About Us
Alerts
Contact
Ordering Info
Help
Log in
Home
FnTs
Journals
Books
NowOpen
Foundations and Trends® in Privacy and Security
Editor-in-chief
Jonathan Katz
University of Maryland, USA
Personal homepage
Founding Editors
Anupam Datta, Carnegie Mellon University, USA
Jeannette Wing, Columbia University, USA
Print ISSN: 2474-1558
Online ISSN: 2474-1566
Publisher
Mark de Jongh
mark.dejongh@nowpublishers.com
Indexed in: Cabell's International, Google Scholar
About this journal
Journal Home
Editorial Aims
Editorial Board
Submission Instructions
LaTeX Style Files
Pricing
Recommend to Library
Alert Me
Volume 6
Volume 6, Issue 2
Reverse Engineering of Deceptions on Machine- and Human-Centric Attacks
Yuguang Yao
|
Xiao Guo
|
Vishal Asnani
|
Yifan Gong
|
Jiancheng Liu
|
Xue Lin
|
Xiaoming Liu
|
Sijia Liu
Volume 6, Issue 1
Identifying and Mitigating the Security Risks of Generative AI
Clark Barrett
|
Brad Boyd
|
Elie Bursztein
|
Nicholas Carlini
|
Brad Chen
|
Jihye Choi
|
Amrita Roy Chowdhury
|
Mihai Christodorescu
|
Anupam Datta
|
Soheil Feizi
|
Kathleen Fisher
|
Tatsunori Hashimoto
|
Dan Hendrycks
|
Somesh Jha
|
Daniel Kang
|
Florian Kerschbaum
|
Eric Mitchell
|
John Mitchell
|
Zulfikar Ramzan
|
Khawaja Shams
|
Dawn Song
|
Ankur Taly
|
Diyi Yang
Volume 5
Volume 5, Issue 4
Cybersecurity for Modern Smart Grid Against Emerging Threats
Daisuke Mashima
|
Yao Chen
|
Muhammad M. Roomi
|
Subhash Lakshminarayana
|
Deming Chen
Volume 5, Issue 3
Decentralized Finance: Protocols, Risks, and Governance
Agostino Capponi
|
Garud Iyengar
|
Jay Sethuraman
Volume 5, Issue 1-2
The Security & Privacy Acceptance Framework (SPAF)
Sauvik Das
|
Cori Faklaris
|
Jason I. Hong
|
Laura A. Dabbish
Volume 4
Volume 4, Issue 2–4
Proofs, Arguments, and Zero-Knowledge
Justin Thaler
Volume 4, Issue 1
Assured Autonomy Survey
Christopher Rouff
|
Lanier Watkins
Volume 3
Volume 3, Issue 3-4
Hardware Platform Security for Mobile Devices
Lachlan J. Gunn
|
N. Asokan
|
Jan-Erik Ekberg
|
Hans Liljestrand
|
Vijayanand Nayani
|
Thomas Nyman
Volume 3, Issue 2
Cloud Computing Security: Foundations and Research Directions
Anrin Chakraborti
|
Reza Curtmola
|
Jonathan Katz
|
Jason Nieh
|
Ahmad-Reza Sadeghi
|
Radu Sion
|
Yinqian Zhang
Volume 3, Issue 1
Expressing Information Flow Properties
Elisavet Kozyri
|
Stephen Chong
|
Andrew C. Myers
Volume 2
Volume 2, Issue 4
Accountability in Computing: Concepts and Mechanisms
Joan Feigenbaum
|
Aaron D. Jaggard
|
Rebecca N. Wright
Volume 2, Issue 2-3
A Pragmatic Introduction to Secure Multi-Party Computation
David Evans
|
Vladimir Kolesnikov
|
Mike Rosulek
Volume 2, Issue 1
Contextual Integrity through the Lens of Computer Science
Sebastian Benthall
|
Seda Gürses
|
Helen Nissenbaum
Volume 1
Volume 1, Issue 4
Methods for Location Privacy: A comparative overview
Kostantinos Chatzikokolakis
|
Ehab ElSalamouny
|
Catuscia Palamidessi
|
Pazii Anna
Volume 1, Issue 3
Principles and Implementation Techniques of Software-Based Fault Isolation
Gang Tan
Volume 1, Issue 1-2
Modeling and Verifying Security Protocols with the Applied Pi Calculus and ProVerif
Bruno Blanchet
Foundations and Trends® in Privacy and Security
×