


default search action
ACM Transactions on Information and System Security (TISSEC), Volume 7
Volume 7, Number 1, February 2004
- Giuseppe Ateniese

:
Verifiable encryption of digital signatures and applications. 1-20 - Albert Levi

, M. Ufuk Çaglayan, Çetin Kaya Koç:
Use of nested certificates for efficient, dynamic, and trust preserving public key infrastructure. 21-59 - Yongdae Kim

, Adrian Perrig, Gene Tsudik:
Tree-based group key agreement. 60-96 - Gabriel Montenegro, Claude Castelluccia:

Crypto-based identifiers (CBIDs): Concepts and applications. 97-127 - Jaehong Park, Ravi S. Sandhu:

The UCONABC usage control model. 128-174
Volume 7, Number 2, May 2004
- Trent Jaeger, Antony Edwards, Xiaolan Zhang:

Consistency analysis of authorization hook placement in the Linux security modules framework. 175-205 - Mihir Bellare, Tadayoshi Kohno, Chanathip Namprempre:

Breaking and provably repairing the SSH authenticated encryption scheme: A case study of the Encode-then-Encrypt-and-MAC paradigm. 206-241 - William Aiello, Steven M. Bellovin, Matt Blaze, Ran Canetti, John Ioannidis, Angelos D. Keromytis, Omer Reingold:

Just fast keying: Key agreement in a hostile internet. 242-273 - Peng Ning, Yun Cui, Douglas S. Reeves, Dingbang Xu:

Techniques and tools for analyzing intrusion alerts. 274-318 - Adam Stubblefield, John Ioannidis, Aviel D. Rubin:

A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP). 319-332
Volume 7, Number 3, August 2004
- Brian D. Carrier, Clay Shields:

The session token protocol for forensics and traceback. 333-362 - Horst F. Wedde, Mario Lischka:

Modular authorization and administration. 363-391 - Mark Strembeck, Gustaf Neumann:

An integrated approach to engineer and enforce context constraints in RBAC environments. 392-427 - Adam Hess, Jason E. Holt, Jared Jacobson, Kent E. Seamons:

Content-triggered trust negotiation. 428-456 - Yair Amir, Yongdae Kim

, Cristina Nita-Rotaru, Gene Tsudik:
On the performance of group key agreement protocols. 457-488
Volume 7, Number 4, November 2004
- Matthew K. Wright

, Micah Adler, Brian Neil Levine, Clay Shields:
The predecessor attack: An analysis of a threat to anonymous communications systems. 489-522 - Dijiang Huang

, Deep Medhi:
A key-chain-based keying scheme for many-to-many secure group communication. 523-552 - Hovav Shacham, Dan Boneh, Eric Rescorla:

Client-side caching for TLS. 553-575 - Tom Walcott, Matt Bishop

:
Traducement: A model for record security. 576-590 - Peng Ning, Dingbang Xu:

Hypothesizing and reasoning about attacks missed by intrusion detection systems. 591-627

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














