Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/tissec/tissec16.bht:"
@article{DBLP:journals/tissec/ArkoudasCC14, author = {Konstantine Arkoudas and Ritu Chadha and C. Jason Chiang}, title = {Sophisticated Access Control via {SMT} and Logical Frameworks}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {16}, number = {4}, pages = {17}, year = {2014}, url = {https://doi.org/10.1145/2595222}, doi = {10.1145/2595222}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/ArkoudasCC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BilgeSBKK14, author = {Leyla Bilge and Sevil Sen and Davide Balzarotti and Engin Kirda and Christopher Kruegel}, title = {Exposure: {A} Passive {DNS} Analysis Service to Detect and Report Malicious Domains}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {16}, number = {4}, pages = {14}, year = {2014}, url = {https://doi.org/10.1145/2584679}, doi = {10.1145/2584679}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/BilgeSBKK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ChenLY14, author = {Liqun Chen and Hoon Wei Lim and Guomin Yang}, title = {Cross-Domain Password-Based Authenticated Key Exchange Revisited}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {16}, number = {4}, pages = {15}, year = {2014}, url = {https://doi.org/10.1145/2584681}, doi = {10.1145/2584681}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/ChenLY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ChenSDM14, author = {Teh{-}Chung Chen and Torin Stepan and Scott Dick and James Miller}, title = {An Anti-Phishing System Employing Diffused Information}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {16}, number = {4}, pages = {16}, year = {2014}, url = {https://doi.org/10.1145/2584680}, doi = {10.1145/2584680}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/ChenSDM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/GiladH14, author = {Yossi Gilad and Amir Herzberg}, title = {Off-Path {TCP} Injection Attacks}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {16}, number = {4}, pages = {13}, year = {2014}, url = {https://doi.org/10.1145/2597173}, doi = {10.1145/2597173}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/GiladH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BasinJKZ13, author = {David A. Basin and Vincent Jug{\'{e}} and Felix Klaedtke and Eugen Zalinescu}, title = {Enforceable Security Policies Revisited}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {16}, number = {1}, pages = {3}, year = {2013}, url = {https://doi.org/10.1145/2487222.2487225}, doi = {10.1145/2487222.2487225}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/BasinJKZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BlantonZF13, author = {Marina Blanton and Yihua Zhang and Keith B. Frikken}, title = {Secure and verifiable outsourcing of large-scale biometric computations}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {16}, number = {3}, pages = {11}, year = {2013}, url = {https://doi.org/10.1145/2535523}, doi = {10.1145/2535523}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/BlantonZF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ChengDD13, author = {Yueqiang Cheng and Xuhua Ding and Robert H. Deng}, title = {DriverGuard: Virtualization-Based Fine-Grained Protection on {I/O} Flows}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {16}, number = {2}, pages = {6}, year = {2013}, url = {https://doi.org/10.1145/2516951.2505123}, doi = {10.1145/2516951.2505123}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/ChengDD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/CobbBL13, author = {William E. Cobb and Rusty O. Baldwin and Eric D. Laspe}, title = {Leakage Mapping: {A} Systematic Methodology for Assessing the Side-Channel Information Leakage of Cryptographic Implementations}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {16}, number = {1}, pages = {2}, year = {2013}, url = {https://doi.org/10.1145/2487222.2487224}, doi = {10.1145/2487222.2487224}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/CobbBL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/CramptonGY13, author = {Jason Crampton and Gregory Z. Gutin and Anders Yeo}, title = {On the Parameterized Complexity and Kernelization of the Workflow Satisfiability Problem}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {16}, number = {1}, pages = {4}, year = {2013}, url = {https://doi.org/10.1145/2487222.2487226}, doi = {10.1145/2487222.2487226}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/CramptonGY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/DriessenHWPH13, author = {Benedikt Driessen and Ralf Hund and Carsten Willems and Christof Paar and Thorsten Holz}, title = {An experimental security analysis of two satphone standards}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {16}, number = {3}, pages = {10}, year = {2013}, url = {https://doi.org/10.1145/2535522}, doi = {10.1145/2535522}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/DriessenHWPH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/FuL13, author = {Yangchun Fu and Zhiqiang Lin}, title = {Bridging the Semantic Gap in Virtual Machine Introspection via Online Kernel Data Redirection}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {16}, number = {2}, pages = {7}, year = {2013}, url = {https://doi.org/10.1145/2516951.2505124}, doi = {10.1145/2516951.2505124}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/FuL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/LeonardHS13, author = {Thomas Leonard and Martin Hall{-}May and Mike Surridge}, title = {Modelling Access Propagation in Dynamic Systems}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {16}, number = {2}, pages = {5}, year = {2013}, url = {https://doi.org/10.1145/2516951.2516952}, doi = {10.1145/2516951.2516952}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/LeonardHS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/PhilippaertsYMPLW13, author = {Pieter Philippaerts and Yves Younan and Stijn Muylle and Frank Piessens and Sven Lachmund and Thomas Walter}, title = {{CPM:} Masking Code Pointers to Prevent Code Injection Attacks}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {16}, number = {1}, pages = {1}, year = {2013}, url = {https://doi.org/10.1145/2487222.2487223}, doi = {10.1145/2487222.2487223}, timestamp = {Mon, 13 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/PhilippaertsYMPLW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/SerwaddaP13, author = {Abdul Serwadda and Vir V. Phoha}, title = {Examining a Large Keystroke Biometrics Dataset for Statistical-Attack Openings}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {16}, number = {2}, pages = {8}, year = {2013}, url = {https://doi.org/10.1145/2516951.2516960}, doi = {10.1145/2516951.2516960}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/SerwaddaP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/SunTS0M13, author = {Mengtao Sun and Gang Tan and Joseph Siefers and Bin Zeng and Greg Morrisett}, title = {Bringing java's wild native world under control}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {16}, number = {3}, pages = {9}, year = {2013}, url = {https://doi.org/10.1145/2535505}, doi = {10.1145/2535505}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/SunTS0M13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/WilliamsS13, author = {Peter Williams and Radu Sion}, title = {Access privacy and correctness on untrusted storage}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {16}, number = {3}, pages = {12}, year = {2013}, url = {https://doi.org/10.1145/2535524}, doi = {10.1145/2535524}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/WilliamsS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.