, year = {2009}, url = {https://doi.org/10.1145/1609956.1609965}, doi = {10.1145/1609956.1609965}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/SangS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ZhuB09, author = {Ye Zhu and Riccardo Bettati}, title = {Compromising anonymous communication systems using blind source separation}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {1}, pages = {8:1--8:31}, year = {2009}, url = {https://doi.org/10.1145/1609956.1609964}, doi = {10.1145/1609956.1609964}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/ZhuB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ZhuangZT09, author = {Li Zhuang and Feng Zhou and J. D. Tygar}, title = {Keyboard acoustic emanations revisited}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {1}, pages = {3:1--3:26}, year = {2009}, url = {https://doi.org/10.1145/1609956.1609959}, doi = {10.1145/1609956.1609959}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/ZhuangZT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.