default search action
Computers & Security, Volume 29
Volume 29, Number 1, February 2010
- Dimitris Gritzalis, Jan H. P. Eloff:
Editorial. 1-2 - Fuwen Liu, Hartmut König:
A survey of video encryption algorithms. 3-15 - Stylianos Basagiannis, Panagiotis Katsaros, Andrew Pombortsis:
An intruder model with message inspection for model checking security protocols. 16-34 - Georgios P. Spathoulas, Sokratis K. Katsikas:
Reducing false positives in intrusion detection systems. 35-44 - Alexander K. Seewald, Wilfried N. Gansterer:
On the detection and identification of botnets. 45-58 - Heechang Shin, Jaideep Vaidya, Vijayalakshmi Atluri:
Anonymization models for directional location based service environments. 59-73 - Gabriele Costa, Fabio Martinelli, Paolo Mori, Christian Schaefer, Thomas Walter:
Runtime monitoring for next generation Java ME platform. 74-87 - Tyrone S. Toland, Csilla Farkas, Caroline M. Eastman:
The inference problem: Maintaining maximal availability in the presence of database updates. 88-103 - Yoon-Ho Choi, Lunquan Li, Peng Liu, George Kesidis:
Worm virulence estimation for the containment of local worm outbreak. 104-123 - Chenfeng Vincent Zhou, Christopher Leckie, Shanika Karunasekera:
A survey of coordinated attacks and collaborative intrusion detection. 124-140 - Carlos Javier Hernández-Castro, Arturo Ribagorda:
Pitfalls in CAPTCHA design and implementation: The Math CAPTCHA, a case study. 141-157
Volume 29, Number 2, March 2010
- Dimitris Gritzalis, Sabrina De Capitani di Vimercati:
Editorial. 165-166 - Josep Lluís Ferrer-Gomila, Jose Antonio Onieva, Magdalena Payeras-Capellà, Javier López:
Certified electronic mail: Properties revisited. 167-179 - Houssem Jarraya, Maryline Laurent:
A secure peer-to-peer backup service keeping great autonomy while under the supervision of a provider. 180-195 - Adéle da Veiga, Jan H. P. Eloff:
A framework and assessment instrument for information security culture. 196-207 - Ming-Yang Su:
WARP: A wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks. 208-224 - Sven Ehlert, Dimitris Geneiatakis, Thomas Magedanz:
Survey of network security systems to counter SIP-based denial-of-service attacks. 225-243 - Marko Hölbl, Tatjana Welzer, Bostjan Brumen:
Two proposed identity-based three-party authenticated key agreement protocols from pairings. 244-252 - Natalia Stakhanova, Samik Basu, Johnny Wong:
On the symbiosis of specification-based and anomaly-based detection. 253-268 - Chin-Chen Chang, Hao-Chuan Tsai, Yi-Pei Hsieh:
An efficient and fair buyer-seller fingerprinting scheme for large scale networks. 269-277 - Gabriel López Millán, Manuel Gil Pérez, Gregorio Martínez Pérez, Antonio Fernandez Gómez-Skarmeta:
PKI-based trust management in inter-domain scenarios. 278-290
Volume 29, Number 3, May 2010
- Seok-Won Lee, Mattia Monga:
Special issue on software engineering for secure systems. 299-301 - Alfredo Pironti, Riccardo Sisto:
Provably correct Java implementations of Spi Calculus security protocols specifications. 302-314 - Andreas Bauer, Jan Jürjens:
Runtime verification of cryptographic protocols. 315-330 - Liang Xiao, Bo Hu, Madalina Croitoru, Paul H. Lewis, Srinandan Dasmahapatra:
A knowledgeable security model for distributed health information systems. 331-349 - Jaime A. Pavlich-Mariscal, Steven A. Demurjian, Laurent D. Michel:
A framework of composable access control features: Preserving separation of access control concerns from models to code. 350-379
Volume 29, Number 4, June 2010
- Dimitris Gritzalis, Pierangela Samarati:
Editorial. 381-382 - Egon Hilgenstieler, Elias P. Duarte Jr., Glenn Mansfield Keeni, Norio Shiratori:
Extensions to the source path isolation engine for precise and efficient log-based IP traceback. 383-392 - A. Maciej Rossudowski, Hein S. Venter, Jan H. P. Eloff, Derrick G. Kourie:
A security privacy aware architecture and protocol for a single smart card used for multiple services. 393-409 - Fangwei Wang, Yunkai Zhang, Changguang Wang, Jianfeng Ma, Sang-Jae Moon:
Stability analysis of a SEIQV epidemic model for rapid spreading worms. 410-418 - Tony Cheneau, Aymen Boudguiga, Maryline Laurent:
Significantly improved performances of the cryptographically generated addresses thanks to ECC and GPGPU. 419-431 - Eirik Albrechtsen, Jan Hovden:
Improving information security awareness and behaviour through dialogue, participation and collective reflection. An intervention study. 432-445 - Ji Won Yoon, Hyoungshick Kim, Jun Ho Huh:
Hybrid spam filtering for mobile communication. 446-459 - Christoforos Ntantogian, Christos Xenakis, Ioannis Stavrakakis:
A generic mechanism for efficient authentication in B3G networks. 460-475 - Johan Van Niekerk, Rossouw von Solms:
Information security culture: A management perspective. 476-486 - Todd Mander, Richard Cheung, Farhad Nabhani:
Power system DNP3 data object security using data sets. 487-500 - Jordi Forné, M. Francisca Hinarejos, Andrés Marín, Florina Almenárez, Javier López, José A. Montenegro, Marc Lacoste, Daniel Díaz Sánchez:
Pervasive authentication and authorization infrastructures for mobile users. 501-514
Volume 29, Number 5, July 2010
- Dimitris Gritzalis, Javier López:
Editorial. 521-522 - Herbert Leitold, Reinhard Posch, Thomas Rössler:
Reconstruction of electronic signatures from eDocument printouts. 523-532 - Carlo Blundo, Stelvio Cimato, Sabrina De Capitani di Vimercati, Alfredo De Santis, Sara Foresti, Stefano Paraboschi, Pierangela Samarati:
Managing key hierarchies for access control enforcement: Heuristic approaches. 533-547 - Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde:
Taming role mining complexity in RBAC. 548-564 - Quan Pham, Jason Reid, Adrian McCullagh, Ed Dawson:
On a taxonomy of delegation. 565-579 - Jan Paul Kolter, Thomas Kernchen, Günther Pernul:
Collaborative privacy management. 580-591 - Ryan Farley, Xinyuan Wang:
Roving bugnet: Distributed surveillance threat and mitigation. 592-602 - Yannis Soupionis, Dimitris Gritzalis:
Audio CAPTCHA: Existing solutions assessment and a new implementation for VoIP telephony. 603-618 - Alessandro Sorniotti, Refik Molva:
A provably secure secret handshake with dynamic controlled matching. 619-627 - Marcel Fernandez, Josep Cotrina, Miguel Soriano, Neus Domingo:
A note about the identifier parent property in Reed-Solomon codes. 628-635
Volume 29, Number 6, September 2010
- Eugene H. Spafford:
Editorial. 641-642 - Marianthi Theoharidou, Panayiotis Kotzanikolaou, Dimitris Gritzalis:
A multi-layer Criticality Assessment methodology based on interdependencies. 643-658 - Teodor Sommestad, Mathias Ekstedt, Pontus Johnson:
A probabilistic relational model for security risk analysis. 659-679 - Theodoros Kavallaris, Vasilios Katos:
On the detection of pod slurping attacks. 680-685 - Xiaochao Zi, Lihong Yao, Li Pan, Jianhua Li:
Implementing a passive network covert timing channel. 686-696 - M. Francisca Hinarejos, Jose L. Muñoz, Jordi Forné, Oscar Esparza:
PREON: An efficient cascade revocation mechanism for delegation paths. 697-711 - Gina C. Tjhai, Steven Furnell, Maria Papadaki, Nathan L. Clarke:
A preliminary two-stage alarm correlation and filtering system using SOM neural network and K-means algorithm. 712-723
Volume 29, Number 7, October 2010
- Eugene H. Spafford:
Editorial. 729-730 - Anthonie B. Ruighaver, Sean B. Maynard, Matthew J. Warren:
Ethical decision making: Improving the quality of acceptable use policies. 731-736 - Francesco Palmieri, Ugo Fiore:
Network anomaly detection through nonlinear analysis. 737-755 - Nitesh B. Guinde, Sotirios G. Ziavras:
Efficient hardware support for pattern matching in network intrusion detection. 756-769 - Jaime A. Pavlich-Mariscal, Steven A. Demurjian, Laurent D. Michel:
A framework for security assurance of access control enforcement code. 770-784 - Anthony J. Palmer:
Approach for selecting the most suitable Automated Personal Identification Mechanism (ASMSA). 785-806
Volume 29, Number 8, November 2010
- Eugene H. Spafford:
Security, technology, publishing, and ethics (Part I). 813-814 - Jinpeng Wei, Calton Pu:
Modeling and preventing TOCTTOU vulnerabilities in Unix-style file systems. 815-830 - Michael Workman:
A behaviorist perspective on corporate harassment online: Validation of a theoretical model of psychological motives. 831-839 - Elmarie Kritzinger, Sebastiaan H. von Solms:
Cyber security for home users: A new way of protection through awareness enforcement. 840-847 - Claudio A. Ardagna, Sabrina De Capitani di Vimercati, Sara Foresti, Tyrone Grandison, Sushil Jajodia, Pierangela Samarati:
Access control for smarter healthcare using policy spaces. 848-858 - Ioanna Kantzavelou, Sokratis K. Katsikas:
A game-based intrusion detection mechanism to confront internal attackers. 859-874 - Javier Herranz, Stan Matwin, Jordi Nin, Vicenç Torra:
Classifying data from protected statistical datasets. 875-890 - Fred Cohen:
A method for forensic analysis of control. 891-902
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.