Search dblp for Publications

export results for "toc:db/journals/tissec/tissec16.bht:"

 download as .bib file

@article{DBLP:journals/tissec/ArkoudasCC14,
  author       = {Konstantine Arkoudas and
                  Ritu Chadha and
                  C. Jason Chiang},
  title        = {Sophisticated Access Control via {SMT} and Logical Frameworks},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {16},
  number       = {4},
  pages        = {17},
  year         = {2014},
  url          = {https://doi.org/10.1145/2595222},
  doi          = {10.1145/2595222},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/ArkoudasCC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BilgeSBKK14,
  author       = {Leyla Bilge and
                  Sevil Sen and
                  Davide Balzarotti and
                  Engin Kirda and
                  Christopher Kruegel},
  title        = {Exposure: {A} Passive {DNS} Analysis Service to Detect and Report
                  Malicious Domains},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {16},
  number       = {4},
  pages        = {14},
  year         = {2014},
  url          = {https://doi.org/10.1145/2584679},
  doi          = {10.1145/2584679},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/BilgeSBKK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ChenLY14,
  author       = {Liqun Chen and
                  Hoon Wei Lim and
                  Guomin Yang},
  title        = {Cross-Domain Password-Based Authenticated Key Exchange Revisited},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {16},
  number       = {4},
  pages        = {15},
  year         = {2014},
  url          = {https://doi.org/10.1145/2584681},
  doi          = {10.1145/2584681},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/ChenLY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ChenSDM14,
  author       = {Teh{-}Chung Chen and
                  Torin Stepan and
                  Scott Dick and
                  James Miller},
  title        = {An Anti-Phishing System Employing Diffused Information},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {16},
  number       = {4},
  pages        = {16},
  year         = {2014},
  url          = {https://doi.org/10.1145/2584680},
  doi          = {10.1145/2584680},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/ChenSDM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/GiladH14,
  author       = {Yossi Gilad and
                  Amir Herzberg},
  title        = {Off-Path {TCP} Injection Attacks},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {16},
  number       = {4},
  pages        = {13},
  year         = {2014},
  url          = {https://doi.org/10.1145/2597173},
  doi          = {10.1145/2597173},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/GiladH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BasinJKZ13,
  author       = {David A. Basin and
                  Vincent Jug{\'{e}} and
                  Felix Klaedtke and
                  Eugen Zalinescu},
  title        = {Enforceable Security Policies Revisited},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {16},
  number       = {1},
  pages        = {3},
  year         = {2013},
  url          = {https://doi.org/10.1145/2487222.2487225},
  doi          = {10.1145/2487222.2487225},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/BasinJKZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BlantonZF13,
  author       = {Marina Blanton and
                  Yihua Zhang and
                  Keith B. Frikken},
  title        = {Secure and verifiable outsourcing of large-scale biometric computations},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {16},
  number       = {3},
  pages        = {11},
  year         = {2013},
  url          = {https://doi.org/10.1145/2535523},
  doi          = {10.1145/2535523},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/BlantonZF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ChengDD13,
  author       = {Yueqiang Cheng and
                  Xuhua Ding and
                  Robert H. Deng},
  title        = {DriverGuard: Virtualization-Based Fine-Grained Protection on {I/O}
                  Flows},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {16},
  number       = {2},
  pages        = {6},
  year         = {2013},
  url          = {https://doi.org/10.1145/2516951.2505123},
  doi          = {10.1145/2516951.2505123},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/ChengDD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/CobbBL13,
  author       = {William E. Cobb and
                  Rusty O. Baldwin and
                  Eric D. Laspe},
  title        = {Leakage Mapping: {A} Systematic Methodology for Assessing the Side-Channel
                  Information Leakage of Cryptographic Implementations},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {16},
  number       = {1},
  pages        = {2},
  year         = {2013},
  url          = {https://doi.org/10.1145/2487222.2487224},
  doi          = {10.1145/2487222.2487224},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/CobbBL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/CramptonGY13,
  author       = {Jason Crampton and
                  Gregory Z. Gutin and
                  Anders Yeo},
  title        = {On the Parameterized Complexity and Kernelization of the Workflow
                  Satisfiability Problem},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {16},
  number       = {1},
  pages        = {4},
  year         = {2013},
  url          = {https://doi.org/10.1145/2487222.2487226},
  doi          = {10.1145/2487222.2487226},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/CramptonGY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/DriessenHWPH13,
  author       = {Benedikt Driessen and
                  Ralf Hund and
                  Carsten Willems and
                  Christof Paar and
                  Thorsten Holz},
  title        = {An experimental security analysis of two satphone standards},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {16},
  number       = {3},
  pages        = {10},
  year         = {2013},
  url          = {https://doi.org/10.1145/2535522},
  doi          = {10.1145/2535522},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/DriessenHWPH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/FuL13,
  author       = {Yangchun Fu and
                  Zhiqiang Lin},
  title        = {Bridging the Semantic Gap in Virtual Machine Introspection via Online
                  Kernel Data Redirection},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {16},
  number       = {2},
  pages        = {7},
  year         = {2013},
  url          = {https://doi.org/10.1145/2516951.2505124},
  doi          = {10.1145/2516951.2505124},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/FuL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/LeonardHS13,
  author       = {Thomas Leonard and
                  Martin Hall{-}May and
                  Mike Surridge},
  title        = {Modelling Access Propagation in Dynamic Systems},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {16},
  number       = {2},
  pages        = {5},
  year         = {2013},
  url          = {https://doi.org/10.1145/2516951.2516952},
  doi          = {10.1145/2516951.2516952},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/LeonardHS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/PhilippaertsYMPLW13,
  author       = {Pieter Philippaerts and
                  Yves Younan and
                  Stijn Muylle and
                  Frank Piessens and
                  Sven Lachmund and
                  Thomas Walter},
  title        = {{CPM:} Masking Code Pointers to Prevent Code Injection Attacks},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {16},
  number       = {1},
  pages        = {1},
  year         = {2013},
  url          = {https://doi.org/10.1145/2487222.2487223},
  doi          = {10.1145/2487222.2487223},
  timestamp    = {Mon, 13 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/PhilippaertsYMPLW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/SerwaddaP13,
  author       = {Abdul Serwadda and
                  Vir V. Phoha},
  title        = {Examining a Large Keystroke Biometrics Dataset for Statistical-Attack
                  Openings},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {16},
  number       = {2},
  pages        = {8},
  year         = {2013},
  url          = {https://doi.org/10.1145/2516951.2516960},
  doi          = {10.1145/2516951.2516960},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/SerwaddaP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/SunTS0M13,
  author       = {Mengtao Sun and
                  Gang Tan and
                  Joseph Siefers and
                  Bin Zeng and
                  Greg Morrisett},
  title        = {Bringing java's wild native world under control},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {16},
  number       = {3},
  pages        = {9},
  year         = {2013},
  url          = {https://doi.org/10.1145/2535505},
  doi          = {10.1145/2535505},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/SunTS0M13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/WilliamsS13,
  author       = {Peter Williams and
                  Radu Sion},
  title        = {Access privacy and correctness on untrusted storage},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {16},
  number       = {3},
  pages        = {12},
  year         = {2013},
  url          = {https://doi.org/10.1145/2535524},
  doi          = {10.1145/2535524},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/WilliamsS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics