default search action
Computers & Security, Volume 25
Volume 25, Number 1, February 2006
- E. Eugene Schultz:
Dilemmas and boundaries of digital rights management. 1-2 - Robert Booker:
Re-engineering enterprise security. 13-17 - C. M. Roberts:
Radio frequency identification (RFID). 18-26 - Steven Furnell, Adila Jusoh, Dimitris Katsabas:
The challenges of understanding and using security: A survey of end-users. 27-35 - Indrakshi Ray, Mahendra Kumar:
Towards a location-based mandatory access control model. 36-44 - Christos K. Dimitriadis, Despina Polemi:
An identity management protocol for Internet applications over 3G mobile networks. 45-51 - Raphael Chung-Wei Phan:
Cryptanalysis of two password-based authentication schemes using smart cards. 52-54 - Neil F. Doherty, Heather Fulford:
Aligning the information security policy with the strategic information systems plan. 55-63 - Julio César Hernández Castro, Ignacio Blasco-Lopez, Juan M. Estévez-Tapiador, Arturo Ribagorda Garnacho:
Steganography in games: A general methodology and its application to the game of Go. 64-71 - Wen-Gong Shieh, Jian-Min Wang:
Efficient remote mutual authentication and key agreement. 72-77
Volume 25, Number 2, March 2006
- E. Eugene Schultz:
About "Unofficial patches". 79-80 - Danny Bradbury:
The metamorphosis of malware writers. 89-90 - Vicki Miller Luoma:
Computer forensics and electronic discovery: The new management challenge. 91-96 - Vafa D. Izadinia, Derrick G. Kourie, Jan H. P. Eloff:
Uncovering identities: A study into VPN tunnel fingerprinting. 97-105 - Hsiang-An Wen, Chun-Li Lin, Tzonelih Hwang:
Provably secure authenticated key exchange protocols for low power computing clients. 106-113 - Vipul Goyal, Virendra Kumar, Mayank Singh, Ajith Abraham, Sugata Sanyal:
A new protocol to counter online dictionary attacks. 114-120 - Nikos Komninos, Dimitris Vergados, Christos Douligeris:
Layered security design for mobile ad hoc networks. 121-130 - Raphael Chung-Wei Phan, David A. Wagner:
Security considerations for incremental hash functions based on pair block chaining. 131-136 - Krishna Sampigethaya, Radha Poovendran:
A framework and taxonomy for comparison of electronic voting schemes. 137-153
Volume 25, Number 3, May 2006
- E. Eugene Schultz:
Special systems: Overlooked sources of security risk? 155 - Danny Bradbury:
Modeling network security. 163-164 - Sebastiaan H. von Solms:
Information Security - The Fourth Wave. 165-168 - Soojin Lee, Byungchun Chung, Heeyoul Kim, Yunho Lee, Chanil Park, Hyunsoo Yoon:
Real-time analysis of intrusion detection alerts via correlation. 169-183 - Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati, Deepak B. Phatak:
A novel remote user authentication scheme using bilinear pairings. 184-189 - Wenliang Du, Mingdong Shang, Haizhi Xu:
A novel approach for computer security education using Minix instructional operating system. 190-200 - Jun Shao, Zhenfu Cao:
A traceable threshold signature scheme with multiple signing policies. 201-206 - John Ayoade:
Security implications in RFID and authentication processing framework. 207-212 - Ming Li:
Change trend of averaged Hurst parameter of traffic under DDOS flood attacks. 213-220 - Iain Sutherland, George E. Kalb, Andrew Blyth, Gaius Mulley:
An empirical examination of the reverse engineering process for binary files. 221-228 - Guillermo González-Talaván:
A simple, configurable SMTP anti-spam filter: Greylists. 229-236
Volume 25, Number 4, June 2006
- E. Eugene Schultz:
Representing information security fairly and accurately. 237 - Reinhardt A. Botha, Tshepo G. Gaadingwe:
Reflecting on 20 SEC conferences. 247-256 - Richard Ford, Mark Bush, Alexander Bulatov:
Predation and the cost of replication: New approaches to malware prevention? 257-264 - Wee Hock Desmond Ng, Haitham S. Cruickshank, Zhili Sun:
Scalable balanced batch rekeying for secure group communication. 265-273 - Hassan Artail, Haïdar Safa, Malek Sraj, Iyad Kuwatly, Zaid Al Masri:
A hybrid honeypot framework for improving intrusion detection systems in protecting organizational networks. 274-288 - Hennie A. Kruger, Wayne D. Kearney:
A prototype for assessing information security awareness. 289-296 - Ashraf Elgohary, Tarek S. Sobh, Mohammed Zaki:
Design of an enhancement for SSL/TLS protocols. 297-306 - Chin-Chen Chang, Jung-San Lee:
An anonymous voting mechanism based on the key exchange protocol. 307-314
Volume 25, Number 5, July 2006
- E. Eugene Schultz:
The changing winds of information security. 315-316 - Stephen Flowerday, A. W. Blundell, Rossouw von Solms:
Continuous auditing technologies and models: A discussion. 325-331 - Sanjeev Kumar:
PING attack - How bad is it? 332-337 - Nathanael Paul, David Evans:
Comparing Java and .NET security: Lessons learned and missed. 338-350 - Sarandis Mitropoulos, Dimitrios Patsos, Christos Douligeris:
On Incident Handling and Response: A state-of-the-art approach. 351-370 - Mingchao Ma, Steve Woodhead:
Authentication delegation for subscription-based remote network services. 371-378 - Spyros T. Halkidis, Alexander Chatzigeorgiou, George Stephanides:
A qualitative analysis of software security patterns. 379-392
Volume 25, Number 6, September 2006
- E. Eugene Schultz:
Microsoft is back in the hot seat. 393-394 - Danny Bradbury:
Microsoft's new window on security. 405-407 - Rossouw von Solms, Sebastiaan H. von Solms:
Information Security Governance: A model based on the Direct-Control Cycle. 408-412 - Bilge Karabacak, Ibrahim Sogukpinar:
A quantitative method for ISO 17799 gap analysis. 413-419 - Kumar V. Mangipudi, Rajendra S. Katti:
A Secure Identification and Key agreement protocol with user Anonymity (SIKA). 420-425 - Hamida Seba:
FTKM: A fault-tolerant key management protocol for multicast communications. 426-434 - Dong Jin Kwak, Sang-Jae Moon, Guilin Wang, Robert H. Deng:
A secure extension of the Kwak-Moon group signcryption scheme. 435-444 - A. A. Abimbola, Jose Munoz, William J. Buchanan:
NetHost-Sensor: Investigating the capture of end-to-end encrypted intrusive data. 445-451 - Emrah Tomur, Y. Murat Erten:
Application of temporal and spatial role based access control in 802.11 wireless networks. 452-458 - Morteza Amini, Rasool Jalili, Hamid Reza Shahriari:
RT-UNNID: A practical solution to real-time network-based intrusion detection using unsupervised neural networks. 459-468 - Zhi-hong Zuo, Qingxin Zhu, Ming-Tian Zhou:
Infection, imitation and a hierarchy of computer viruses. 469-473
Volume 25, Number 7, October 2006
- E. Eugene Schultz:
Issues concerning the distribution of vulnerability information. 475-476 - Hazel Lacohée, Andrew D. Phippen, Steven Furnell:
Risk and restitution: Assessing how users establish online trust. 486-493 - Rossouw von Solms, Sebastiaan H. von Solms:
Information security governance: Due care. 494-497 - Vinay M. Igure, Sean A. Laughter, Ronald D. Williams:
Security issues in SCADA networks. 498-506 - Vassilis Kapsalis, Loukas Hadellis, Dimitris Karelis, Stavros A. Koubias:
A dynamic context-aware access control architecture for e-services. 507-521 - Maria Kjaerland:
A taxonomy and comparison of computer security incidents from the commercial and government sectors. 522-538 - Wei Wang, Xiaohong Guan, Xiangliang Zhang, Liwei Yang:
Profiling program behavior for anomaly intrusion detection based on the transition and frequency property of computer audit data. 539-550
Volume 25, Number 8, November 2006
- E. Eugene Schultz:
Predicting the future of InfoSec. 553-554 - James Carpinter, Ray Hunt:
Tightening the net: A review of current and next generation spam filtering tools. 566-578 - Julie J. C. H. Ryan, Daniel J. Ryan:
Expected benefits of information security investments. 579-588 - Jinqian Liang, Xiaohong Guan:
A virtual disk environment for providing file system recovery. 589-599 - Glenn Carl, Richard R. Brooks, Suresh Rai:
Wavelet based Denial-of-Service detection. 600-615
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.