Computers & Security, Volume 25
Volume 25, Number 1, February 2006
- Steven Furnell, Adila Jusoh, Dimitris Katsabas:
The challenges of understanding and using security: A survey of end-users. 27-35 - Christos K. Dimitriadis, Despina Polemi:
An identity management protocol for Internet applications over 3G mobile networks. 45-51 - Raphael Chung-Wei Phan:
Cryptanalysis of two password-based authentication schemes using smart cards. 52-54 - Neil F. Doherty, Heather Fulford:
Aligning the information security policy with the strategic information systems plan. 55-63 - Julio César Hernández Castro, Ignacio Blasco-Lopez, Juan M. Estévez-Tapiador, Arturo Ribagorda Garnacho:
Steganography in games: A general methodology and its application to the game of Go. 64-71
Volume 25, Number 2, March 2006
- Vicki Miller Luoma:
Computer forensics and electronic discovery: The new management challenge. 91-96 - Vafa D. Izadinia, Derrick G. Kourie, Jan H. P. Eloff:
Uncovering identities: A study into VPN tunnel fingerprinting. 97-105 - Hsiang-An Wen, Chun-Li Lin, Tzonelih Hwang:
Provably secure authenticated key exchange protocols for low power computing clients. 106-113 - Vipul Goyal, Virendra Kumar, Mayank Singh, Ajith Abraham, Sugata Sanyal:
A new protocol to counter online dictionary attacks. 114-120 - Nikos Komninos, Dimitris Vergados, Christos Douligeris:
Layered security design for mobile ad hoc networks. 121-130 - Raphael Chung-Wei Phan, David A. Wagner:
Security considerations for incremental hash functions based on pair block chaining. 131-136 - Krishna Sampigethaya, Radha Poovendran:
A framework and taxonomy for comparison of electronic voting schemes. 137-153
Volume 25, Number 3, May 2006
- Soojin Lee, Byungchun Chung, Heeyoul Kim, Yunho Lee, Chanil Park, Hyunsoo Yoon:
Real-time analysis of intrusion detection alerts via correlation. 169-183 - Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati, Deepak B. Phatak:
A novel remote user authentication scheme using bilinear pairings. 184-189 - Wenliang Du, Mingdong Shang, Haizhi Xu:
A novel approach for computer security education using Minix instructional operating system. 190-200 - Jun Shao, Zhenfu Cao:
A traceable threshold signature scheme with multiple signing policies. 201-206 - Iain Sutherland, George E. Kalb, Andrew Blyth, Gaius Mulley:
An empirical examination of the reverse engineering process for binary files. 221-228
Volume 25, Number 4, June 2006
- Richard Ford, Mark Bush, Alexander Bulatov:
Predation and the cost of replication: New approaches to malware prevention? 257-264 - Wee Hock Desmond Ng, Haitham S. Cruickshank, Zhili Sun:
Scalable balanced batch rekeying for secure group communication. 265-273 - Hassan Artail, Haïdar Safa, Malek Sraj, Iyad Kuwatly, Zaid Al Masri:
A hybrid honeypot framework for improving intrusion detection systems in protecting organizational networks. 274-288 - Hennie A. Kruger, Wayne D. Kearney:
A prototype for assessing information security awareness. 289-296 - Ashraf Elgohary, Tarek S. Sobh, Mohammed Zaki:
Design of an enhancement for SSL/TLS protocols. 297-306 - Chin-Chen Chang, Jung-San Lee:
An anonymous voting mechanism based on the key exchange protocol. 307-314
Volume 25, Number 5, July 2006
- Stephen Flowerday, A. W. Blundell, Rossouw von Solms:
Continuous auditing technologies and models: A discussion. 325-331 - Sarandis Mitropoulos, Dimitrios Patsos, Christos Douligeris:
On Incident Handling and Response: A state-of-the-art approach. 351-370 - Mingchao Ma, Steve Woodhead:
Authentication delegation for subscription-based remote network services. 371-378 - Spyros T. Halkidis, Alexander Chatzigeorgiou, George Stephanides:
A qualitative analysis of software security patterns. 379-392
Volume 25, Number 6, September 2006
- Rossouw von Solms, Sebastiaan H. von Solms:
Information Security Governance: A model based on the Direct-Control Cycle. 408-412 - Kumar V. Mangipudi, Rajendra S. Katti:
A Secure Identification and Key agreement protocol with user Anonymity (SIKA). 420-425 - Dong Jin Kwak, Sang-Jae Moon, Guilin Wang, Robert H. Deng:
A secure extension of the Kwak-Moon group signcryption scheme. 435-444 - A. A. Abimbola, Jose Munoz, William J. Buchanan:
NetHost-Sensor: Investigating the capture of end-to-end encrypted intrusive data. 445-451 - Emrah Tomur, Y. Murat Erten:
Application of temporal and spatial role based access control in 802.11 wireless networks. 452-458 - Morteza Amini, Rasool Jalili, Hamid Reza Shahriari:
RT-UNNID: A practical solution to real-time network-based intrusion detection using unsupervised neural networks. 459-468 - Zhi-hong Zuo, Qing-xin Zhu, Ming-tian Zhou:
Infection, imitation and a hierarchy of computer viruses. 469-473
Volume 25, Number 7, October 2006
- Hazel Lacohée, Andrew D. Phippen, Steven Furnell:
Risk and restitution: Assessing how users establish online trust. 486-493 - Vassilis Kapsalis, Loukas Hadellis, Dimitris Karelis, Stavros A. Koubias:
A dynamic context-aware access control architecture for e-services. 507-521 - Maria Kjaerland:
A taxonomy and comparison of computer security incidents from the commercial and government sectors. 522-538 - Wei Wang, Xiaohong Guan, Xiangliang Zhang, Liwei Yang:
Profiling program behavior for anomaly intrusion detection based on the transition and frequency property of computer audit data. 539-550
Volume 25, Number 8, November 2006
- James Carpinter, Ray Hunt:
Tightening the net: A review of current and next generation spam filtering tools. 566-578 - Jinqian Liang, Xiaohong Guan:
A virtual disk environment for providing file system recovery. 589-599