Search dblp for Publications

export results for "toc:db/journals/jcs/jcs24.bht:"

 download as .bib file

@article{DBLP:journals/jcs/AmorimCDDHPPPT16,
  author       = {Arthur Azevedo de Amorim and
                  Nathan Collins and
                  Andr{\'{e}} DeHon and
                  Delphine Demange and
                  Catalin Hritcu and
                  David Pichardie and
                  Benjamin C. Pierce and
                  Randy Pollack and
                  Andrew Tolmach},
  title        = {A verified information-flow architecture},
  journal      = {J. Comput. Secur.},
  volume       = {24},
  number       = {6},
  pages        = {689--734},
  year         = {2016},
  url          = {https://doi.org/10.3233/JCS-15784},
  doi          = {10.3233/JCS-15784},
  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/AmorimCDDHPPPT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/BodeiDGS16,
  author       = {Chiara Bodei and
                  Pierpaolo Degano and
                  Letterio Galletta and
                  Francesco Salvatori},
  title        = {Context-aware security: Linguistic mechanisms and static analysis},
  journal      = {J. Comput. Secur.},
  volume       = {24},
  number       = {4},
  pages        = {427--477},
  year         = {2016},
  url          = {https://doi.org/10.3233/JCS-160551},
  doi          = {10.3233/JCS-160551},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/BodeiDGS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/BohlU16,
  author       = {Florian B{\"{o}}hl and
                  Dominique Unruh},
  title        = {Symbolic universal composability},
  journal      = {J. Comput. Secur.},
  volume       = {24},
  number       = {1},
  pages        = {1--38},
  year         = {2016},
  url          = {https://doi.org/10.3233/JCS-140523},
  doi          = {10.3233/JCS-140523},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/BohlU16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/CarterMTB15,
  author       = {Henry Carter and
                  Benjamin Mood and
                  Patrick Traynor and
                  Kevin R. B. Butler},
  title        = {Secure outsourced garbled circuit evaluation for mobile devices},
  journal      = {J. Comput. Secur.},
  volume       = {24},
  number       = {2},
  pages        = {137--180},
  year         = {2016},
  url          = {https://doi.org/10.3233/JCS-150540},
  doi          = {10.3233/JCS-150540},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/CarterMTB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/ChenZ15,
  author       = {Yu Chen and
                  Zongyang Zhang},
  title        = {Publicly evaluable pseudorandom functions and their applications},
  journal      = {J. Comput. Secur.},
  volume       = {24},
  number       = {2},
  pages        = {289--320},
  year         = {2016},
  url          = {https://doi.org/10.3233/JCS-160547},
  doi          = {10.3233/JCS-160547},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/ChenZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/CrescenzoCMP16,
  author       = {Giovanni Di Crescenzo and
                  Debra L. Cook and
                  Allen McIntosh and
                  Euthimios Panagos},
  title        = {Practical and privacy-preserving information retrieval from a database
                  table},
  journal      = {J. Comput. Secur.},
  volume       = {24},
  number       = {4},
  pages        = {479--506},
  year         = {2016},
  url          = {https://doi.org/10.3233/JCS-160550},
  doi          = {10.3233/JCS-160550},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/CrescenzoCMP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/DSouzaR16,
  author       = {Deepak D'Souza and
                  R. K. Ramesh},
  title        = {Model-checking trace-based information flow properties for infinite-state
                  systems},
  journal      = {J. Comput. Secur.},
  volume       = {24},
  number       = {5},
  pages        = {617--643},
  year         = {2016},
  url          = {https://doi.org/10.3233/JCS-160549},
  doi          = {10.3233/JCS-160549},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/DSouzaR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/DavidsonTG16,
  author       = {Michal Davidson and
                  Tamir Tassa and
                  Ehud Gudes},
  title        = {Content sharing schemes in {DRM} systems with enhanced performance
                  and privacy preservation},
  journal      = {J. Comput. Secur.},
  volume       = {24},
  number       = {6},
  pages        = {667--688},
  year         = {2016},
  url          = {https://doi.org/10.3233/JCS-15746},
  doi          = {10.3233/JCS-15746},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/DavidsonTG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/GuancialeNDB16,
  author       = {Roberto Guanciale and
                  Hamed Nemati and
                  Mads Dam and
                  Christoph Baumann},
  title        = {Provably secure memory isolation for Linux on {ARM}},
  journal      = {J. Comput. Secur.},
  volume       = {24},
  number       = {6},
  pages        = {793--837},
  year         = {2016},
  url          = {https://doi.org/10.3233/JCS-160558},
  doi          = {10.3233/JCS-160558},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/GuancialeNDB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/HedinBS15,
  author       = {Daniel Hedin and
                  Luciano Bello and
                  Andrei Sabelfeld},
  title        = {Information-flow security for JavaScript and its APIs},
  journal      = {J. Comput. Secur.},
  volume       = {24},
  number       = {2},
  pages        = {181--234},
  year         = {2016},
  url          = {https://doi.org/10.3233/JCS-160544},
  doi          = {10.3233/JCS-160544},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/HedinBS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/JajodiaPSS16,
  author       = {Sushil Jajodia and
                  Noseong Park and
                  Edoardo Serra and
                  V. S. Subrahmanian},
  title        = {Using temporal probabilistic logic for optimal monitoring of security
                  events with limited resources},
  journal      = {J. Comput. Secur.},
  volume       = {24},
  number       = {6},
  pages        = {735--791},
  year         = {2016},
  url          = {https://doi.org/10.3233/JCS-160555},
  doi          = {10.3233/JCS-160555},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/JajodiaPSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/JingAHCZ16,
  author       = {Yiming Jing and
                  Gail{-}Joon Ahn and
                  Hongxin Hu and
                  Haehyun Cho and
                  Ziming Zhao},
  title        = {TripleMon: {A} multi-layer security framework for mediating inter-process
                  communication on Android},
  journal      = {J. Comput. Secur.},
  volume       = {24},
  number       = {4},
  pages        = {405--426},
  year         = {2016},
  url          = {https://doi.org/10.3233/JCS-160552},
  doi          = {10.3233/JCS-160552},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/JingAHCZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/KarPS16,
  author       = {Debabrata Kar and
                  Suvasini Panigrahi and
                  Srikanth Sundararajan},
  title        = {SQLiDDS: {SQL} injection detection using document similarity measure},
  journal      = {J. Comput. Secur.},
  volume       = {24},
  number       = {4},
  pages        = {507--539},
  year         = {2016},
  url          = {https://doi.org/10.3233/JCS-160554},
  doi          = {10.3233/JCS-160554},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/KarPS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/KremerK16,
  author       = {Steve Kremer and
                  Robert K{\"{u}}nnemann},
  title        = {Automated analysis of security protocols with global state},
  journal      = {J. Comput. Secur.},
  volume       = {24},
  number       = {5},
  pages        = {583--616},
  year         = {2016},
  url          = {https://doi.org/10.3233/JCS-160556},
  doi          = {10.3233/JCS-160556},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/KremerK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/LeKAJ16,
  author       = {Meixing Le and
                  Krishna Kant and
                  Malek Athamnah and
                  Sushil Jajodia},
  title        = {Minimum cost rule enforcement for cooperative database access},
  journal      = {J. Comput. Secur.},
  volume       = {24},
  number       = {3},
  pages        = {379--403},
  year         = {2016},
  url          = {https://doi.org/10.3233/JCS-160548},
  doi          = {10.3233/JCS-160548},
  timestamp    = {Tue, 01 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/LeKAJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/LesterOS16,
  author       = {Martin Mariusz Lester and
                  Luke Ong and
                  Max Sch{\"{a}}fer},
  title        = {Information flow analysis for a dynamically typed language with staged
                  metaprogramming},
  journal      = {J. Comput. Secur.},
  volume       = {24},
  number       = {5},
  pages        = {541--582},
  year         = {2016},
  url          = {https://doi.org/10.3233/JCS-160557},
  doi          = {10.3233/JCS-160557},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/LesterOS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/LuoSMR16,
  author       = {Zhengqin Luo and
                  Jos{\'{e}} Fragoso Santos and
                  Ana Almeida Matos and
                  Tamara Rezk},
  title        = {Mashic compiler: Mashup sandboxing based on inter-frame communication},
  journal      = {J. Comput. Secur.},
  volume       = {24},
  number       = {1},
  pages        = {91--136},
  year         = {2016},
  url          = {https://doi.org/10.3233/JCS-160542},
  doi          = {10.3233/JCS-160542},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/LuoSMR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/RafnssonS16,
  author       = {Willard Rafnsson and
                  Andrei Sabelfeld},
  title        = {Secure multi-execution: Fine-grained, declassification-aware, and
                  transparent},
  journal      = {J. Comput. Secur.},
  volume       = {24},
  number       = {1},
  pages        = {39--90},
  year         = {2016},
  url          = {https://doi.org/10.3233/JCS-150541},
  doi          = {10.3233/JCS-150541},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/RafnssonS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/SonchackA16,
  author       = {John Sonchack and
                  Adam J. Aviv},
  title        = {Exploring large scale security system reproducibility with the {LESS}
                  simulator},
  journal      = {J. Comput. Secur.},
  volume       = {24},
  number       = {5},
  pages        = {645--665},
  year         = {2016},
  url          = {https://doi.org/10.3233/JCS-160553},
  doi          = {10.3233/JCS-160553},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/SonchackA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/TaglientiC15,
  author       = {Claudio Taglienti and
                  James Cannady},
  title        = {The user attribution problem and the challenge of persistent surveillance
                  of user activity in complex networks},
  journal      = {J. Comput. Secur.},
  volume       = {24},
  number       = {2},
  pages        = {235--288},
  year         = {2016},
  url          = {https://doi.org/10.3233/JCS-160546},
  doi          = {10.3233/JCS-160546},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/TaglientiC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/VavilisPZ16,
  author       = {Sokratis Vavilis and
                  Milan Petkovic and
                  Nicola Zannone},
  title        = {A severity-based quantification of data leakages in database systems},
  journal      = {J. Comput. Secur.},
  volume       = {24},
  number       = {3},
  pages        = {321--345},
  year         = {2016},
  url          = {https://doi.org/10.3233/JCS-160543},
  doi          = {10.3233/JCS-160543},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/VavilisPZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/VimercatiFJPS16,
  author       = {Sabrina De Capitani di Vimercati and
                  Sara Foresti and
                  Sushil Jajodia and
                  Stefano Paraboschi and
                  Pierangela Samarati},
  title        = {Efficient integrity checks for join queries in the cloud},
  journal      = {J. Comput. Secur.},
  volume       = {24},
  number       = {3},
  pages        = {347--378},
  year         = {2016},
  url          = {https://doi.org/10.3233/JCS-160545},
  doi          = {10.3233/JCS-160545},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/VimercatiFJPS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}