


default search action
Computers & Security, Volume 29
Volume 29, Number 1, February 2010
- Dimitris Gritzalis, Jan H. P. Eloff:

Editorial. 1-2 - Fuwen Liu, Hartmut König:

A survey of video encryption algorithms. 3-15 - Stylianos Basagiannis

, Panagiotis Katsaros
, Andrew Pombortsis:
An intruder model with message inspection for model checking security protocols. 16-34 - Georgios P. Spathoulas, Sokratis K. Katsikas

:
Reducing false positives in intrusion detection systems. 35-44 - Alexander K. Seewald, Wilfried N. Gansterer

:
On the detection and identification of botnets. 45-58 - Heechang Shin, Jaideep Vaidya, Vijayalakshmi Atluri

:
Anonymization models for directional location based service environments. 59-73 - Gabriele Costa

, Fabio Martinelli, Paolo Mori
, Christian Schaefer, Thomas Walter:
Runtime monitoring for next generation Java ME platform. 74-87 - Tyrone S. Toland, Csilla Farkas, Caroline M. Eastman:

The inference problem: Maintaining maximal availability in the presence of database updates. 88-103 - Yoon-Ho Choi, Lunquan Li, Peng Liu, George Kesidis:

Worm virulence estimation for the containment of local worm outbreak. 104-123 - Chenfeng Vincent Zhou, Christopher Leckie

, Shanika Karunasekera
:
A survey of coordinated attacks and collaborative intrusion detection. 124-140 - Carlos Javier Hernández-Castro, Arturo Ribagorda:

Pitfalls in CAPTCHA design and implementation: The Math CAPTCHA, a case study. 141-157
Volume 29, Number 2, March 2010
- Dimitris Gritzalis, Sabrina De Capitani di Vimercati

:
Editorial. 165-166 - Josep Lluís Ferrer-Gomila

, Jose Antonio Onieva
, Magdalena Payeras-Capellà
, Javier López
:
Certified electronic mail: Properties revisited. 167-179 - Houssem Jarraya, Maryline Laurent

:
A secure peer-to-peer backup service keeping great autonomy while under the supervision of a provider. 180-195 - Adéle da Veiga

, Jan H. P. Eloff:
A framework and assessment instrument for information security culture. 196-207 - Ming-Yang Su:

WARP: A wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks. 208-224 - Sven Ehlert, Dimitris Geneiatakis, Thomas Magedanz:

Survey of network security systems to counter SIP-based denial-of-service attacks. 225-243 - Marko Hölbl

, Tatjana Welzer, Bostjan Brumen
:
Two proposed identity-based three-party authenticated key agreement protocols from pairings. 244-252 - Natalia Stakhanova, Samik Basu, Johnny Wong:

On the symbiosis of specification-based and anomaly-based detection. 253-268 - Chin-Chen Chang, Hao-Chuan Tsai, Yi-Pei Hsieh:

An efficient and fair buyer-seller fingerprinting scheme for large scale networks. 269-277 - Gabriel López Millán, Manuel Gil Pérez

, Gregorio Martínez Pérez
, Antonio Fernandez Gómez-Skarmeta
:
PKI-based trust management in inter-domain scenarios. 278-290
Volume 29, Number 3, May 2010
- Seok-Won Lee, Mattia Monga

:
Special issue on software engineering for secure systems. 299-301 - Alfredo Pironti, Riccardo Sisto

:
Provably correct Java implementations of Spi Calculus security protocols specifications. 302-314 - Andreas Bauer, Jan Jürjens:

Runtime verification of cryptographic protocols. 315-330 - Liang Xiao, Bo Hu, Madalina Croitoru, Paul H. Lewis, Srinandan Dasmahapatra

:
A knowledgeable security model for distributed health information systems. 331-349 - Jaime A. Pavlich-Mariscal

, Steven A. Demurjian, Laurent D. Michel:
A framework of composable access control features: Preserving separation of access control concerns from models to code. 350-379
Volume 29, Number 4, June 2010
- Dimitris Gritzalis, Pierangela Samarati

:
Editorial. 381-382 - Egon Hilgenstieler, Elias P. Duarte Jr., Glenn Mansfield Keeni, Norio Shiratori:

Extensions to the source path isolation engine for precise and efficient log-based IP traceback. 383-392 - A. Maciej Rossudowski, Hein S. Venter

, Jan H. P. Eloff, Derrick G. Kourie:
A security privacy aware architecture and protocol for a single smart card used for multiple services. 393-409 - Fangwei Wang

, Yunkai Zhang, Changguang Wang, Jianfeng Ma, Sang-Jae Moon:
Stability analysis of a SEIQV epidemic model for rapid spreading worms. 410-418 - Tony Cheneau, Aymen Boudguiga

, Maryline Laurent
:
Significantly improved performances of the cryptographically generated addresses thanks to ECC and GPGPU. 419-431 - Eirik Albrechtsen, Jan Hovden:

Improving information security awareness and behaviour through dialogue, participation and collective reflection. An intervention study. 432-445 - Ji Won Yoon, Hyoungshick Kim, Jun Ho Huh:

Hybrid spam filtering for mobile communication. 446-459 - Christoforos Ntantogian

, Christos Xenakis
, Ioannis Stavrakakis
:
A generic mechanism for efficient authentication in B3G networks. 460-475 - Johan Van Niekerk, Rossouw von Solms:

Information security culture: A management perspective. 476-486 - Todd Mander, Richard Cheung, Farhad Nabhani:

Power system DNP3 data object security using data sets. 487-500 - Jordi Forné

, M. Francisca Hinarejos
, Andrés Marín
, Florina Almenárez
, Javier López
, José A. Montenegro, Marc Lacoste, Daniel Díaz Sánchez:
Pervasive authentication and authorization infrastructures for mobile users. 501-514
Volume 29, Number 5, July 2010
- Dimitris Gritzalis, Javier López

:
Editorial. 521-522 - Herbert Leitold, Reinhard Posch, Thomas Rössler:

Reconstruction of electronic signatures from eDocument printouts. 523-532 - Carlo Blundo

, Stelvio Cimato
, Sabrina De Capitani di Vimercati
, Alfredo De Santis
, Sara Foresti
, Stefano Paraboschi
, Pierangela Samarati
:
Managing key hierarchies for access control enforcement: Heuristic approaches. 533-547 - Alessandro Colantonio, Roberto Di Pietro

, Alberto Ocello, Nino Vincenzo Verde:
Taming role mining complexity in RBAC. 548-564 - Quan Pham, Jason Reid, Adrian McCullagh, Ed Dawson

:
On a taxonomy of delegation. 565-579 - Jan Paul Kolter, Thomas Kernchen, Günther Pernul:

Collaborative privacy management. 580-591 - Ryan Farley, Xinyuan Wang:

Roving bugnet: Distributed surveillance threat and mitigation. 592-602 - Yannis Soupionis, Dimitris Gritzalis:

Audio CAPTCHA: Existing solutions assessment and a new implementation for VoIP telephony. 603-618 - Alessandro Sorniotti, Refik Molva

:
A provably secure secret handshake with dynamic controlled matching. 619-627 - Marcel Fernandez, Josep Cotrina, Miguel Soriano

, Neus Domingo:
A note about the identifier parent property in Reed-Solomon codes. 628-635
Volume 29, Number 6, September 2010
- Eugene H. Spafford

:
Editorial. 641-642 - Marianthi Theoharidou

, Panayiotis Kotzanikolaou
, Dimitris Gritzalis:
A multi-layer Criticality Assessment methodology based on interdependencies. 643-658 - Teodor Sommestad, Mathias Ekstedt, Pontus Johnson

:
A probabilistic relational model for security risk analysis. 659-679 - Theodoros Kavallaris, Vasilios Katos

:
On the detection of pod slurping attacks. 680-685 - Xiaochao Zi, Lihong Yao, Li Pan, Jianhua Li:

Implementing a passive network covert timing channel. 686-696 - M. Francisca Hinarejos

, Jose L. Muñoz
, Jordi Forné
, Oscar Esparza
:
PREON: An efficient cascade revocation mechanism for delegation paths. 697-711 - Gina C. Tjhai, Steven Furnell

, Maria Papadaki
, Nathan L. Clarke
:
A preliminary two-stage alarm correlation and filtering system using SOM neural network and K-means algorithm. 712-723
Volume 29, Number 7, October 2010
- Eugene H. Spafford

:
Editorial. 729-730 - Anthonie B. Ruighaver, Sean B. Maynard

, Matthew J. Warren
:
Ethical decision making: Improving the quality of acceptable use policies. 731-736 - Francesco Palmieri

, Ugo Fiore
:
Network anomaly detection through nonlinear analysis. 737-755 - Nitesh B. Guinde, Sotirios G. Ziavras

:
Efficient hardware support for pattern matching in network intrusion detection. 756-769 - Jaime A. Pavlich-Mariscal

, Steven A. Demurjian, Laurent D. Michel:
A framework for security assurance of access control enforcement code. 770-784 - Anthony J. Palmer:

Approach for selecting the most suitable Automated Personal Identification Mechanism (ASMSA). 785-806
Volume 29, Number 8, November 2010
- Eugene H. Spafford

:
Security, technology, publishing, and ethics (Part I). 813-814 - Jinpeng Wei, Calton Pu:

Modeling and preventing TOCTTOU vulnerabilities in Unix-style file systems. 815-830 - Michael Workman:

A behaviorist perspective on corporate harassment online: Validation of a theoretical model of psychological motives. 831-839 - Elmarie Kritzinger

, Sebastiaan H. von Solms:
Cyber security for home users: A new way of protection through awareness enforcement. 840-847 - Claudio A. Ardagna

, Sabrina De Capitani di Vimercati
, Sara Foresti
, Tyrone Grandison
, Sushil Jajodia
, Pierangela Samarati
:
Access control for smarter healthcare using policy spaces. 848-858 - Ioanna Kantzavelou

, Sokratis K. Katsikas
:
A game-based intrusion detection mechanism to confront internal attackers. 859-874 - Javier Herranz

, Stan Matwin
, Jordi Nin
, Vicenç Torra
:
Classifying data from protected statistical datasets. 875-890 - Fred Cohen:

A method for forensic analysis of control. 891-902

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














