


default search action
International Journal of Information and Computer Security, Volume 3
Volume 3, Number 1, 2009
- Shankar Bhausaheb Nikam

, Suneeta Agarwal:
Wavelet-based multiresolution analysis of ridges for fingerprint liveness detection. 1-46 - Min Yang, Qingshu Meng, Huanguo Zhang:

The evolutionary design of trace form bent functions in cryptography. 47-59 - Karen Renaud:

Guidelines for designing graphical authentication mechanism interfaces. 60-85 - Sanjay Rawat

, Ashutosh Saxena:
Application security code analysis: a step towards software assurance. 86-110
Volume 3, Number 2, 2009
- David M. Nicol, Charles M. Davis, Thomas J. Overbye

:
A testbed for power system security evaluation. 114-131 - Hongbing Hu, Yu Chen, Wei-Shinn Ku

, Zhou Su, Chung-Han Chen:
Weighted trust evaluation-based malicious node detection for wireless sensor networks. 132-149 - Prashant Dewan, Partha Dasgupta, Amiya Bhattacharya:

Mitigating routing vulnerabilities in ad hoc networks using reputations. 150-172 - Men Long, Chwan-Hwa John Wu:

Design and simulation on data-forwarding security in sensor networks. 173-194 - Chwan-Hwa John Wu, Tong Liu, Chun-Ching Andy Huang, J. David Irwin:

Modelling and simulations for Identity-Based Privacy-Protected Access Control Filter (IPACF) capability to resist massive denial of service attacks. 195-223
Volume 3, Numbers 3/4, 2009
- Mohamed Elhoucine Elhdhili, Lamia Ben Azzouz

, Farouk Kamoun
:
REputation based Clustering Algorithm for security management in ad hoc networks with liars. 228-244 - Mahmoud Mostafa, Anas Abou El Kalam

, Christian Fraboul:
A new protocol for security and QoS in IP networks. 245-264 - Guillaume Hiet

, Valérie Viet Triem Tong, Ludovic Mé, Benjamin Morin:
Policy-based intrusion detection in web applications by monitoring Java information flows. 265-279 - Nora Cuppens-Boulahia, Frédéric Cuppens, Fabien Autrel, Hervé Debar

:
An ontology-based approach to react to network attacks. 280-305 - Clara Bertolissi, Maribel Fernández:

Distributed event-based access control. 306-320 - Monia Loulou, Mohamed Jmaiel, Mohamed Mosbah

:
Dynamic security framework for mobile agent systems: specification, verification and enforcement. 321-336 - Slim Kallel

, Anis Charfi, Mira Mezini, Mohamed Jmaiel, Andreas Sewe:
A holistic approach for access control policies: from formal specification to aspect-based enforcement. 337-354

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














