


default search action
Computers & Security, Volume 66
Volume 66, May 2017
- Seung-Hyun Kim

, In-Young Ko, Soo-Hyung Kim:
Quality of Private Information (QoPI) model for effective representation and prediction of privacy controls in mobile computing. 1-19 - Adeel Anjum, Guillaume Raschia, Marc Gelgon, Abid Khan

, Saif Ur Rehman Malik
, Naveed Ahmad, Mansoor Ahmed
, Sabah Suhail
, Masoom Alam:
τ-safety: A privacy model for sequential publication with arbitrary updates. 20-39 - Kathryn Parsons, Dragana Calic, Malcolm Robert Pattinson, Marcus A. Butavicius, Agata McCormac, Tara Zwaans:

The Human Aspects of Information Security Questionnaire (HAIS-Q): Two further validation studies. 40-51 - Jinyoung Han

, Yoo Jung Kim, Hyungjin Lukas Kim
:
An integrative model of information security policy compliance with psychological contract: Examining a bilateral perspective. 52-65 - Firas Saidi, Zouheir Trabelsi, Khaled Salah, Henda Ben Ghézala

:
Approaches to analyze cyber terrorist communities: Survey and challenges. 66-80 - Inez Miyamoto, Thomas H. Holzer, Shahryar Sarkani:

Why a counterfeit risk avoidance strategy fails. 81-96 - Abdelhak Mesbah, Jean-Louis Lanet, Mohamed Mezghiche:

Reverse engineering a Java Card memory management algorithm. 97-114 - Toan Van Nguyen, Napa Sae-Bae, Nasir D. Memon

:
DRAW-A-PIN: Authentication using finger-drawn PIN on touch devices. 115-128 - Debora Jeske

, Paul van Schaik:
Familiarity with Internet threats: Beyond awareness. 129-141 - Bhupendra Singh

, Upasna Singh
:
A forensic insight into Windows 10 Cortana search. 142-154 - Nilesh Chakraborty, Samrat Mondal

:
On designing a modified-UI based honeyword generation approach for overcoming the existing limitations. 155-168 - Abdul Razaque

, Syed S. Rizvi, Meer J. Khan
, Qassim B. Hani, Julius P. Dichter, Reza M. Parizi:
Secure and quality-of-service-supported service-oriented architecture for mobile cloud handoff process. 169-184 - Fatih Turkmen

, Jerry den Hartog, Silvio Ranise
, Nicola Zannone
:
Formal analysis of XACML policies using SMT. 185-203 - Junqing Le, Xiaofeng Liao, Bo Yang:

Full autonomy: A novel individualized anonymity model for privacy preserving. 204-217 - Salvatore Aurigemma, Thomas Mattson:

Privilege or procedure: Evaluating the effect of employee status on intent to comply with socially interactive information security threats and controls. 218-234

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














