


default search action
Computers & Security, Volume 29
Volume 29, Number 1, February 2010
- Dimitris Gritzalis, Jan H. P. Eloff:
Editorial. 1-2 - Fuwen Liu, Hartmut König:
A survey of video encryption algorithms. 3-15 - Stylianos Basagiannis
, Panagiotis Katsaros
, Andrew Pombortsis:
An intruder model with message inspection for model checking security protocols. 16-34 - Georgios P. Spathoulas, Sokratis K. Katsikas
:
Reducing false positives in intrusion detection systems. 35-44 - Alexander K. Seewald, Wilfried N. Gansterer:
On the detection and identification of botnets. 45-58 - Heechang Shin, Jaideep Vaidya, Vijayalakshmi Atluri
:
Anonymization models for directional location based service environments. 59-73 - Gabriele Costa
, Fabio Martinelli, Paolo Mori
, Christian Schaefer, Thomas Walter:
Runtime monitoring for next generation Java ME platform. 74-87 - Tyrone S. Toland, Csilla Farkas, Caroline M. Eastman:
The inference problem: Maintaining maximal availability in the presence of database updates. 88-103 - Yoon-Ho Choi, Lunquan Li, Peng Liu, George Kesidis:
Worm virulence estimation for the containment of local worm outbreak. 104-123 - Chenfeng Vincent Zhou, Christopher Leckie
, Shanika Karunasekera
:
A survey of coordinated attacks and collaborative intrusion detection. 124-140 - Carlos Javier Hernández-Castro, Arturo Ribagorda:
Pitfalls in CAPTCHA design and implementation: The Math CAPTCHA, a case study. 141-157
Volume 29, Number 2, March 2010
- Dimitris Gritzalis, Sabrina De Capitani di Vimercati
:
Editorial. 165-166 - Josep Lluís Ferrer-Gomila
, Jose Antonio Onieva
, Magdalena Payeras-Capellà
, Javier López
:
Certified electronic mail: Properties revisited. 167-179 - Houssem Jarraya, Maryline Laurent
:
A secure peer-to-peer backup service keeping great autonomy while under the supervision of a provider. 180-195 - Adéle da Veiga
, Jan H. P. Eloff:
A framework and assessment instrument for information security culture. 196-207 - Ming-Yang Su:
WARP: A wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks. 208-224 - Sven Ehlert, Dimitris Geneiatakis, Thomas Magedanz:
Survey of network security systems to counter SIP-based denial-of-service attacks. 225-243 - Marko Hölbl
, Tatjana Welzer, Bostjan Brumen
:
Two proposed identity-based three-party authenticated key agreement protocols from pairings. 244-252 - Natalia Stakhanova, Samik Basu, Johnny Wong:
On the symbiosis of specification-based and anomaly-based detection. 253-268 - Chin-Chen Chang, Hao-Chuan Tsai, Yi-Pei Hsieh:
An efficient and fair buyer-seller fingerprinting scheme for large scale networks. 269-277 - Gabriel López Millán, Manuel Gil Pérez
, Gregorio Martínez Pérez
, Antonio Fernandez Gómez-Skarmeta
:
PKI-based trust management in inter-domain scenarios. 278-290
Volume 29, Number 3, May 2010
- Seok-Won Lee, Mattia Monga
:
Special issue on software engineering for secure systems. 299-301 - Alfredo Pironti, Riccardo Sisto
:
Provably correct Java implementations of Spi Calculus security protocols specifications. 302-314 - Andreas Bauer, Jan Jürjens:
Runtime verification of cryptographic protocols. 315-330 - Liang Xiao, Bo Hu, Madalina Croitoru, Paul H. Lewis, Srinandan Dasmahapatra
:
A knowledgeable security model for distributed health information systems. 331-349 - Jaime A. Pavlich-Mariscal
, Steven A. Demurjian, Laurent D. Michel:
A framework of composable access control features: Preserving separation of access control concerns from models to code. 350-379
Volume 29, Number 4, June 2010
- Dimitris Gritzalis, Pierangela Samarati
:
Editorial. 381-382 - Egon Hilgenstieler, Elias P. Duarte Jr., Glenn Mansfield Keeni, Norio Shiratori:
Extensions to the source path isolation engine for precise and efficient log-based IP traceback. 383-392 - A. Maciej Rossudowski, Hein S. Venter
, Jan H. P. Eloff, Derrick G. Kourie:
A security privacy aware architecture and protocol for a single smart card used for multiple services. 393-409 - Fangwei Wang
, Yunkai Zhang, Changguang Wang, Jianfeng Ma, Sang-Jae Moon:
Stability analysis of a SEIQV epidemic model for rapid spreading worms. 410-418 - Tony Cheneau, Aymen Boudguiga
, Maryline Laurent
:
Significantly improved performances of the cryptographically generated addresses thanks to ECC and GPGPU. 419-431 - Eirik Albrechtsen, Jan Hovden:
Improving information security awareness and behaviour through dialogue, participation and collective reflection. An intervention study. 432-445 - Ji Won Yoon, Hyoungshick Kim, Jun Ho Huh:
Hybrid spam filtering for mobile communication. 446-459 - Christoforos Ntantogian, Christos Xenakis
, Ioannis Stavrakakis
:
A generic mechanism for efficient authentication in B3G networks. 460-475 - Johan Van Niekerk, Rossouw von Solms:
Information security culture: A management perspective. 476-486 - Todd Mander, Richard Cheung, Farhad Nabhani:
Power system DNP3 data object security using data sets. 487-500 - Jordi Forné
, M. Francisca Hinarejos
, Andrés Marín
, Florina Almenárez
, Javier López
, José A. Montenegro, Marc Lacoste, Daniel Díaz Sánchez:
Pervasive authentication and authorization infrastructures for mobile users. 501-514
Volume 29, Number 5, July 2010
- Dimitris Gritzalis, Javier López
:
Editorial. 521-522 - Herbert Leitold, Reinhard Posch, Thomas Rössler:
Reconstruction of electronic signatures from eDocument printouts. 523-532 - Carlo Blundo
, Stelvio Cimato
, Sabrina De Capitani di Vimercati
, Alfredo De Santis
, Sara Foresti
, Stefano Paraboschi
, Pierangela Samarati
:
Managing key hierarchies for access control enforcement: Heuristic approaches. 533-547 - Alessandro Colantonio, Roberto Di Pietro
, Alberto Ocello, Nino Vincenzo Verde:
Taming role mining complexity in RBAC. 548-564 - Quan Pham, Jason Reid, Adrian McCullagh, Ed Dawson
:
On a taxonomy of delegation. 565-579 - Jan Paul Kolter, Thomas Kernchen, Günther Pernul:
Collaborative privacy management. 580-591 - Ryan Farley, Xinyuan Wang:
Roving bugnet: Distributed surveillance threat and mitigation. 592-602 - Yannis Soupionis, Dimitris Gritzalis:
Audio CAPTCHA: Existing solutions assessment and a new implementation for VoIP telephony. 603-618 - Alessandro Sorniotti, Refik Molva
:
A provably secure secret handshake with dynamic controlled matching. 619-627 - Marcel Fernandez, Josep Cotrina, Miguel Soriano
, Neus Domingo:
A note about the identifier parent property in Reed-Solomon codes. 628-635
Volume 29, Number 6, September 2010
- Eugene H. Spafford
:
Editorial. 641-642 - Marianthi Theoharidou
, Panayiotis Kotzanikolaou
, Dimitris Gritzalis:
A multi-layer Criticality Assessment methodology based on interdependencies. 643-658 - Teodor Sommestad, Mathias Ekstedt, Pontus Johnson
:
A probabilistic relational model for security risk analysis. 659-679 - Theodoros Kavallaris, Vasilios Katos
:
On the detection of pod slurping attacks. 680-685 - Xiaochao Zi, Lihong Yao, Li Pan, Jianhua Li:
Implementing a passive network covert timing channel. 686-696 - M. Francisca Hinarejos
, Jose L. Muñoz
, Jordi Forné
, Oscar Esparza
:
PREON: An efficient cascade revocation mechanism for delegation paths. 697-711 - Gina C. Tjhai, Steven Furnell
, Maria Papadaki
, Nathan L. Clarke
:
A preliminary two-stage alarm correlation and filtering system using SOM neural network and K-means algorithm. 712-723
Volume 29, Number 7, October 2010
- Eugene H. Spafford
:
Editorial. 729-730 - Anthonie B. Ruighaver, Sean B. Maynard
, Matthew J. Warren
:
Ethical decision making: Improving the quality of acceptable use policies. 731-736 - Francesco Palmieri
, Ugo Fiore
:
Network anomaly detection through nonlinear analysis. 737-755 - Nitesh B. Guinde, Sotirios G. Ziavras
:
Efficient hardware support for pattern matching in network intrusion detection. 756-769 - Jaime A. Pavlich-Mariscal
, Steven A. Demurjian, Laurent D. Michel:
A framework for security assurance of access control enforcement code. 770-784 - Anthony J. Palmer:
Approach for selecting the most suitable Automated Personal Identification Mechanism (ASMSA). 785-806
Volume 29, Number 8, November 2010
- Eugene H. Spafford
:
Security, technology, publishing, and ethics (Part I). 813-814 - Jinpeng Wei, Calton Pu:
Modeling and preventing TOCTTOU vulnerabilities in Unix-style file systems. 815-830 - Michael Workman:
A behaviorist perspective on corporate harassment online: Validation of a theoretical model of psychological motives. 831-839 - Elmarie Kritzinger
, Sebastiaan H. von Solms:
Cyber security for home users: A new way of protection through awareness enforcement. 840-847 - Claudio A. Ardagna
, Sabrina De Capitani di Vimercati
, Sara Foresti
, Tyrone Grandison
, Sushil Jajodia
, Pierangela Samarati
:
Access control for smarter healthcare using policy spaces. 848-858 - Ioanna Kantzavelou
, Sokratis K. Katsikas
:
A game-based intrusion detection mechanism to confront internal attackers. 859-874 - Javier Herranz
, Stan Matwin
, Jordi Nin
, Vicenç Torra
:
Classifying data from protected statistical datasets. 875-890 - Fred Cohen:
A method for forensic analysis of control. 891-902

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.