


default search action
Search dblp for Publications
export results for "toc:db/journals/jcs/jcs24.bht:"
@article{DBLP:journals/jcs/AmorimCDDHPPPT16, author = {Arthur Azevedo de Amorim and Nathan Collins and Andr{\'{e}} DeHon and Delphine Demange and Catalin Hritcu and David Pichardie and Benjamin C. Pierce and Randy Pollack and Andrew Tolmach}, title = {A verified information-flow architecture}, journal = {J. Comput. Secur.}, volume = {24}, number = {6}, pages = {689--734}, year = {2016}, url = {https://doi.org/10.3233/JCS-15784}, doi = {10.3233/JCS-15784}, timestamp = {Thu, 01 May 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/AmorimCDDHPPPT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/BodeiDGS16, author = {Chiara Bodei and Pierpaolo Degano and Letterio Galletta and Francesco Salvatori}, title = {Context-aware security: Linguistic mechanisms and static analysis}, journal = {J. Comput. Secur.}, volume = {24}, number = {4}, pages = {427--477}, year = {2016}, url = {https://doi.org/10.3233/JCS-160551}, doi = {10.3233/JCS-160551}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/BodeiDGS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/BohlU16, author = {Florian B{\"{o}}hl and Dominique Unruh}, title = {Symbolic universal composability}, journal = {J. Comput. Secur.}, volume = {24}, number = {1}, pages = {1--38}, year = {2016}, url = {https://doi.org/10.3233/JCS-140523}, doi = {10.3233/JCS-140523}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/BohlU16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/CarterMTB15, author = {Henry Carter and Benjamin Mood and Patrick Traynor and Kevin R. B. Butler}, title = {Secure outsourced garbled circuit evaluation for mobile devices}, journal = {J. Comput. Secur.}, volume = {24}, number = {2}, pages = {137--180}, year = {2016}, url = {https://doi.org/10.3233/JCS-150540}, doi = {10.3233/JCS-150540}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/CarterMTB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/ChenZ15, author = {Yu Chen and Zongyang Zhang}, title = {Publicly evaluable pseudorandom functions and their applications}, journal = {J. Comput. Secur.}, volume = {24}, number = {2}, pages = {289--320}, year = {2016}, url = {https://doi.org/10.3233/JCS-160547}, doi = {10.3233/JCS-160547}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/ChenZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/CrescenzoCMP16, author = {Giovanni Di Crescenzo and Debra L. Cook and Allen McIntosh and Euthimios Panagos}, title = {Practical and privacy-preserving information retrieval from a database table}, journal = {J. Comput. Secur.}, volume = {24}, number = {4}, pages = {479--506}, year = {2016}, url = {https://doi.org/10.3233/JCS-160550}, doi = {10.3233/JCS-160550}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/CrescenzoCMP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/DSouzaR16, author = {Deepak D'Souza and R. K. Ramesh}, title = {Model-checking trace-based information flow properties for infinite-state systems}, journal = {J. Comput. Secur.}, volume = {24}, number = {5}, pages = {617--643}, year = {2016}, url = {https://doi.org/10.3233/JCS-160549}, doi = {10.3233/JCS-160549}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/DSouzaR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/DavidsonTG16, author = {Michal Davidson and Tamir Tassa and Ehud Gudes}, title = {Content sharing schemes in {DRM} systems with enhanced performance and privacy preservation}, journal = {J. Comput. Secur.}, volume = {24}, number = {6}, pages = {667--688}, year = {2016}, url = {https://doi.org/10.3233/JCS-15746}, doi = {10.3233/JCS-15746}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/DavidsonTG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/GuancialeNDB16, author = {Roberto Guanciale and Hamed Nemati and Mads Dam and Christoph Baumann}, title = {Provably secure memory isolation for Linux on {ARM}}, journal = {J. Comput. Secur.}, volume = {24}, number = {6}, pages = {793--837}, year = {2016}, url = {https://doi.org/10.3233/JCS-160558}, doi = {10.3233/JCS-160558}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/GuancialeNDB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/HedinBS15, author = {Daniel Hedin and Luciano Bello and Andrei Sabelfeld}, title = {Information-flow security for JavaScript and its APIs}, journal = {J. Comput. Secur.}, volume = {24}, number = {2}, pages = {181--234}, year = {2016}, url = {https://doi.org/10.3233/JCS-160544}, doi = {10.3233/JCS-160544}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/HedinBS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/JajodiaPSS16, author = {Sushil Jajodia and Noseong Park and Edoardo Serra and V. S. Subrahmanian}, title = {Using temporal probabilistic logic for optimal monitoring of security events with limited resources}, journal = {J. Comput. Secur.}, volume = {24}, number = {6}, pages = {735--791}, year = {2016}, url = {https://doi.org/10.3233/JCS-160555}, doi = {10.3233/JCS-160555}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/JajodiaPSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/JingAHCZ16, author = {Yiming Jing and Gail{-}Joon Ahn and Hongxin Hu and Haehyun Cho and Ziming Zhao}, title = {TripleMon: {A} multi-layer security framework for mediating inter-process communication on Android}, journal = {J. Comput. Secur.}, volume = {24}, number = {4}, pages = {405--426}, year = {2016}, url = {https://doi.org/10.3233/JCS-160552}, doi = {10.3233/JCS-160552}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/JingAHCZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/KarPS16, author = {Debabrata Kar and Suvasini Panigrahi and Srikanth Sundararajan}, title = {SQLiDDS: {SQL} injection detection using document similarity measure}, journal = {J. Comput. Secur.}, volume = {24}, number = {4}, pages = {507--539}, year = {2016}, url = {https://doi.org/10.3233/JCS-160554}, doi = {10.3233/JCS-160554}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/KarPS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/KremerK16, author = {Steve Kremer and Robert K{\"{u}}nnemann}, title = {Automated analysis of security protocols with global state}, journal = {J. Comput. Secur.}, volume = {24}, number = {5}, pages = {583--616}, year = {2016}, url = {https://doi.org/10.3233/JCS-160556}, doi = {10.3233/JCS-160556}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/KremerK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/LeKAJ16, author = {Meixing Le and Krishna Kant and Malek Athamnah and Sushil Jajodia}, title = {Minimum cost rule enforcement for cooperative database access}, journal = {J. Comput. Secur.}, volume = {24}, number = {3}, pages = {379--403}, year = {2016}, url = {https://doi.org/10.3233/JCS-160548}, doi = {10.3233/JCS-160548}, timestamp = {Tue, 01 Apr 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/LeKAJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/LesterOS16, author = {Martin Mariusz Lester and Luke Ong and Max Sch{\"{a}}fer}, title = {Information flow analysis for a dynamically typed language with staged metaprogramming}, journal = {J. Comput. Secur.}, volume = {24}, number = {5}, pages = {541--582}, year = {2016}, url = {https://doi.org/10.3233/JCS-160557}, doi = {10.3233/JCS-160557}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/LesterOS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/LuoSMR16, author = {Zhengqin Luo and Jos{\'{e}} Fragoso Santos and Ana Almeida Matos and Tamara Rezk}, title = {Mashic compiler: Mashup sandboxing based on inter-frame communication}, journal = {J. Comput. Secur.}, volume = {24}, number = {1}, pages = {91--136}, year = {2016}, url = {https://doi.org/10.3233/JCS-160542}, doi = {10.3233/JCS-160542}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/LuoSMR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/RafnssonS16, author = {Willard Rafnsson and Andrei Sabelfeld}, title = {Secure multi-execution: Fine-grained, declassification-aware, and transparent}, journal = {J. Comput. Secur.}, volume = {24}, number = {1}, pages = {39--90}, year = {2016}, url = {https://doi.org/10.3233/JCS-150541}, doi = {10.3233/JCS-150541}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/RafnssonS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/SonchackA16, author = {John Sonchack and Adam J. Aviv}, title = {Exploring large scale security system reproducibility with the {LESS} simulator}, journal = {J. Comput. Secur.}, volume = {24}, number = {5}, pages = {645--665}, year = {2016}, url = {https://doi.org/10.3233/JCS-160553}, doi = {10.3233/JCS-160553}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/SonchackA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/TaglientiC15, author = {Claudio Taglienti and James Cannady}, title = {The user attribution problem and the challenge of persistent surveillance of user activity in complex networks}, journal = {J. Comput. Secur.}, volume = {24}, number = {2}, pages = {235--288}, year = {2016}, url = {https://doi.org/10.3233/JCS-160546}, doi = {10.3233/JCS-160546}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/TaglientiC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/VavilisPZ16, author = {Sokratis Vavilis and Milan Petkovic and Nicola Zannone}, title = {A severity-based quantification of data leakages in database systems}, journal = {J. Comput. Secur.}, volume = {24}, number = {3}, pages = {321--345}, year = {2016}, url = {https://doi.org/10.3233/JCS-160543}, doi = {10.3233/JCS-160543}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/VavilisPZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/VimercatiFJPS16, author = {Sabrina De Capitani di Vimercati and Sara Foresti and Sushil Jajodia and Stefano Paraboschi and Pierangela Samarati}, title = {Efficient integrity checks for join queries in the cloud}, journal = {J. Comput. Secur.}, volume = {24}, number = {3}, pages = {347--378}, year = {2016}, url = {https://doi.org/10.3233/JCS-160545}, doi = {10.3233/JCS-160545}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/VimercatiFJPS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.