


default search action
ACM Transactions on Information and System Security, Volume 15
Volume 15, Number 1, March 2012
- Paul F. Syverson, Somesh Jha:
Guest Editorial: Special Issue on Computer and Communications Security. 1:1-1:2 - Ryan Roemer, Erik Buchanan, Hovav Shacham, Stefan Savage:
Return-Oriented Programming: Systems, Languages, and Applications. 2:1-2:34 - Karthikeyan Bhargavan, Cédric Fournet, Ricardo Corin, Eugen Zalinescu:
Verified Cryptographic Implementations for TLS. 3:1-3:32 - Jan Camenisch, Thomas Groß:
Efficient Attributes for Anonymous Credentials. 4:1-4:30 - Prateek Mittal, Nikita Borisov
:
Information Leaks in Structured Peer-to-Peer Anonymous Communication Systems. 5:1-5:28
Volume 15, Number 2, July 2012
- Yossi Gilad, Amir Herzberg
:
LOT: A Defense Against IP Spoofing and Flooding Attacks. 6:1-6:30 - Boris Danev, Srdjan Capkun, Ramya Jayaram Masti, Thomas S. Benjamin:
Towards Practical Identification of HF RFID Devices. 7:1-7:24 - Martín Abadi, Gordon D. Plotkin:
On Protection by Layout Randomization. 8:1-8:29 - Attila Altay Yavuz
, Peng Ning, Michael K. Reiter:
BAF and FI-BAF: Efficient and Publicly Verifiable Cryptographic Schemes for Secure Logging in Resource-Constrained Systems. 9:1-9:28 - Raphaël Khoury, Nadia Tawbi
:
Corrective Enforcement: A New Paradigm of Security Policy Enforcement by Monitors. 10:1-10:27
Volume 15, Number 3, November 2012
- Norman Danner, Sam DeFabbia-Kane, Danny Krizanc, Marc Liberatore:
Effectiveness and detection of denial-of-service attacks in tor. 11:1-11:25 - Michael Brennan, Sadia Afroz, Rachel Greenstadt:
Adversarial stylometry: Circumventing authorship recognition to preserve privacy and anonymity. 12:1-12:22 - David A. Basin, Samuel J. Burri, Günter Karjoth:
Dynamic enforcement of abstract separation of duty constraints. 13:1-13:30 - Joan Feigenbaum, Aaron Johnson, Paul F. Syverson:
Probabilistic analysis of onion routing in a black-box model. 14:1-14:28
Volume 15, Number 4, April 2013
- Mario Frank, Joachim M. Buhmann, David A. Basin:
Role Mining with Probabilistic Models. 15:1-15:28 - Yossi Gilad, Amir Herzberg
:
Fragmentation Considered Vulnerable. 16:1-16:31 - Muhammad Qasim Ali, Ehab Al-Shaer, Hassan Khan, Syed Ali Khayam:
Automated Anomaly Detector Adaptation using Adaptive Threshold Tuning. 17:1-17:30 - Karthick Jayaraman, Mahesh V. Tripunitara, Vijay Ganesh
, Martin C. Rinard, Steve J. Chapin:
Mohawk: Abstraction-Refinement and Bound-Estimation for Verifying Access Control Policies. 18:1-18:28

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.