


default search action
Computers & Security, Volume 27
Volume 27, Numbers 1-2, March 2008
- Stephen D. Wolthusen:

Editorial. 1 - Pilsung Kang, Sunghoon Park, Seongseob Hwang, Hyoungjoo Lee, Sungzoon Cho:

Improvement of keystroke data quality through artificial rhythms and cues. 3-11 - Lein Harn, Jian Ren:

Efficient identity-based RSA multisignatures. 12-15 - Hua Guo, Zhoujun Li, Yi Mu, Xiyong Zhang:

Cryptanalysis of simple three-party key exchange protocol. 16-21 - Evan E. Anderson, Joobin Choobineh:

Enterprise information security strategies. 22-29 - Abdoul Karim Ganame, Julien Bourgeois

, Renaud Bidou, François Spies
:
A global security architecture for intrusion detection on computer networks. 30-47 - Francesco Palmieri

, Ugo Fiore
:
Containing large-scale worm spreading in the Internet by cooperative distribution of traffic filtering policies. 48-62
Volume 27, Numbers 3-4, May-June 2008
- Stephen D. Wolthusen:

Editorial. 63 - Rolf Oppliger, Ralf Hauser, David A. Basin:

SSL/TLS session-aware user authentication revisited. 64-70 - Hein S. Venter

, Jan H. P. Eloff, Y. L. Li:
Standardising vulnerability categories. 71-83 - Shi-Jinn Horng, Pingzhi Fan, Yao-Ping Chou, Yen-Cheng Chang, Yi Pan:

A feasible intrusion detector for recognizing IIS attacks based on neural networks. 84-100 - Azzam Mourad

, Marc-André Laverdière, Mourad Debbabi
:
An aspect-oriented approach for the systematic security hardening of code. 101-114
- Jia-Lun Tsai:

Efficient multi-server authentication scheme based on one-way hash function without verification table. 115-121
Volume 27, Numbers 5-6, October 2008
- Stephen D. Wolthusen:

From the Editor-in-Chief. 123 - Mariana Gerber, Rossouw von Solms:

Information security requirements - Interpreting the legal aspects. 124-135 - Dimitris Gritzalis, Yannis Mallios:

A SIP-oriented SPIT Management Framework. 136-153 - Johnny Li-Chang Lo, Judith Bishop, Jan H. P. Eloff:

SMSSec: An end-to-end protocol for secure SMS. 154-167 - Rachid Beghdad

:
Critical study of neural networks in detecting intrusions. 168-175 - Wes Masri, Andy Podgurski:

Application-based anomaly intrusion detection with dynamic information flow analysis. 176-187 - Shaojun Zhang, Jianhua Li, Xiuzhen Chen, Lei Fan:

Building network attack graph for alert causal correlation. 188-196 - Ted Huffmire, Timothy Sherwood

, Ryan Kastner
, Timothy E. Levin:
Enforcing memory policy specifications in reconfigurable hardware. 197-215 - Hung-Yu Chien:

Practical anonymous user authentication scheme with security proof. 216-223 - Elmarie Kritzinger

, E. Smith:
Information security management: An information security retrieval and awareness model for industry. 224-231
Volume 27, Numbers 7-8, December 2008
- Stephen D. Wolthusen:

Editorial. 233-234 - Steven Furnell

, Valleria Tsaganidi, Andrew D. Phippen
:
Security beliefs and barriers for novice Internet users. 235-240 - Yacine Rezgui

, Adam Marks
:
Information security awareness in higher education: An exploratory study. 241-253 - Hennie A. Kruger, Wayne D. Kearney:

Consensus ranking - An ICT security awareness case study. 254-259 - Anthony J. Palmer:

Criteria to evaluate Automated Personal Identification Mechanisms. 260-284 - Dimitris Geneiatakis, Costas Lambrinoudakis

, Georgios Kambourakis
:
An ontology-based policy for deploying secure SIP-based VoIP services. 285-297 - Vassilios Stathopoulos, Panayiotis Kotzanikolaou

, Emmanouil Magkos:
Secure log management for privacy assurance in electronic communications. 298-308 - Jorge L. Hernandez-Ardieta, Ana Isabel González-Tablas Ferreres

, Benjamín Ramos Álvarez:
An optimistic fair exchange protocol based on signature policies. 309-322 - Arati Baliga, Liviu Iftode, Xiaoxin Chen:

Automated containment of rootkits attacks. 323-334 - Gabriel Maciá-Fernández

, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro:
Evaluation of a low-rate DoS attack against application servers. 335-354 - José Roberto C. Piqueira, Adolfo A. de Vasconcelos, Carlos E. C. J. Gabriel, Vanessa O. Araujo:

Dynamic models for computer viruses. 355-359

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














