default search action
International Journal of Information Security, Volume 6
Volume 6, Number 1, January 2007
- Nathan L. Clarke, Steven Furnell:
Authenticating mobile phone users using keystroke analysis. 1-14 - Carlo Blundo, Clemente Galdi, Giuseppe Persiano:
Low-randomness constant-round private XOR computations. 15-26 - Shujing Wang, Yan Zhang:
Handling distributed authorization with delegation through answer set programming. 27-46 - Elisavet Konstantinou, Yannis C. Stamatiou, Christos D. Zaroliagis:
Efficient generation of secure elliptic curves. 47-63
Volume 6, Numbers 2-3, March 2007
- Theodosis Dimitrakos, Fabio Martinelli, Peter Y. A. Ryan, Steve A. Schneider:
Guest Editors' Preface. 65-66 - Lantian Zheng, Andrew C. Myers:
Dynamic security labels and static information flow control. 67-84 - Nicoletta De Francesco, Luca Martini:
Instruction-level security typing by abstract interpretation. 85-106 - Boris Köpf, Heiko Mantel:
Transformational typing and unification for automatically correcting insecure programs. 107-131 - J. G. Cederquist, Ricardo Corin, M. A. C. Dekker, Sandro Etalle, J. I. den Hartog, Gabriele Lenzini:
Audit-based compliance control. 133-151 - Karl Krukow, Mogens Nielsen:
Trust structures. 153-181 - Rob Delicata, Steve A. Schneider:
An algebraic approach to the verification of a class of Diffie-Hellman protocols. 183-196
Volume 6, Number 4, July 2007
- Stefanos Gritzalis, Athanasios N. Yannacopoulos, Costas Lambrinoudakis, Petros Hatzopoulos, Sokratis K. Katsikas:
A probabilistic model for optimal insurance contracts against security risks and privacy violation in IT outsourcing environments. 197-211 - Liqun Chen, Zhaohui Cheng, Nigel P. Smart:
Identity-based key agreement protocols from pairings. 213-241 - Jens-Matthias Bohli, María Isabel González Vasco, Rainer Steinwandt:
Secure group key establishment revisited. 243-254 - Elisa Bertino, Elena Ferrari, Federica Paci, Loredana Parasiliti Provenza:
A system for securing push-based distribution of XML documents. 255-284
Volume 6, Number 5, September 2007
- Scott Knight, Scott Buffett, Patrick C. K. Hung:
The International Journal of Information Security Special Issue on privacy, security and trust technologies and E-business services. 285-286 - Zhengping Wu, Alfred C. Weaver:
Requirements of federated trust management for service-oriented architectures. 287-296 - Jinshan Liu, Valérie Issarny:
An incentive compatible reputation mechanism for ubiquitous computing environments. 297-311 - Avner Levin:
Is workplace surveillance legal in Canada? 313-321 - Thomas W. Lauer, Xiaodong Deng:
Building online trust through privacy practices. 323-331 - Jie Zhang, Ali A. Ghorbani, Robin Cohen:
A familiarity-based trust model for effective selection of sellers in multiagent e-commerce systems. 333-344 - Mohammad Zulkernine, Mathew Graves, Muhammad Umair Ahmed Khan:
Integrating software specifications into intrusion detection. 345-357
Volume 6, Number 6, October 2007
- Michael Backes, Stefanos Gritzalis, Bart Preneel:
Preface. 359-360 - Kostas G. Anagnostakis, Michael B. Greenwald, Sotiris Ioannidis, Angelos D. Keromytis:
COVERAGE: detecting and reacting to worm epidemics using cooperation and validation. 361-378 - Luciano Bononi, Carlo Tacconi:
Intrusion detection for secure clustering and routing in Mobile Multi-hop Wireless Networks. 379-392 - George Danezis:
Breaking four mix-related schemes based on Universal Re-encryption. 393-402 - Fernando Esponda, Elena S. Ackley, Paul Helman, Haixia Jia, Stephanie Forrest:
Protecting data privacy through hard-to-reverse negative databases. 403-415 - Patrick Klinkoff, Engin Kirda, Christopher Kruegel, Giovanni Vigna:
Extending .NET security to unmanaged code. 417-428
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.