


default search action
Computers & Security, Volume 50
Volume 50, May 2015
- Riyanat O. Shittu

, Alex Healing, Robert A. Ghanea-Hercock, Robin E. Bloomfield, Muttukrishnan Rajarajan:
Intrusion alert prioritisation and attack detection using post-correlation analysis. 1-15 - Martín A. Gagliotti Vigil

, Johannes Buchmann, Daniel Cabarcas, Christian Weinert
, Alexander Wiesmaier
:
Integrity, authenticity, non-repudiation, and proof of existence for long-term archiving: A survey. 16-32 - Guillaume Bouffard

, Jean-Louis Lanet:
The ultimate control flow transfer in a Java based smart card. 33-46 - Doaa H. Ibrahim, Emad S. Hassan

, Sami A. El-Dolil:
Relay and jammer selection schemes for improving physical layer security in two-way cooperative networks. 47-59 - Changlong Tang, Jiqiang Liu:

Selecting a trusted cloud service provider for your SaaS program. 60-73 - Xiang Cheng, Sen Su, Shengzhi Xu, Zhengyi Li

:
DP-Apriori: A differentially private frequent itemset mining algorithm based on transaction splitting. 74-90 - Xin Dong, Jiadi Yu, Yanmin Zhu, Yingying Chen

, Yuan Luo, Minglu Li:
SECO: Secure and scalable data collaboration services in cloud computing. 91-105

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














