default search action
Journal of Computer Security, Volume 30
Volume 30, Number 1, 2022
- Clemente Galdi, Vladimir Kolesnikov:
Special issue: Security and Cryptography for Networks - SCN 2020. 1-2 - Dario Catalano, Georg Fuchsbauer, Azam Soleimanian:
Double-authentication-preventing signatures in the standard model. 3-38 - Carsten Baum, Daniel Escudero, Alberto Pedrouzo-Ulloa, Peter Scholl, Juan Ramón Troncoso-Pastoriza:
Efficient protocols for oblivious linear function evaluation from ring-LWE. 39-78 - Ben Kreuter, Sarvar Patel, Ben Terner:
Private identity agreement for private set functionalities. 79-107 - Lydia Garms, Siaw-Lynn Ng, Elizabeth A. Quaglia, Giulia Traverso:
Anonymity and rewards in peer rating systems. 109-165 - Ivan Damgård, Thomas P. Jakobsen, Jesper Buus Nielsen, Jakob Illeborg Pagter, Michael Bæksvang Østergaard:
Fast threshold ECDSA with honest majority. 167-196 - Carmit Hazay, Mor Lilintal:
Gradual GRAM and secure computation for RAM programs. 197-229
Volume 30, Number 2, 2022
- Kadam Vikas Samarthrao, Vandana Milind Rohokale:
Enhancement of email spam detection using improved deep learning algorithms for cyber security. 231-264 - Antti Hakkala, Jani Koskinen:
Personal data protection in the age of mass surveillance. 265-289 - Isaac Amankona Obiri, Qi Xia, Hu Xia, Eric Affum, Abla Smahi, Jianbin Gao:
Personal health records sharing scheme based on attribute based signcryption with data integrity verifiable. 291-324
Volume 30, Number 3, 2022
- Thomas Groß, Luca Viganò:
Special issue on socio-technical aspects in security - editorial. 325-326 - Simon Parkin, Yi Ting Chua:
A cyber-risk framework for coordination of the prevention and preservation of behaviours. 327-356 - George Chatzisofroniou, Panayiotis Kotzanikolaou:
Exploiting WiFi usability features for association attacks in IEEE 802.11: Attack analysis and mitigation controls. 357-380 - Wojciech Jamroga, Damian Kurpiewski, Vadim Malvone:
How to measure usable security: Natural strategies in voting protocols. 381-409 - Giampaolo Bella, Rosario Giustolisi, Carsten Schürmann:
Modelling human threats in security ceremonies. 411-433 - Albesë Demjaha, Simon Parkin, David J. Pym:
The boundedly rational employee: Security economics for behaviour intervention support in organizations. 435-464 - Scott Harper, Maryam Mehrnezhad, John C. Mace:
User Privacy Concerns in Commercial Smart Buildings. 465-497 - Imre Lendák, Balázs Indig, Gábor Palkó:
WARChain: Consensus-based trust in web archives via proof-of-stake blockchain technology. 499-515
Volume 30, Number 4, 2022
- Brian A. Powell:
Securing LSB embedding against structural steganalysis. 517-539 - Qingtian Zou, Anoop Singhal, Xiaoyan Sun, Peng Liu:
Deep learning for detecting logic-flaw-exploiting network attacks: An end-to-end approach. 541-570 - Selected Papers From ESORICS 2020. 571
- Véronique Cortier, Stéphanie Delaune, Jannik Dreier, Elise Klein:
Automatic generation of sources lemmas in Tamarin: Towards automatic proofs of security protocols. 573-598 - Fabio Aiolli, Mauro Conti, Stjepan Picek, Mirko Polato:
On the feasibility of crawling-based attacks against recommender systems. 599-621 - Sebastian Paul, Patrik Scheible, Friedrich Wiemer:
Towards post-quantum security for cyber-physical systems: Integrating PQC into industrial M2M communication. 623-653
Volume 30, Number 5, 2022
- Jannik Dreier, Jean-Guillaume Dumas, Pascal Lafourcade, Léo Robert:
Optimal threshold padlock systems. 655-688 - Michele De Donno, Xenofon Fafoutis, Nicola Dragoni:
AntibIoTic: The Fog-enhanced distributed security system to protect the (legacy) Internet of Things. 689-725 - Ryan Sheatsley, Nicolas Papernot, Michael J. Weisman, Gunjan Verma, Patrick D. McDaniel:
Adversarial examples for network intrusion detection systems. 727-752
Volume 30, Number 6, 2022
- Elisa Bertino, Haya Schulmann, Michael Waidner:
Special issue ESORICS 2021. 753-755 - Zhelei Zhou, Bingsheng Zhang, Yuan Chen, Jiaqi Li, Yajin Zhou, Yibiao Lu, Kui Ren, Phuc Thai, Hong-Sheng Zhou:
Scriptable and composable SNARKs in the trusted hardware model. 757-793 - Xiaoning Liu, Yifeng Zheng, Xingliang Yuan, Xun Yi:
Deep learning-based medical diagnostic services: A secure, lightweight, and accurate realization. 795-827 - Shabnam Kasra Kermanshahi, Rafael Dowsley, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Surya Nepal, Xun Yi, Shangqi Lai:
Range search on encrypted spatial data with dynamic updates. 829-849 - Antonio Nappa, Aaron Úbeda-Portugués, Panagiotis Papadopoulos, Matteo Varvello, Juan Tapiador, Andrea Lanzi:
Scramblesuit: An effective timing side-channels framework for malware sandbox evasion. 851-876 - Liron David, Avishai Wool:
PESrank: An Explainable online password strength estimator. 877-901
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.