


default search action
ACM Transactions on Information and System Security, Volume 18
Volume 18, Number 1, June 2015
- Ghassan O. Karame, Elli Androulaki, Marc Roeschlin, Arthur Gervais, Srdjan Capkun:

Misbehavior in Bitcoin: A Study of Double-Spending and Accountability. 2:1-2:32 - Chris Culnane

, Peter Y. A. Ryan
, Steve A. Schneider
, Vanessa Teague:
vVote: A Verifiable Voting System. 3:1-3:30 - Goran Doychev, Boris Köpf, Laurent Mauborgne, Jan Reineke:

CacheAudit: A Tool for the Static Analysis of Cache Side Channels. 4:1-4:32
Volume 18, Number 2, December 2015
- Rui Tan, Varun Badrinath Krishna, David K. Y. Yau, Zbigniew T. Kalbarczyk:

Integrity Attacks on Real-Time Pricing in Electric Power Grids. 5:1-5:33 - Perry Alexander, Lee Pike, Peter A. Loscocco, George Coker:

Model Checking Distributed Mandatory Access Control Policies. 6:1-6:25 - Muhammad Qasim Ali, Ehab Al-Shaer:

Randomization-Based Intrusion Detection System for Advanced Metering Infrastructure. 7:1-7:30 - Stephen Chong, Ron van der Meyden

:
Using Architecture to Reason about Information Security. 8:1-8:30
Volume 18, Number 3, April 2016
- Asaf Shabtai, Maya Bercovitch, Lior Rokach, Ya'akov (Kobi) Gal

, Yuval Elovici, Erez Shmueli:
Behavioral Study of Users When Interacting with Active Honeytokens. 9:1-9:21 - Fabrice Benhamouda, Marc Joye, Benoît Libert:

A New Framework for Privacy-Preserving Aggregation of Time-Series Data. 10:1-10:21 - Nan Zheng, Aaron Paloski, Haining Wang:

An Efficient User Verification System Using Angle-Based Mouse Movement Biometrics. 11:1-11:27
Volume 18, Number 4, May 2016
- Shouling Ji, Weiqing Li, Mudhakar Srivatsa, Jing (Selena) He, Raheem A. Beyah

:
General Graph Data De-Anonymization: From Mobility Traces to Social Networks. 12:1-12:29 - Richard Shay, Saranga Komanduri, Adam L. Durity, Phillip (Seyoung) Huh, Michelle L. Mazurek, Sean M. Segreti, Blase Ur, Lujo Bauer

, Nicolas Christin
, Lorrie Faith Cranor
:
Designing Password Policies for Strength and Usability. 13:1-13:34 - Abdul Serwadda, Vir V. Phoha

, Zibo Wang, Rajesh Kumar
, Diksha Shukla:
Toward Robotic Robbery on the Touch Screen. 14:1-14:25

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














