default search action
Computers & Security, Volume 23
Volume 23, Number 1, February 2004
- E. Eugene Schultz:
Security training and awareness - fitting a square peg in a round hole. 1-2 - Marcus K. Rogers, Kate Seigfried:
The future of computer forensics: a needs analysis survey. 12-16 - Stuart King:
Applying application security standards - a case study. 17-21 - John Leach:
TBSE - an engineering approach to the design of accurate and reliable security systems. 22-28 - Ronald F. DeMara, Adam J. Rocke:
Mitigation of network tampering using dynamic dispatch of mobile agents. 31-42 - Soumyo D. Moitra, Suresh L. Konda:
An empirical investigation of network attacks on computer systems. 43-51 - Vinícius da Silveira Serafim, Raul Fernando Weber:
Restraining and repairing file system damage through file integrity control. 52-62 - Albin Zuccato:
Holistic security requirement engineering for electronic commerce. 63-76 - Janusz Szczepanski, Elek Wajnryb, José M. Amigó, Maria V. Sanchez-Vives, Mel Slater:
Biometric random number generators. 77-84 - Brian McKenna:
Erratum to "Attacks on the (enhanced) Yang-Shieh authentication" [Comput Secur 22(8) (2003) 725-727]. 85
Volume 23, Number 2, March 2004
- E. Eugene Schultz:
Incident response teams need to change. 87-88 - Mohammad Peyravian, Allen Roginsky, Nevenko Zunic:
Non-PKI methods for public key distribution. 97-103 - Horng-Twu Liaw:
A secure electronic voting protocol for general elections. 107-119 - Tzong-Sun Wu, Chien-Lung Hsu:
Efficient user identification scheme with key distribution preserving anonymity for distributed computer networks. 120-125 - Chang-Joo Moon, Dae-Ha Park, Soung-Jin Park, Doo-Kwon Baik:
Symmetric RBAC model that takes the separation of duty and role hierarchies into consideration. 126-136 - Theodore Stergiou, Mark S. Leeson, Roger J. Green:
An alternative architectural framework to the OSI security model. 137-153 - Allister Cournane, Ray Hunt:
An analysis of the tools used for the generation and prevention of spam. 154-166 - Wen-Shenq Juang:
Efficient password authenticated key agreement using smart cards. 167-173 - Shiang-Feng Tzeng, Min-Shiang Hwang, Cheng-Ying Yang:
An improvement of nonrepudiable threshold proxy signature scheme with known signers. 174-178
Volume 23, Number 3, May 2004
- E. Eugene Schultz:
Worms and viruses: are we losing control? 179-180 - E. Eugene Schultz:
Security views. 181-190 - Cheryl Vroom, Rossouw von Solms:
Towards information security behavioural compliance. 191-198 - Min-Hui Lin, Chin-Chen Chang, Yan-Ren Chen:
A fair and secure mobile agent environment based on blind signature and proxy host. 199-212 - Charles Iheagwara:
The effect of intrusion detection management methods on the return on investment. 213-228 - Liehuang Zhu, Yuanda Cao, Dong Wang:
Digital signature of multicast streams secure against adaptive chosen message attack. 229-240 - Li Feng, Xiaohong Guan, Sangang Guo, Yan Gao, Peini Liu:
Predicting the intrusion intentions by observing system call sequences. 241-252 - Denis Besnard, Budi Arief:
Computer security impaired by legitimate users. 253-264
Volume 23, Number 4, June 2004
- E. Eugene Schultz:
Intrusion prevention. 265-266 - E. Eugene Schultz:
Security views. 267-274 - Rossouw von Solms, Sebastiaan H. von Solms:
From policies to culture. 275-279 - Ji Hu, Christoph Meinel:
Tele-Lab "IT-Security" on CD: portable, reliable and safe IT security training. 282-289 - Heba Kamal Aslan:
Logical analysis of AUTHMAC_DH: a new protocol for authentication and key distribution. 290-299 - Victoria Ungureanu:
Formal support for certificate management policies. 300-311 - Sanghyun Cho, Sung Deok Cha:
SAD: web session anomaly detection based on parameter estimation. 312-319 - Heba Kamal Aslan:
A scalable and distributed multicast security protocol using a subgroup-key hierarchy. 320-329 - Yu-Yi Chen, Jinn-ke Jan, Chin-Ling Chen:
The design of a secure anonymous Internet voting system. 330-337 - Yougang Song, Brett D. Fleisch:
Rico: a security proxy for mobile code. 338-351
Volume 23, Number 5, July 2004
- E. Eugene Schultz:
Sarbanes-Oxley - a huge boon to information security in the US. 353-354 - E. Eugene Schultz:
Security views. 355-361 - Andrew Stewart:
On risk: perception and direction. 362-370 - Sebastiaan H. von Solms, Rossouw von Solms:
The 10 deadly sins of information security management. 371-376 - Hassan Aljifri, Diego Sánchez Navarro:
Search engines and privacy. 379-388 - Tzer-Shyong Chen:
An English auction scheme in the online transaction environment. 389-399 - David L. Baumer, Julia Brande Earp, J. C. Poindexter:
Internet privacy law: a comparison between the United States and the European Union. 400-412 - Dimitrios Lekkas, Dimitris Gritzalis:
Cumulative notarization for long-term preservation of digital signatures. 413-424 - Chou Chen Yang, Ren-Chiun Wang:
Cryptanalysis of a user friendly remote authentication scheme with smart cards. 425-427 - Enzhe Yu, Sungzoon Cho:
Keystroke dynamics identity verification - its problems and practical solutions. 428-440
Volume 23, Number 6, September 2004
- E. Eugene Schultz:
The case for one-time credentials. 441-442 - Steven A. Hofmeyr:
The implications of immunology for secure systems design. 453-455 - Avishai Wool:
The use and usability of direction-based filtering in firewalls. 459-468 - Rui Jiang, Li Pan, Jianhua Li:
Further analysis of password authentication schemes based on authentication tests. 469-477 - Hassan Artail:
Peer-assisted carrying authentication (PACA). 478-488 - H. S. Venter, Jan H. P. Eloff:
Vulnerability forecasting - a conceptual model. 489-497 - Gwan-Hwan Hwang, Tao-Ku Chang:
An operational model and language support for securing XML documents. 498-529
Volume 23, Number 7, October 2004
- E. Eugene Schultz:
The gap between cryptography and information security: has it narrowed? 531-532 - E. Eugene Schultz:
Security views. Comput. Secur. 23(7): 533-541 (2004) - Steve Purser:
Improving the ROI of the security management process. 542-546 - Ming Li:
An approach to reliably identifying signs of DDOS flood attacks based on LRD traffic pattern recognition. 549-558 - Marijke Coetzee, Jan H. P. Eloff:
Towards Web Service access control. 559-570 - Tian-Fu Lee, Tzonelih Hwang, Chun-Li Lin:
Enhanced three-party encrypted key exchange without server public keys. 571-577 - Javier López, Rolf Oppliger, Günther Pernul:
Authentication and authorization infrastructures (AAIs): a comparative survey. 578-590 - Jae-Myeong Jeon, Yon Dohn Chung, Myoung-Ho Kim, Yoon-Joon Lee:
Filtering XPath expressions for XML access control. 591-605 - Andrew Teoh Beng Jin, David Ngo Chek Ling, Alwyn Goh:
Personalised cryptographic key generation based on FaceHashing. 606-614 - Shin-Jia Hwang, Ching-Chung Chan:
Improvement on Li et al.'s generalization of proxy signature schemes. 615-619
Volume 23, Number 8, December 2004
- E. Eugene Schultz:
Is the U.S. government really getting serious about information security? 621-622 - Sebastiaan H. von Solms, Emil Marais:
From secure wired networks to secure wireless networks - what are the extra risks? 633-637 - Shaun Posthumus, Rossouw von Solms:
A framework for the governance of information security. 638-646 - Axelle Apvrille, Makan Pourzandi:
XML distributed security policy for clusters. 649-658 - Cungang Yang, Celia Li:
Access control in a hierarchy using one-way hash functions. 659-664 - Li-Chiou Chen, Thomas A. Longstaff, Kathleen M. Carley:
Characterization of defense mechanisms against distributed denial of service attacks. 665-678 - Afzel Noore, Nikhil Tungala, Max M. Houck:
Embedding biometric identifiers in 2D barcodes for improved security. 679-686 - Rachid Beghdad:
Modelling and solving the intrusion detection problem in computer networks. 687-696 - Yanjiang Yang, Shuhong Wang, Feng Bao, Jie Wang, Robert H. Deng:
New efficient user identification and key distribution scheme providing enhanced security. 697-704 - Heba Kamal Aslan:
A hybrid scheme for multicast authentication over lossy networks. 705-713
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.