about
Practical eavesdropping and skimming attacks on high-frequency RFID tokensShort blind signaturesDetecting opinion spammer groups and spam targets through community discovery and sentiment analysisThe economic cost of publicly announced information security breaches: empirical evidence from the stock market*Behavior-based access control for distributed healthcare systemsSystematic parsing of X.509: Eradicating security issues with a parse treeEnforcing authorizations while protecting access confidentiality1Supporting concurrency and multiple indexes in private access to outsourced data1Type-based analysis of key management in PKCS#11 cryptographic devicesA core calculus for provenanceEfficient integrity checks for join queries in the cloud1Loose associations to increase utility in data publishing1An OBDD approach to enforce confidentiality and visibility constraints in data publishing*Modeling and preventing inferences from sensitive value distributions in data release1Authorization enforcement in distributed query evaluation*Selective data outsourcing for enforcing privacy*Exploiting cryptography for privacy-enhanced access control: A result of the PRIME ProjectA privacy-aware access control systemGuest editors' prefaceSpecial issue on Security in the World Wide Web (WWW)An Extended Authorization Model for Object Databases*Verifying privacy-type properties of electronic voting protocolsIdentification of host audit data to detect attacks on low-level IP vulnerabilitiesComputational soundness of symbolic zero-knowledge proofs*Polynomial runtime in simulatability definitions*On the information leakage of differentially-private mechanismsQuantitative information flow in interactive systemsCookiExt: Patching the browser against session hijacking attacksEditorialA Classification of Security Properties for Process Algebras1Adjoining classified and unclassified information by abstract interpretationEliminating counterevidence with applications to accountable certificate management1Security of trusted repeater quantum key distribution networksSoundness and completeness of formal encryption: The cases of key cycles and partial information leakageDeploying ABAC policies using RBAC Systems
P1433
Q55967649-5CF3CC97-C697-4997-8B88-C8997E238EC3Q56920969-FEDAE9CF-8B5B-4D6F-8CCF-29E319DA8A3EQ57428501-AC53BD34-26D9-466C-A181-22659DA856D1Q57484495-9AFDDBE7-82EE-4C40-B0A2-89E887BFCCA3Q57711369-8F329186-404B-40E5-ADE7-147E6C91BD84Q57717327-D624E6C6-77C6-4AAF-BA7C-BF0386A07B4DQ57717331-221DD71C-83BA-4C8E-A46D-EDE7686CC967Q57717513-F48DDB6B-057A-4F83-9172-4B2812CCC06BQ57832047-2D7F40D3-BE0E-4FE6-87FD-08DB5A38CFDDQ60142676-15106CE9-C48B-4518-BA81-6D252C275A70Q60487176-FDA22577-4D28-468A-A063-4D67231A539DQ60487186-018BF295-08E0-4F3F-A94C-131F1AE92D0CQ60487218-F94FBBCB-88D5-49D0-A957-297D0157F75EQ60487232-88E760DE-DF6F-40DF-8FCE-E93B5B396532Q60487242-FF999440-59C3-426D-A899-07C5B1DA3839Q60487258-CED63C34-4371-4848-A58C-3B5F76F44DFEQ60487270-69EEB3F2-8D8D-4333-B97A-873BBA774208Q60487301-E30265A3-51F6-4FFE-BDDC-D2B34F5798EBQ60487403-B31DD5DB-64C0-444A-9FC5-5EF9836AF2ECQ60487407-95801EF4-3891-495E-A5B6-348BE7D9BE14Q60487419-99378095-FA8B-4C3D-9D68-3CE1C207DDA7Q60530244-9AD5FE15-341F-45B0-8FF3-9A6E80730546Q61311356-D3D8B755-5E88-4E7E-8160-31042CF65663Q62038940-2BBE9CFD-EE59-47E0-B0D6-058BCCDFF455Q62038953-03D4E9E2-5F24-4DBD-BA00-55678691683CQ62042988-E7E4D8A5-061C-47AA-92AD-A626B9B49DF3Q62043000-FD728C7D-40AA-43F3-A7CA-41BB6FE9A9D0Q62045665-836010C7-F415-467F-BD5E-B8BABF7F94A9Q62045682-130BEB0C-2DC6-4C20-8D4B-257099ED7DB8Q62045760-D09A1AAF-670E-472B-9E4F-0A164B55E2F9Q62046226-0F79AC0A-AF59-4533-8121-2A00EFDAB91DQ62048372-281DFCCA-4315-4A40-87A6-97C985B6684CQ62109915-45809FB5-011F-4A2D-B495-E5A464C45549Q62568827-987F574F-1DAF-4417-B355-52B62AA690D1Q92590844-660DFFD5-B07C-4534-A081-643D986FFE43
P1433
description
journal
@en
revista científica
@es
rivista scientifica
@it
vědecký časopis
@cs
wetenschappelijk tijdschrift van IOS Press
@nl
wissenschaftliche Fachzeitschrift
@de
مجلة
@ar
वैज्ञानिक पत्रिका
@hi
name
Journal of Computer Security
@ast
Journal of Computer Security
@da
Journal of Computer Security
@en
Journal of Computer Security
@es
Journal of Computer Security
@fi
Journal of Computer Security
@fr
Journal of Computer Security
@it
Journal of Computer Security
@nb
Journal of Computer Security
@nl
Journal of Computer Security
@nn
type
label
Journal of Computer Security
@ast
Journal of Computer Security
@da
Journal of Computer Security
@en
Journal of Computer Security
@es
Journal of Computer Security
@fi
Journal of Computer Security
@fr
Journal of Computer Security
@it
Journal of Computer Security
@nb
Journal of Computer Security
@nl
Journal of Computer Security
@nn
prefLabel
Journal of Computer Security
@ast
Journal of Computer Security
@da
Journal of Computer Security
@en
Journal of Computer Security
@es
Journal of Computer Security
@fi
Journal of Computer Security
@fr
Journal of Computer Security
@it
Journal of Computer Security
@nb
Journal of Computer Security
@nl
Journal of Computer Security
@nn
P3181
P1055
P1058
P1156
P123
P1476
Journal of Computer Security
@en