Privacy and Security (TOPS)


Search Issue
enter search term and/or author name


ACM Transactions on Information and System Security (TISSEC), Volume 16 Issue 3, November 2013

Bringing java's wild native world under control
Mengtao Sun, Gang Tan, Joseph Siefers, Bin Zeng, Greg Morrisett
Article No.: 9
DOI: 10.1145/2535505

For performance and for incorporating legacy libraries, many Java applications contain native-code components written in unsafe languages such as C and C++. Native-code components interoperate with Java components through the Java Native...

An experimental security analysis of two satphone standards
Benedikt Driessen, Ralf Hund, Carsten Willems, Christof Paar, Thorsten Holz
Article No.: 10
DOI: 10.1145/2535522

General-purpose communication systems such as GSM and UMTS have been in the focus of security researchers for over a decade now. Recently also technologies that are only used under more specific circumstances have come into the spotlight of...

Secure and verifiable outsourcing of large-scale biometric computations
Marina Blanton, Yihua Zhang, Keith B. Frikken
Article No.: 11
DOI: 10.1145/2535523

Cloud computing services are becoming more prevalent and readily available today, bringing to us economies of scale and making large-scale computation feasible. Security and privacy considerations, however, stand in the way of fully utilizing the...

Access privacy and correctness on untrusted storage
Peter Williams, Radu Sion
Article No.: 12
DOI: 10.1145/2535524

We introduce a new practical mechanism for remote data storage with access pattern privacy and correctness. A storage client can deploy this mechanism to issue encrypted reads, writes, and inserts to a potentially curious and...