Search

Showing total 167 results

Search Constraints

Start Over You searched for: Search Limiters Peer Reviewed Remove constraint Search Limiters: Peer Reviewed Topic computer security Remove constraint Topic: computer security Journal computer journal Remove constraint Journal: computer journal
167 results

Search Results

1. Dynamic Access Control Policies: Specification and Verification.

2. Menger-Type Connectivity of Line Graphs of Generalized Hypercubes With Faulty Edges.

3. Continuous Leakage-Amplified Public-Key Encryption With CCA Security.

4. Toward Both Privacy and Efficiency of Homomorphic MACs for Polynomial Functions and Its Applications.

5. Authorized Function Homomorphic Signature.

6. A Generic Approach to Improving Diffie–Hellman Key Agreement Efficiency for Thin Clients.

7. Impact FD: An Unreliable Failure Detector Based on Process Relevance and Confidence in the System.

8. A Practical Hybrid Group Key Establishment for Secure Group Communications.

9. Almost-Tight Identity Based Encryption Against Selective Opening Attack.

10. Dynamic State-Based Security Architecture for Detecting Security Attacks in Virtual Machines.

11. On the Use of Fake Sources for Source Location Privacy: Trade-Offs Between Energy and Privacy.

12. λ_SAOP: A Security AOP Calculus1.

13. Improved Integral Distinguishers on Compression Function of GOST R Hash Function.

14. Leakage Resilient CCA Security in Stronger Model: Branch Hidden ABO-LTFs and Their Applications.

15. From Keys to Databases—Real-World Applications of Secure Multi-Party Computation.

16. Structural Key Recovery of Simple Matrix Encryption Scheme Family.

17. Order-Hiding Range Query over Encrypted Data without Search Pattern Leakage.

18. Tightly Secure Encryption Schemes against Related-Key Attacks.

19. Performability-Based Workflow Scheduling in Grids.

20. A Framework for Testing and Monitoring Security Policies: Application to an Electronic Voting System.

21. Continuous Leakage-Resilient Identity-Based Encryption without Random Oracles.

22. Efficient Homomorphic Integer Polynomial Evaluation Based on GSW FHE.

23. Privacy Preserving, Verifiable and Resilient Data Aggregation in Grid-Based Networks.

24. An Ensemble Method based on Selection Using Bat Algorithm for Intrusion Detection.

25. Risk and the Small-Scale Cyber Security Decision Making Dialogue--a UK Case Study.

26. A Vulnerability Life Cycle-Based Security Modeling and Evaluation Approach.

27. Interpreting Deep Structures of Information Systems Security.

28. Secure Image Retrieval Based on Visual Content and Watermarking Protocol.

29. The Microcosmic Model of Worm Propagation.

30. Cheating Immune Threshold Visual Secret Sharing1.

31. Side-Channel Attack Using Meet-in-the-Middle Technique.

32. Security Metrics Foundations for Computer Security.

33. Some Further Theoretical Results about Computer Viruses.

34. Simpler Generic Constructions for Strongly Secure One-round Key Exchange from Weaker Assumptions.

35. Securing Outsourced Data in the Multi-Authority Cloud with Fine-Grained Access Control and Efficient Attribute Revocation.

36. Pairing-Free and Secure Certificateless Signcryption Scheme.

37. DTKI: A New Formalized PKI with Verifiable Trusted Parties.

38. Special Issue on Security and Performance of Networks and Clouds: Guest Editor's Introduction.

39. A Novel Permission Hierarchy for RBAC for Dealing with SoD in MAC Models.

40. Reply to ‘Comment on “A Framework for Modelling Trojans and Computer Virus Infection”’ by E. Mäkinen.

41. Modelling Security of Critical Infrastructures: A Survivability Assessment.

42. Non-Functional Requirements Framework: A Mathematical Programming Approach.

43. Signcryption Secure Against Linear Related-Key Attacks.

44. Key-Evolving Hierarchical ID-Based Signcryption.

45. HISS: A HIghly Scalable Scheme for Group Rekeying.

46. Efficient Linkable and/or Threshold Ring Signature Without Random Oracles.

47. A Provably Secure Construction of Certificate-Based Encryption from Certificateless Encryption.

48. A Performance-Oriented Monitoring System for Security Properties in Cloud Computing Applications.

49. An Optimal Inherently Stabilizing 2-Neighborhood Crash Resilient Protocol for Secure and Reliable Routing in Hypercube Networks.

50. Satisfying Privacy Requirements Before Data Anonymization.