


default search action
Computers & Security, Volume 25
Volume 25, Number 1, February 2006
- E. Eugene Schultz:

Dilemmas and boundaries of digital rights management. 1-2 - Robert Booker:

Re-engineering enterprise security. 13-17 - C. M. Roberts:

Radio frequency identification (RFID). 18-26 - Steven Furnell

, Adila Jusoh, Dimitris Katsabas:
The challenges of understanding and using security: A survey of end-users. 27-35 - Indrakshi Ray, Mahendra Kumar:

Towards a location-based mandatory access control model. 36-44 - Christos K. Dimitriadis, Despina Polemi:

An identity management protocol for Internet applications over 3G mobile networks. 45-51 - Raphael Chung-Wei Phan

:
Cryptanalysis of two password-based authentication schemes using smart cards. 52-54 - Neil F. Doherty, Heather Fulford

:
Aligning the information security policy with the strategic information systems plan. 55-63 - Julio César Hernández Castro, Ignacio Blasco-Lopez, Juan M. Estévez-Tapiador

, Arturo Ribagorda Garnacho:
Steganography in games: A general methodology and its application to the game of Go. 64-71 - Wen-Gong Shieh, Jian-Min Wang:

Efficient remote mutual authentication and key agreement. 72-77
Volume 25, Number 2, March 2006
- E. Eugene Schultz:

About "Unofficial patches". 79-80 - Danny Bradbury:

The metamorphosis of malware writers. 89-90 - Vicki Miller Luoma:

Computer forensics and electronic discovery: The new management challenge. 91-96 - Vafa D. Izadinia, Derrick G. Kourie, Jan H. P. Eloff:

Uncovering identities: A study into VPN tunnel fingerprinting. 97-105 - Hsiang-An Wen, Chun-Li Lin, Tzonelih Hwang:

Provably secure authenticated key exchange protocols for low power computing clients. 106-113 - Vipul Goyal, Virendra Kumar

, Mayank Singh, Ajith Abraham, Sugata Sanyal:
A new protocol to counter online dictionary attacks. 114-120 - Nikos Komninos

, Dimitris Vergados, Christos Douligeris:
Layered security design for mobile ad hoc networks. 121-130 - Raphael Chung-Wei Phan

, David A. Wagner:
Security considerations for incremental hash functions based on pair block chaining. 131-136 - Krishna Sampigethaya, Radha Poovendran

:
A framework and taxonomy for comparison of electronic voting schemes. 137-153
Volume 25, Number 3, May 2006
- E. Eugene Schultz:

Special systems: Overlooked sources of security risk? 155 - Danny Bradbury:

Modeling network security. 163-164 - Sebastiaan H. von Solms:

Information Security - The Fourth Wave. 165-168 - Soojin Lee, Byungchun Chung, Heeyoul Kim, Yunho Lee, Chanil Park, Hyunsoo Yoon:

Real-time analysis of intrusion detection alerts via correlation. 169-183 - Manik Lal Das, Ashutosh Saxena

, Ved Prakash Gulati, Deepak B. Phatak:
A novel remote user authentication scheme using bilinear pairings. 184-189 - Wenliang Du, Mingdong Shang, Haizhi Xu:

A novel approach for computer security education using Minix instructional operating system. 190-200 - Jun Shao, Zhenfu Cao

:
A traceable threshold signature scheme with multiple signing policies. 201-206 - John Ayoade:

Security implications in RFID and authentication processing framework. 207-212 - Ming Li

:
Change trend of averaged Hurst parameter of traffic under DDOS flood attacks. 213-220 - Iain Sutherland

, George E. Kalb, Andrew Blyth, Gaius Mulley:
An empirical examination of the reverse engineering process for binary files. 221-228 - Guillermo González-Talaván:

A simple, configurable SMTP anti-spam filter: Greylists. 229-236
Volume 25, Number 4, June 2006
- E. Eugene Schultz:

Representing information security fairly and accurately. 237 - Reinhardt A. Botha

, Tshepo G. Gaadingwe:
Reflecting on 20 SEC conferences. 247-256 - Richard Ford, Mark Bush

, Alexander Bulatov:
Predation and the cost of replication: New approaches to malware prevention? 257-264 - Wee Hock Desmond Ng, Haitham S. Cruickshank, Zhili Sun

:
Scalable balanced batch rekeying for secure group communication. 265-273 - Hassan Artail, Haïdar Safa, Malek Sraj, Iyad Kuwatly, Zaid Al Masri:

A hybrid honeypot framework for improving intrusion detection systems in protecting organizational networks. 274-288 - Hennie A. Kruger, Wayne D. Kearney:

A prototype for assessing information security awareness. 289-296 - Ashraf Elgohary, Tarek S. Sobh

, Mohammed Zaki:
Design of an enhancement for SSL/TLS protocols. 297-306 - Chin-Chen Chang, Jung-San Lee:

An anonymous voting mechanism based on the key exchange protocol. 307-314
Volume 25, Number 5, July 2006
- E. Eugene Schultz:

The changing winds of information security. 315-316 - Stephen Flowerday

, A. W. Blundell, Rossouw von Solms:
Continuous auditing technologies and models: A discussion. 325-331 - Sanjeev Kumar:

PING attack - How bad is it? 332-337 - Nathanael Paul, David Evans

:
Comparing Java and .NET security: Lessons learned and missed. 338-350 - Sarandis Mitropoulos, Dimitrios Patsos, Christos Douligeris:

On Incident Handling and Response: A state-of-the-art approach. 351-370 - Mingchao Ma, Steve Woodhead:

Authentication delegation for subscription-based remote network services. 371-378 - Spyros T. Halkidis, Alexander Chatzigeorgiou, George Stephanides:

A qualitative analysis of software security patterns. 379-392
Volume 25, Number 6, September 2006
- E. Eugene Schultz:

Microsoft is back in the hot seat. 393-394 - Danny Bradbury:

Microsoft's new window on security. 405-407 - Rossouw von Solms, Sebastiaan H. von Solms:

Information Security Governance: A model based on the Direct-Control Cycle. 408-412 - Bilge Karabacak

, Ibrahim Sogukpinar
:
A quantitative method for ISO 17799 gap analysis. 413-419 - Kumar V. Mangipudi, Rajendra S. Katti:

A Secure Identification and Key agreement protocol with user Anonymity (SIKA). 420-425 - Hamida Seba:

FTKM: A fault-tolerant key management protocol for multicast communications. 426-434 - Dong Jin Kwak, Sang-Jae Moon, Guilin Wang, Robert H. Deng

:
A secure extension of the Kwak-Moon group signcryption scheme. 435-444 - A. A. Abimbola, Jose Munoz, William J. Buchanan

:
NetHost-Sensor: Investigating the capture of end-to-end encrypted intrusive data. 445-451 - Emrah Tomur

, Y. Murat Erten:
Application of temporal and spatial role based access control in 802.11 wireless networks. 452-458 - Morteza Amini

, Rasool Jalili, Hamid Reza Shahriari
:
RT-UNNID: A practical solution to real-time network-based intrusion detection using unsupervised neural networks. 459-468 - Zhi-hong Zuo, Qingxin Zhu, Ming-Tian Zhou:

Infection, imitation and a hierarchy of computer viruses. 469-473
Volume 25, Number 7, October 2006
- E. Eugene Schultz:

Issues concerning the distribution of vulnerability information. 475-476 - Hazel Lacohée, Andrew D. Phippen

, Steven Furnell
:
Risk and restitution: Assessing how users establish online trust. 486-493 - Rossouw von Solms, Sebastiaan H. von Solms:

Information security governance: Due care. 494-497 - Vinay M. Igure, Sean A. Laughter, Ronald D. Williams:

Security issues in SCADA networks. 498-506 - Vassilis Kapsalis, Loukas Hadellis, Dimitris Karelis, Stavros A. Koubias

:
A dynamic context-aware access control architecture for e-services. 507-521 - Maria Kjaerland:

A taxonomy and comparison of computer security incidents from the commercial and government sectors. 522-538 - Wei Wang, Xiaohong Guan, Xiangliang Zhang, Liwei Yang:

Profiling program behavior for anomaly intrusion detection based on the transition and frequency property of computer audit data. 539-550
Volume 25, Number 8, November 2006
- E. Eugene Schultz:

Predicting the future of InfoSec. 553-554 - James Carpinter, Ray Hunt:

Tightening the net: A review of current and next generation spam filtering tools. 566-578 - Julie J. C. H. Ryan, Daniel J. Ryan:

Expected benefits of information security investments. 579-588 - Jinqian Liang, Xiaohong Guan:

A virtual disk environment for providing file system recovery. 589-599 - Glenn Carl, Richard R. Brooks

, Suresh Rai:
Wavelet based Denial-of-Service detection. 600-615

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














