You are viewing a javascript disabled version of the site. Please enable Javascript for this site to function properly.
Go to headerGo to navigationGo to searchGo to contentsGo to footer
In content section. Select this link to jump to navigation

Author Index Volume 25 (2017)

Arden, O., see Liu, J. (4,5) 367–426

Assadsolimani, B., see Wüller, S. (1) 59– 81

Ban Kirigin, T., see Kanovich, M. (6) 585–630

Bauer, L., see Murray, T. (4,5) 319–321

Broberg, N., B. van Delft and D. Sands, Paragon – Practical programming with information flow control (4,5) 323–365

Carminati, M., see Continella, A. (2) 117–137

Chen, B. and R. Curtmola, Remote data integrity checking with server-side repair (6) 537–584

Cheng, Y., Y. Li, R. Deng, L. Ying and W. He, A study on a feasible no-root approach on Android (3) 231–253

Chi, M., see Choo, E. (3) 283–318

Choo, E., T. Yu and M. Chi, Detecting opinion spammer groups and spam targets through community discovery and sentiment analysis (3) 283–318

Compagna, L., see dos Santos, D.R. (3) 255–282

Continella, A., M. Carminati, M. Polino, A. Lanzi, S. Zanero and F. Maggi, Prometheus: Analyzing WebInject-based information stealers (2) 117–137

Cortier, V. and C. Wiedling, A formal analysis of the Norwegian E-voting protocol (1) 21– 57

Crampton, J., N. Farley, G. Gutin, M. Jones and B. Poettering, Cryptographic enforcement of information flow policies without public information via tree partitions (6) 511–535

Crampton, J., G. Gutin, D. Karapetyan and R. Watrigant, The bi-objective workflow satisfiability problem and workflow resiliency (1) 83–115

Curtmola, R., see Chen, B. (6) 537–584

Deng, R., see Cheng, Y. (3) 231–253

dos Santos, D.R., S. Ranise, L. Compagna and S.E. Ponta, Automatically finding execution scenarios to deploy security-sensitive workflows (3) 255–282

Farley, N., see Crampton, J. (6) 511–535

Förg, F., see Wüller, S. (1) 59– 81

Gao, S., see Mohamed, M. (3) 205–230

George, M.D., see Liu, J. (4,5) 367–426

Giffin, D., A. Levy, D. Stefan, D. Terei, D. Mazières, J. Mitchell and A. Russo, Hails: Protecting data privacy in untrusted web applications (4,5) 427–461

Guan, A. and W.-G. Tzeng, A secret key establishment protocol for wireless networks using noisy channels (2) 139–151

Guggemos, T., see Migault, D. (2) 173–203

Gutin, G., see Crampton, J. (1) 83–115

Gutin, G., see Crampton, J. (6) 511–535

Halpern, J.Y., From qualitative to quantitative proofs of security properties using first-order conditional logic (1) 1– 19

He, W., see Cheng, Y. (3) 231–253

Jones, M., see Crampton, J. (6) 511–535

Kanovich, M., T. Ban Kirigin, V. Nigam, A. Scedrov and C. Talcott, Time, computational complexity, and probability in the analysis of distance-bounding protocols (6) 585–630

Karapetyan, D., see Crampton, J. (1) 83–115

Killian, S., see Migault, D. (2) 173–203

Kumaraguru, P., see Mohamed, M. (3) 205–230

Lanzi, A., see Continella, A. (2) 117–137

Laurent, M., see Migault, D. (2) 173–203

Levy, A., see Giffin, D. (4,5) 427–461

Li, Y., see Cheng, Y. (3) 231–253

Lin, C.-Y. and W.-G. Tzeng, Strategy analysis for cloud storage reliability management based on game theory (2) 153–171

Liu, J., O. Arden, M.D. George and A.C. Myers, Fabric: Building open distributed systems securely by construction (4,5) 367–426

Maggi, F., see Continella, A. (2) 117–137

Mayer, D., see Wüller, S. (1) 59– 81

Mazières, D., see Giffin, D. (4,5) 427–461

Meyer, U., see Wüller, S. (1) 59– 81

Migault, D., T. Guggemos, S. Killian, M. Laurent, G. Pujolle and J.P. Wary, Diet-ESP: IP layer security for IoT (2) 173–203

Mitchell, J., see Giffin, D. (4,5) 427–461

Mohamed, M., S. Gao, N. Sachdeva, N. Saxena, C. Zhang, P. Kumaraguru and P.C. Van Oorschot, On the security and usability of dynamic cognitive game CAPTCHAs (3) 205–230

Murray, T., A. Sabelfeld and L. Bauer, Guest Editorial. Special issue on verified information flow security (4,5) 319–321

Myers, A.C., see Liu, J. (4,5) 367–426

Nigam, V., see Kanovich, M. (6) 585–630

Poettering, B., see Crampton, J. (6) 511–535

Polino, M., see Continella, A. (2) 117–137

Ponta, S.E., see dos Santos, D.R. (3) 255–282

Pujolle, G., see Migault, D. (2) 173–203

Ranise, S., see dos Santos, D.R. (3) 255–282

Rocchetto, M., L. Viganò and M. Volpe, An interpolation-based method for the verification of security protocols (6) 463–510

Russo, A., see Giffin, D. (4,5) 427–461

Sabelfeld, A., see Murray, T. (4,5) 319–321

Sachdeva, N., see Mohamed, M. (3) 205–230

Sands, D., see Broberg, N. (4,5) 323–365

Saxena, N., see Mohamed, M. (3) 205–230

Scedrov, A., see Kanovich, M. (6) 585–630

Schüppen, S., see Wüller, S. (1) 59– 81

Stefan, D., see Giffin, D. (4,5) 427–461

Talcott, C., see Kanovich, M. (6) 585–630

Terei, D., see Giffin, D. (4,5) 427–461

Tzeng, W.-G., see Guan, A. (2) 139–151

Tzeng, W.-G., see Lin, C.-Y. (2) 153–171

van Delft, B., see Broberg, N. (4,5) 323–365

Van Oorschot, P.C., see Mohamed, M. (3) 205–230

Viganò, L., see Rocchetto, M. (6) 463–510

Volpe, M., see Rocchetto, M. (6) 463–510

Wary, J.P., see Migault, D. (2) 173–203

Watrigant, R., see Crampton, J. (1) 83–115

Wetzel, S., see Wüller, S. (1) 59– 81

Wiedling, C., see Cortier, V. (1) 21– 57

Wüller, S., D. Mayer, F. Förg, S. Schüppen, B. Assadsolimani, U. Meyer and S. Wetzel, Designing privacy-preserving interval operations based on homomorphic encryption and secret sharing techniques (1) 59– 81

Ying, L., see Cheng, Y. (3) 231–253

Yu, T., see Choo, E. (3) 283–318

Zanero, S., see Continella, A. (2) 117–137

Zhang, C., see Mohamed, M. (3) 205–230