Journal: ACM Trans. Inf. Syst. Secur.

Volume 19, Issue 4

0 -- 0Reza Shokri, George Theodorakopoulos, Carmela Troncoso. Privacy Games Along Location Traces: A Game-Theoretic Framework for Optimizing Location Privacy
0 -- 0Hendrik Meutzner, Santosh Gupta, Viet Hung Nguyen, Thorsten Holz, Dorothea Kolossa. Toward Improved Audio CAPTCHAs Based on Auditory Perception and Language Understanding
0 -- 0George Argyros, Theofilos Petsios, Suphannee Sivakorn, Angelos D. Keromytis, Iasonas Polakis. Evaluating the Privacy Guarantees of Location Proximity Services

Volume 19, Issue 3

0 -- 0Jason Crampton, Andrei Gagarin, Gregory Gutin, Mark Jones, Magnus Wahlström. On the Workflow Satisfiability Problem with Class-Independent Constraints for Hierarchical Organizations
0 -- 0Ismet Ozalp, Mehmet Emre Gursoy, Mehmet Ercan Nergiz, Yücel Saygin. Privacy-Preserving Publishing of Hierarchical Data
9 -- 0Christopher N. Gutierrez, Mohammed H. Almeshekah, Eugene H. Spafford, Mikhail J. Atallah, Jeff Avery. Inhibiting and Detecting Offline Password Cracking Using ErsatzPasswords

Volume 19, Issue 2

4 -- 0Babak Rahbarinia, Roberto Perdisci, Manos Antonakakis. Efficient and Accurate Behavior-Based Tracking of Malware-Control Domains in Large ISP Networks
4 -- 0Babak Rahbarinia, Roberto Perdisci, Manos Antonakakis. Efficient and Accurate Behavior-Based Tracking of Malware-Control Domains in Large ISP Networks
5 -- 0Zheng Dong, Kevin Kane, L. Jean Camp. Detection of Rogue Certificates from Trusted Certificate Authorities Using Deep Neural Networks
5 -- 0Zheng Dong, Kevin Kane, L. Jean Camp. Detection of Rogue Certificates from Trusted Certificate Authorities Using Deep Neural Networks
6 -- 0Juan A. Garay, Vladimir Kolesnikov, Rae McLellan. MAC Precomputation with Applications to Secure Memory
6 -- 0Juan A. Garay, Vladimir Kolesnikov, Rae McLellan. MAC Precomputation with Applications to Secure Memory

Volume 19, Issue 1

1 -- 0Simon Eberz, Kasper Bonne Rasmussen, Vincent Lenders, Ivan Martinovic. Looks Like Eve: Exposing Insider Threats Using Eye Movement Biometrics
1 -- 0Simon Eberz, Kasper Bonne Rasmussen, Vincent Lenders, Ivan Martinovic. Looks Like Eve: Exposing Insider Threats Using Eye Movement Biometrics
2 -- 0Dimitris Mitropoulos, Konstantinos Stroggylos, Diomidis Spinellis, Angelos D. Keromytis. How to Train Your Browser: Preventing XSS Attacks Using Contextual Script Fingerprints
2 -- 0Dimitris Mitropoulos, Konstantinos Stroggylos, Diomidis Spinellis, Angelos D. Keromytis. How to Train Your Browser: Preventing XSS Attacks Using Contextual Script Fingerprints
3 -- 0Pol Mac Aonghusa, Douglas J. Leith. Don't Let Google Know I'm Lonely
3 -- 0Pol Mac Aonghusa, Douglas J. Leith. Don't Let Google Know I'm Lonely