default search action
Computers & Security, Volume 27
Volume 27, Numbers 1-2, March 2008
- Stephen D. Wolthusen:
Editorial. 1 - Pilsung Kang, Sunghoon Park, Seongseob Hwang, Hyoungjoo Lee, Sungzoon Cho:
Improvement of keystroke data quality through artificial rhythms and cues. 3-11 - Lein Harn, Jian Ren:
Efficient identity-based RSA multisignatures. 12-15 - Hua Guo, Zhoujun Li, Yi Mu, Xiyong Zhang:
Cryptanalysis of simple three-party key exchange protocol. 16-21 - Evan E. Anderson, Joobin Choobineh:
Enterprise information security strategies. 22-29 - Abdoul Karim Ganame, Julien Bourgeois, Renaud Bidou, François Spies:
A global security architecture for intrusion detection on computer networks. 30-47 - Francesco Palmieri, Ugo Fiore:
Containing large-scale worm spreading in the Internet by cooperative distribution of traffic filtering policies. 48-62
Volume 27, Numbers 3-4, May-June 2008
- Stephen D. Wolthusen:
Editorial. 63 - Rolf Oppliger, Ralf Hauser, David A. Basin:
SSL/TLS session-aware user authentication revisited. 64-70 - Hein S. Venter, Jan H. P. Eloff, Y. L. Li:
Standardising vulnerability categories. 71-83 - Shi-Jinn Horng, Pingzhi Fan, Yao-Ping Chou, Yen-Cheng Chang, Yi Pan:
A feasible intrusion detector for recognizing IIS attacks based on neural networks. 84-100 - Azzam Mourad, Marc-André Laverdière, Mourad Debbabi:
An aspect-oriented approach for the systematic security hardening of code. 101-114
- Jia-Lun Tsai:
Efficient multi-server authentication scheme based on one-way hash function without verification table. 115-121
Volume 27, Numbers 5-6, October 2008
- Stephen D. Wolthusen:
From the Editor-in-Chief. 123 - Mariana Gerber, Rossouw von Solms:
Information security requirements - Interpreting the legal aspects. 124-135 - Dimitris Gritzalis, Yannis Mallios:
A SIP-oriented SPIT Management Framework. 136-153 - Johnny Li-Chang Lo, Judith Bishop, Jan H. P. Eloff:
SMSSec: An end-to-end protocol for secure SMS. 154-167 - Rachid Beghdad:
Critical study of neural networks in detecting intrusions. 168-175 - Wes Masri, Andy Podgurski:
Application-based anomaly intrusion detection with dynamic information flow analysis. 176-187 - Shaojun Zhang, Jianhua Li, Xiuzhen Chen, Lei Fan:
Building network attack graph for alert causal correlation. 188-196 - Ted Huffmire, Timothy Sherwood, Ryan Kastner, Timothy E. Levin:
Enforcing memory policy specifications in reconfigurable hardware. 197-215 - Hung-Yu Chien:
Practical anonymous user authentication scheme with security proof. 216-223 - Elmarie Kritzinger, E. Smith:
Information security management: An information security retrieval and awareness model for industry. 224-231
Volume 27, Numbers 7-8, December 2008
- Stephen D. Wolthusen:
Editorial. 233-234 - Steven Furnell, Valleria Tsaganidi, Andrew D. Phippen:
Security beliefs and barriers for novice Internet users. 235-240 - Yacine Rezgui, Adam Marks:
Information security awareness in higher education: An exploratory study. 241-253 - Hennie A. Kruger, Wayne D. Kearney:
Consensus ranking - An ICT security awareness case study. 254-259 - Anthony J. Palmer:
Criteria to evaluate Automated Personal Identification Mechanisms. 260-284 - Dimitris Geneiatakis, Costas Lambrinoudakis, Georgios Kambourakis:
An ontology-based policy for deploying secure SIP-based VoIP services. 285-297 - Vassilios Stathopoulos, Panayiotis Kotzanikolaou, Emmanouil Magkos:
Secure log management for privacy assurance in electronic communications. 298-308 - Jorge L. Hernandez-Ardieta, Ana Isabel González-Tablas Ferreres, Benjamín Ramos Álvarez:
An optimistic fair exchange protocol based on signature policies. 309-322 - Arati Baliga, Liviu Iftode, Xiaoxin Chen:
Automated containment of rootkits attacks. 323-334 - Gabriel Maciá-Fernández, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro:
Evaluation of a low-rate DoS attack against application servers. 335-354 - José Roberto C. Piqueira, Adolfo A. de Vasconcelos, Carlos E. C. J. Gabriel, Vanessa O. Araujo:
Dynamic models for computer viruses. 355-359
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.