default search action
International Journal of Information Security, Volume 7
Volume 7, Number 1, January 2008
- Pierpaolo Degano, Luca Viganò:
Preface. 1 - Alessandro Armando, Luca Compagna:
SAT-based model-checking for security protocols analysis. 3-32 - Michael Backes, Birgit Pfitzmann:
Limits of the BRSIM/UC soundness of Dolev-Yao-style XOR. 33-54 - Andrea Bracciali, Gianluigi Ferrari, Emilio Tuosto:
A symbolic framework for multi-faceted security protocol analysis. 55-84 - Juan M. Estévez-Tapiador, Almudena Alcaide, Julio César Hernández Castro, Arturo Ribagorda:
Bayesian rational exchange. 85-100
Volume 7, Number 2, April 2008
- Dieter Gollmann:
Editorial. 101 - Joaquín García-Alfaro, Nora Boulahia-Cuppens, Frédéric Cuppens:
Complete analysis of configuration rules to guarantee reliable network security policies. 103-122 - Jason Crampton, Hemanth Khambhammettu:
Delegation in role-based access control. 123-136 - Philip W. L. Fong:
Discretionary capability confinement. 137-154 - Michael Backes, Markus Dürmuth, Dennis Hofheinz, Ralf Küsters:
Conditional reactive simulatability. 155-169
Volume 7, Number 3, June 2008
- Xinyi Huang, Willy Susilo, Yi Mu, Wei Wu:
Secure universal designated verifier signature without random oracles. 171-183 - Pei-Te Chen, Chi-Sung Laih:
IDSIC: an intrusion detection system with identification capability. 185-197 - Joachim Biskup, Torben Weibert:
Keeping secrets in incomplete databases. 199-217 - Alessandro Aldini, Alessandra Di Pierro:
Estimating the maximum information leakage. 219-242
Volume 7, Number 4, August 2008
- XiaoFeng Wang, Michael K. Reiter:
A multi-layer framework for puzzle-based denial-of-service defense. 243-263 - Christophe Tartary, Huaxiong Wang, Josef Pieprzyk:
A coding approach to the multicast stream authentication problem. 265-283 - Frédéric Cuppens, Nora Cuppens-Boulahia:
Modeling contextual security policies. 285-305
Volume 7, Number 5, October 2008
- Esma Aïmeur, Gilles Brassard, José M. Fernandez, Flavien Serge Mani Onana:
Alambic : a privacy-preserving recommender system for electronic commerce. 307-334 - Cherita L. Corbett, Raheem A. Beyah, John A. Copeland:
Passive classification of wireless NICs during active scanning. 335-348 - Alexander W. Dent:
A survey of certificateless encryption schemes and security models. 349-377
Volume 7, Number 6, November 2008
- Changan Zhao, Fangguo Zhang, Jiwu Huang:
A note on the Ate pairing. 379-382 - Kenji Imamoto, Jianying Zhou, Kouichi Sakurai:
Achieving evenhandedness in certified email system for contract signing. 383-394 - Theodoros Balopoulos, Stefanos Gritzalis, Sokratis K. Katsikas:
Specifying and implementing privacy-preserving cryptographic protocols. 395-420 - Jeremy W. Bryans, Maciej Koutny, Laurent Mazaré, Peter Y. A. Ryan:
Opacity generalised to transition systems. 421-435
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.