default search action
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), Volume 5
Volume 5, Number 1, March 2014
- Fang-Yie Leu, A Min Tjoa:
Guest Editorial: Emerging Software Reliability and System Security Technologies. 1-3 - Thanh-Trung Pham, François Bonnet, Xavier Défago:
Reliability Prediction for Component-based Software Systems with Architectural-level Fault Tolerance Mechanisms (Extended Version). 4-36 - Kristian Beckers, Maritta Heisel, Denis Hatebur:
Supporting Common Criteria Security Analysis with Problem Frames. 37-63 - Iulian Goriac:
Plausibilistic Entropy and Anonymity. 64-83 - Johannes Götzfried, Tilo Müller:
Analysing Android's Full Disk Encryption Feature. 84-100 - Benjamin Aziz, Geoff W. Hamilton:
Enforcing Reputation Constraints on Business Process Workflows. 101-121 - Sangeetha Jose, Akash Gautam, Chandrasekaran Pandu Rangan:
A New Certificateless Blind Signature Scheme. 122-141
Volume 5, Number 2, June 2014
- William R. Claycomb, Philip A. Legg, Dieter Gollmann:
Guest Editorial: Emerging Trends in Research for Insider Threat Detection. 1-6 - David A. Mundie, Samuel J. Perl, Carly Huth J. D.:
Insider Threat Defined: Discovering the Prototypical Case. 7-23 - Alexander D. Kent, Lorie M. Liebrock, James Wernicke:
Differentiating User Authentication Graphs. 24-38 - Hoda Eldardiry, Kumar Sricharan, Juan Liu, John Hanley, Bob Price, Oliver Brdiczka, Eugene Bart:
Multi-source fusion for anomaly detection: using across-domain and across-time peer-group consistency checks. 39-58 - Florian Kammüller, Christian W. Probst:
Invalidating Policies using Structural Information. 59-79 - Brian Lindauer, Joshua Glasser, Mitch Rosen, Kurt C. Wallnau:
Generating Test Data for Insider Threat Detectors. 80-94
Volume 5, Number 3, September 2014
- Ilsun You:
Editorial. 1-2 - Takanori Yasuda, Tsuyoshi Takagi, Kouichi Sakurai:
Efficient variant of Rainbow using sparse secret keys. 3-13 - Igor V. Kotenko, Elena Doynikova:
Evaluation of Computer Network Security based on Attack Graphs and Security Event Processing. 14-29 - Kurt Stenzel, Kuzman Katkalov, Marian Borek, Wolfgang Reif:
A Model-Driven Approach to Noninterference. 30-43 - Christoph Hochreiner, Peter Frühwirt, Zhendong Ma, Peter Kieseberg, Sebastian Schrittwieser, Edgar R. Weippl:
Genie in a Model? Why Model Driven Security will not secure your Web Application. 44-62 - Tomoya Tanjo, Kazuhiro Minami, Ken Mano, Hiroshi Maruyama:
Evaluating data utility of privacy-preserving pseudonymized location datasets. 63-78 - Raihan Ul Islam, Mischa Schmidt, Hans-Joerg Kolbe, Karl Andersson:
Secure and Scalable Multimedia Sharing between Smart Homes. 79-93
Volume 5, Number 4, December 2014
- Ilsun You:
Editorial. 1-2 - Clémentine Gritti, Willy Susilo, Thomas Plantard, Kaitai Liang, Duncan S. Wong:
Empowering Personal Health Records with Cloud Computing: How to encrypt with forthcoming fine-grained policies efficiently. 3-28 - Sherenaz W. Al-Haj Baddar, Alessio Merlo, Mauro Migliardi:
Anomaly Detection in Computer Networks: A State-of-the-Art Review. 29-64 - Tapas Pandit, Rana Barua, Somanath Tripathy:
eCK Secure Single Round ID-based Authenticated Key Exchange Protocols with Master Perfect Forward Secrecy (Extended Version). 65-85 - Igor Saenko, Igor V. Kotenko:
Design of Virtual Local Area Network Scheme Based on Genetic Optimization and Visual Analysis. 86-102 - Alessandro Armando, Giantonio Chiarelli, Gabriele Costa, Gabriele De Maglie, Rocco Mammoliti, Alessio Merlo:
Mobile App Security Analysis with the MAVeriC Static Analysis Module. 103-119 - Kyoungjae Sun, Younghan Kim:
Flow Mobility Management in PMIPv6-based DMM (Distributed Mobility Management) Networks. 120-127
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.