default search action
Journal of Computer Security, Volume 14
Volume 14, Number 1, 2006
- Véronique Cortier, Stéphanie Delaune, Pascal Lafourcade:
A survey of algebraic properties used in cryptographic protocols. 1-43 - Stelvio Cimato, Antonella Cresti, Paolo D'Arco:
A unified model for unconditionally secure key distribution. 45-64 - Riccardo Focardi, Sabina Rossi:
Information flow security in dynamic contexts. 65-110
Volume 14, Number 2, 2006
- Riccardo Focardi:
Preface. 111 - Chiara Braghin, Daniele Gorla, Vladimiro Sassone:
Role-based access control for a distributed calculus. 113-155 - Andrew C. Myers, Andrei Sabelfeld, Steve Zdancewic:
Enforcing Robust Declassification and Qualified Robustness. 157-196 - Olivier Pereira, Jean-Jacques Quisquater:
On the impossibility of building secure Cliques-type authenticated group key agreement protocols. 197-246
Volume 14, Number 3, 2006
- Atsuhiro Goto:
Preface. 247 - Thibault Candebat, David Gray:
Secure pseudonym management using mediated identity-based encryption. 249-267 - Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciarini, Elisa Bertino:
Establishing and protecting digital identity in federation systems. 269-300
Volume 14, Number 4, 2006
- Sencun Zhu, Sanjeev Setia, Shouhuai Xu, Sushil Jajodia:
GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks. 301-325 - Arun K. Eamani, A. Prasad Sistla:
Language based policy analysis in a SPKI Trust Management System. 327-357 - Jianhong Xia, Sarma Vangala, Jiang Wu, Lixin Gao, Kevin A. Kwiat:
Effective worm detection for various scan techniques. 359-387
Volume 14, Number 5, 2006
- Jianying Zhou, Meng-Chow Kang:
Preface. 389-390 - Geraint Price:
Public Key Infrastructures: A research agenda. 391-417 - Marcus Lippert, Vangelis Karatsiolis, Alexander Wiesmaier, Johannes Buchmann:
Life-cycle management of X.509 certificates based on LDAP directories. 419-439 - Guilin Wang:
Generic non-repudiation protocols supporting transparent off-line TTP. 441-467 - Javier López:
Unleashing public-key cryptography in wireless sensor networks. 469-482
Volume 14, Number 6, 2006
- Patrick D. McDaniel, Atul Prakash:
Enforcing provisioning and authorization policy in the Antigone system. 483-511 - Andrew Blyth, Paula Thomas:
Performing real-time threat assessment of security incidents using data fusion of IDS logs. 513-534 - Esma Aïmeur, Gilles Brassard, Flavien Serge Mani Onana:
Blind Electronic Commerce. 535-559 - Gethin Norman, Vitaly Shmatikov:
Analysis of probabilistic contract signing. 561-589 - Geoffrey Smith:
Improved typings for probabilistic noninterference in a multi-threaded language. 591-623
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.