Search dblp for Publications

export results for "toc:db/journals/tissec/tissec19.bht:"

 download as .bib file

@article{DBLP:journals/tissec/ArgyrosPSKP17,
  author    = {George Argyros and
               Theofilos Petsios and
               Suphannee Sivakorn and
               Angelos D. Keromytis and
               Iasonas Polakis},
  title     = {Evaluating the Privacy Guarantees of Location Proximity Services},
  journal   = {{ACM} Trans. Priv. Secur.},
  volume    = {19},
  number    = {4},
  pages     = {12:1--12:31},
  year      = {2017},
  url       = {https://doi.org/10.1145/3007209},
  doi       = {10.1145/3007209},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tissec/ArgyrosPSKP17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/MeutznerGNHK17,
  author    = {Hendrik Meutzner and
               Santosh Gupta and
               Viet{-}Hung Nguyen and
               Thorsten Holz and
               Dorothea Kolossa},
  title     = {Toward Improved Audio CAPTCHAs Based on Auditory Perception and Language
               Understanding},
  journal   = {{ACM} Trans. Priv. Secur.},
  volume    = {19},
  number    = {4},
  pages     = {10:1--10:31},
  year      = {2017},
  url       = {https://doi.org/10.1145/2856820},
  doi       = {10.1145/2856820},
  timestamp = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tissec/MeutznerGNHK17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ShokriTT17,
  author    = {Reza Shokri and
               George Theodorakopoulos and
               Carmela Troncoso},
  title     = {Privacy Games Along Location Traces: {A} Game-Theoretic Framework
               for Optimizing Location Privacy},
  journal   = {{ACM} Trans. Priv. Secur.},
  volume    = {19},
  number    = {4},
  pages     = {11:1--11:31},
  year      = {2017},
  url       = {https://doi.org/10.1145/3009908},
  doi       = {10.1145/3009908},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tissec/ShokriTT17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/AonghusaL16,
  author    = {Pol Mac Aonghusa and
               Douglas J. Leith},
  title     = {Don't Let Google Know I'm Lonely},
  journal   = {{ACM} Trans. Priv. Secur.},
  volume    = {19},
  number    = {1},
  pages     = {3:1--3:25},
  year      = {2016},
  url       = {https://doi.org/10.1145/2937754},
  doi       = {10.1145/2937754},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tissec/AonghusaL16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/CramptonGGJW16,
  author    = {Jason Crampton and
               Andrei Gagarin and
               Gregory Z. Gutin and
               Mark Jones and
               Magnus Wahlstr{\"{o}}m},
  title     = {On the Workflow Satisfiability Problem with Class-Independent Constraints
               for Hierarchical Organizations},
  journal   = {{ACM} Trans. Priv. Secur.},
  volume    = {19},
  number    = {3},
  pages     = {8:1--8:29},
  year      = {2016},
  url       = {https://doi.org/10.1145/2988239},
  doi       = {10.1145/2988239},
  timestamp = {Thu, 05 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tissec/CramptonGGJW16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/DongKC16,
  author    = {Zheng Dong and
               Kevin Kane and
               L. Jean Camp},
  title     = {Detection of Rogue Certificates from Trusted Certificate Authorities
               Using Deep Neural Networks},
  journal   = {{ACM} Trans. Priv. Secur.},
  volume    = {19},
  number    = {2},
  pages     = {5:1--5:31},
  year      = {2016},
  url       = {https://doi.org/10.1145/2975591},
  doi       = {10.1145/2975591},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tissec/DongKC16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/EberzRLM16,
  author    = {Simon Eberz and
               Kasper Bonne Rasmussen and
               Vincent Lenders and
               Ivan Martinovic},
  title     = {Looks Like Eve: Exposing Insider Threats Using Eye Movement Biometrics},
  journal   = {{ACM} Trans. Priv. Secur.},
  volume    = {19},
  number    = {1},
  pages     = {1:1--1:31},
  year      = {2016},
  url       = {https://doi.org/10.1145/2904018},
  doi       = {10.1145/2904018},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tissec/EberzRLM16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/GarayKM16,
  author    = {Juan A. Garay and
               Vladimir Kolesnikov and
               Rae McLellan},
  title     = {{MAC} Precomputation with Applications to Secure Memory},
  journal   = {{ACM} Trans. Priv. Secur.},
  volume    = {19},
  number    = {2},
  pages     = {6:1--6:21},
  year      = {2016},
  url       = {https://doi.org/10.1145/2943780},
  doi       = {10.1145/2943780},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tissec/GarayKM16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/GutierrezASAA16,
  author    = {Christopher N. Gutierrez and
               Mohammed H. Almeshekah and
               Eugene H. Spafford and
               Mikhail J. Atallah and
               Jeffrey Avery},
  title     = {Inhibiting and Detecting Offline Password Cracking Using ErsatzPasswords},
  journal   = {{ACM} Trans. Priv. Secur.},
  volume    = {19},
  number    = {3},
  pages     = {9:1--9:30},
  year      = {2016},
  url       = {http://dl.acm.org/citation.cfm?id=2996457},
  timestamp = {Mon, 02 Jul 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tissec/GutierrezASAA16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/MitropoulosSSK16,
  author    = {Dimitris Mitropoulos and
               Konstantinos Stroggylos and
               Diomidis Spinellis and
               Angelos D. Keromytis},
  title     = {How to Train Your Browser: Preventing {XSS} Attacks Using Contextual
               Script Fingerprints},
  journal   = {{ACM} Trans. Priv. Secur.},
  volume    = {19},
  number    = {1},
  pages     = {2:1--2:31},
  year      = {2016},
  url       = {https://doi.org/10.1145/2939374},
  doi       = {10.1145/2939374},
  timestamp = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tissec/MitropoulosSSK16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/OzalpGNS16,
  author    = {Ismet Ozalp and
               Mehmet Emre Gursoy and
               Mehmet Ercan Nergiz and
               Y{\"{u}}cel Saygin},
  title     = {Privacy-Preserving Publishing of Hierarchical Data},
  journal   = {{ACM} Trans. Priv. Secur.},
  volume    = {19},
  number    = {3},
  pages     = {7:1--7:29},
  year      = {2016},
  url       = {https://doi.org/10.1145/2976738},
  doi       = {10.1145/2976738},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tissec/OzalpGNS16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/RahbariniaPA16,
  author    = {Babak Rahbarinia and
               Roberto Perdisci and
               Manos Antonakakis},
  title     = {Efficient and Accurate Behavior-Based Tracking of Malware-Control
               Domains in Large {ISP} Networks},
  journal   = {{ACM} Trans. Priv. Secur.},
  volume    = {19},
  number    = {2},
  pages     = {4:1--4:31},
  year      = {2016},
  url       = {https://doi.org/10.1145/2960409},
  doi       = {10.1145/2960409},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tissec/RahbariniaPA16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics