Volume 25, Number 1, February 2006
Volume 25, Number 2, March 2006
Vicki Miller Luoma
: Computer forensics and electronic discovery: The new management challenge.
Volume 25, Number 3, May 2006
, Zhenfu Cao
: A traceable threshold signature scheme with multiple signing policies.
: Security implications in RFID and authentication processing framework.
: Change trend of averaged Hurst parameter of traffic under DDOS flood attacks.
Volume 25, Number 4, June 2006
Volume 25, Number 5, July 2006
Volume 25, Number 6, September 2006
: FTKM: A fault-tolerant key management protocol for multicast communications.
, Y. Murat Erten
: Application of temporal and spatial role based access control in 802.11 wireless networks.
Volume 25, Number 7, October 2006
E. Eugene Schultz
: Issues concerning the distribution of vulnerability information.
: A taxonomy and comparison of computer security incidents from the commercial and government sectors.
Volume 25, Number 8, November 2006
, Ray Hunt
: Tightening the net: A review of current and next generation spam filtering tools.