|
Journals in DBLP
- Giuseppe Ateniese, Kevin Fu, Matthew Green, Susan Hohenberger
Improved proxy re-encryption schemes with applications to secure distributed storage. [Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 2006, v:9, n:1, pp:1-30 [Journal]
- Francesco M. Malvestuto, Mauro Mezzini, Marina Moscarini
Auditing sum-queries to make a statistical database secure. [Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 2006, v:9, n:1, pp:31-60 [Journal]
- Darren Mutz, Fredrik Valeur, Giovanni Vigna, Christopher Krügel
Anomalous system call detection. [Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 2006, v:9, n:1, pp:61-93 [Journal]
- Ariel Futoransky, Emiliano Kargieman, Carlos Sarraute, Ariel Waissbein
Foundations and applications for secure triggers. [Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 2006, v:9, n:1, pp:94-112 [Journal]
|