default search action
Computers & Security, Volume 32
Volume 32, February 2013
- Nerea Toledo, Marivi Higuero, Jasone Astorga, Marina Aguado, Jean-Marie Bonnin:
Design and formal security evaluation of NeMHIP: A new secure and efficient network mobility management protocol based on the Host Identity Protocol. 1-18 - Andreas U. Schmidt, Andreas Leicher, Andreas Brett, Yogendra Shah, Inhyok Cha:
Tree-formed verification data for trusted platforms. 19-35 - Hailun Tan, Diethelm Ostry, John Zic, Sanjay K. Jha:
A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks. 36-55 - Simson L. Garfinkel:
Digital media triage with bulk data analysis and bulk_extractor. 56-72 - Kamil Reddy, Hein S. Venter:
The architecture of a digital forensic readiness management system. 73-89 - Robert E. Crossler, Allen C. Johnston, Paul Benjamin Lowry, Qing Hu, Merrill Warkentin, Richard L. Baskerville:
Future directions for behavioral information security research. 90-101 - Dimitrios Damopoulos, Georgios Kambourakis, Stefanos Gritzalis:
From keyloggers to touchloggers: Take the rough with the smooth. 102-114 - Ioana Lasc, Reiner Dojen, Tom Coffey:
On the detection of desynchronisation attacks against security protocols that use dynamic shared secrets. 115-129 - Jared D. DeMott, Richard J. Enbody, William F. Punch:
Systematic bug finding and fault localization enhanced with input data tracking. 130-157 - Shuzhen Wang, Zonghua Zhang, Youki Kadobayashi:
Exploring attack graph for cost-benefit security hardening: A probabilistic approach. 158-169 - Rui Joaquim, Paulo Ferreira, Carlos Ribeiro:
EVIV: An end-to-end verifiable Internet voting system. 170-191 - Daniel Lerch-Hostalot, David Megías:
LSB matching steganalysis based on patterns of pixel differences and random embedding. 192-206 - Alois Paulin, Tatjana Welzer:
A universal system for fair non-repudiable certified e-mail without a trusted third party. 207-218 - Z. Cliffe Schreuders, Tanya Jane McGill, Christian Payne:
The state of the art of application restrictions and sandboxes: A survey of application-oriented access controls and their shortfalls. 219-241 - Ken H. Guo:
Security-related behavior in using information systems in the workplace: A review and synthesis. 242-251 - Ravi Chandra Jammalamadaka, Roberto Gamboni, Sharad Mehrotra, Kent E. Seamons, Nalini Venkatasubramanian:
A middleware approach for outsourcing data securely. 252-266 - Yannis Soupionis, Dimitris Gritzalis:
Hacking VoIP. 267 - Miltiadis Kandias, Dimitris Gritzalis:
Metasploit the Penetration Tester's Guide. 268-269
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.