


default search action
Computers & Security, Volume 23
Volume 23, Number 1, February 2004
- E. Eugene Schultz:

Security training and awareness - fitting a square peg in a round hole. 1-2 - Marcus K. Rogers

, Kate Seigfried:
The future of computer forensics: a needs analysis survey. 12-16 - Stuart King:

Applying application security standards - a case study. 17-21 - John Leach:

TBSE - an engineering approach to the design of accurate and reliable security systems. 22-28 - Ronald F. DeMara

, Adam J. Rocke:
Mitigation of network tampering using dynamic dispatch of mobile agents. 31-42 - Soumyo D. Moitra, Suresh L. Konda:

An empirical investigation of network attacks on computer systems. 43-51 - Vinícius da Silveira Serafim, Raul Fernando Weber:

Restraining and repairing file system damage through file integrity control. 52-62 - Albin Zuccato:

Holistic security requirement engineering for electronic commerce. 63-76 - Janusz Szczepanski

, Elek Wajnryb, José M. Amigó
, Maria V. Sanchez-Vives, Mel Slater
:
Biometric random number generators. 77-84 - Brian McKenna:

Erratum to "Attacks on the (enhanced) Yang-Shieh authentication" [Comput Secur 22(8) (2003) 725-727]. 85
Volume 23, Number 2, March 2004
- E. Eugene Schultz:

Incident response teams need to change. 87-88 - Mohammad Peyravian, Allen Roginsky, Nevenko Zunic:

Non-PKI methods for public key distribution. 97-103 - Horng-Twu Liaw:

A secure electronic voting protocol for general elections. 107-119 - Tzong-Sun Wu, Chien-Lung Hsu:

Efficient user identification scheme with key distribution preserving anonymity for distributed computer networks. 120-125 - Chang-Joo Moon

, Dae-Ha Park, Soung-Jin Park, Doo-Kwon Baik:
Symmetric RBAC model that takes the separation of duty and role hierarchies into consideration. 126-136 - Theodore Stergiou, Mark S. Leeson

, Roger J. Green:
An alternative architectural framework to the OSI security model. 137-153 - Allister Cournane, Ray Hunt:

An analysis of the tools used for the generation and prevention of spam. 154-166 - Wen-Shenq Juang:

Efficient password authenticated key agreement using smart cards. 167-173 - Shiang-Feng Tzeng, Min-Shiang Hwang, Cheng-Ying Yang:

An improvement of nonrepudiable threshold proxy signature scheme with known signers. 174-178
Volume 23, Number 3, May 2004
- E. Eugene Schultz:

Worms and viruses: are we losing control? 179-180 - E. Eugene Schultz:

Security views. 181-190 - Cheryl Vroom, Rossouw von Solms:

Towards information security behavioural compliance. 191-198 - Min-Hui Lin

, Chin-Chen Chang, Yan-Ren Chen:
A fair and secure mobile agent environment based on blind signature and proxy host. 199-212 - Charles Iheagwara:

The effect of intrusion detection management methods on the return on investment. 213-228 - Liehuang Zhu, Yuanda Cao, Dong Wang:

Digital signature of multicast streams secure against adaptive chosen message attack. 229-240 - Li Feng

, Xiaohong Guan, Sangang Guo, Yan Gao, Peini Liu:
Predicting the intrusion intentions by observing system call sequences. 241-252 - Denis Besnard, Budi Arief

:
Computer security impaired by legitimate users. 253-264
Volume 23, Number 4, June 2004
- E. Eugene Schultz:

Intrusion prevention. 265-266 - E. Eugene Schultz:

Security views. 267-274 - Rossouw von Solms, Sebastiaan H. von Solms:

From policies to culture. 275-279 - Ji Hu, Christoph Meinel:

Tele-Lab "IT-Security" on CD: portable, reliable and safe IT security training. 282-289 - Heba Kamal Aslan:

Logical analysis of AUTHMAC_DH: a new protocol for authentication and key distribution. 290-299 - Victoria Ungureanu:

Formal support for certificate management policies. 300-311 - Sanghyun Cho, Sung Deok Cha:

SAD: web session anomaly detection based on parameter estimation. 312-319 - Heba Kamal Aslan:

A scalable and distributed multicast security protocol using a subgroup-key hierarchy. 320-329 - Yu-Yi Chen, Jinn-ke Jan, Chin-Ling Chen:

The design of a secure anonymous Internet voting system. 330-337 - Yougang Song, Brett D. Fleisch:

Rico: a security proxy for mobile code. 338-351
Volume 23, Number 5, July 2004
- E. Eugene Schultz:

Sarbanes-Oxley - a huge boon to information security in the US. 353-354 - E. Eugene Schultz:

Security views. 355-361 - Andrew Stewart

:
On risk: perception and direction. 362-370 - Sebastiaan H. von Solms, Rossouw von Solms:

The 10 deadly sins of information security management. 371-376 - Hassan Aljifri, Diego Sánchez Navarro:

Search engines and privacy. 379-388 - Tzer-Shyong Chen

:
An English auction scheme in the online transaction environment. 389-399 - David L. Baumer, Julia Brande Earp, J. C. Poindexter:

Internet privacy law: a comparison between the United States and the European Union. 400-412 - Dimitrios Lekkas, Dimitris Gritzalis:

Cumulative notarization for long-term preservation of digital signatures. 413-424 - Chou Chen Yang, Ren-Chiun Wang:

Cryptanalysis of a user friendly remote authentication scheme with smart cards. 425-427 - Enzhe Yu, Sungzoon Cho:

Keystroke dynamics identity verification - its problems and practical solutions. 428-440
Volume 23, Number 6, September 2004
- E. Eugene Schultz:

The case for one-time credentials. 441-442 - Steven A. Hofmeyr:

The implications of immunology for secure systems design. 453-455 - Avishai Wool

:
The use and usability of direction-based filtering in firewalls. 459-468 - Rui Jiang, Li Pan, Jianhua Li:

Further analysis of password authentication schemes based on authentication tests. 469-477 - Hassan Artail:

Peer-assisted carrying authentication (PACA). 478-488 - H. S. Venter

, Jan H. P. Eloff:
Vulnerability forecasting - a conceptual model. 489-497 - Gwan-Hwan Hwang, Tao-Ku Chang

:
An operational model and language support for securing XML documents. 498-529
Volume 23, Number 7, October 2004
- E. Eugene Schultz:

The gap between cryptography and information security: has it narrowed? 531-532 - E. Eugene Schultz:

Security views. Comput. Secur. 23(7): 533-541 (2004) - Steve Purser:

Improving the ROI of the security management process. 542-546 - Ming Li

:
An approach to reliably identifying signs of DDOS flood attacks based on LRD traffic pattern recognition. 549-558 - Marijke Coetzee

, Jan H. P. Eloff:
Towards Web Service access control. 559-570 - Tian-Fu Lee, Tzonelih Hwang, Chun-Li Lin:

Enhanced three-party encrypted key exchange without server public keys. 571-577 - Javier López

, Rolf Oppliger, Günther Pernul:
Authentication and authorization infrastructures (AAIs): a comparative survey. 578-590 - Jae-Myeong Jeon, Yon Dohn Chung, Myoung-Ho Kim, Yoon-Joon Lee:

Filtering XPath expressions for XML access control. 591-605 - Andrew Teoh Beng Jin

, David Ngo Chek Ling, Alwyn Goh:
Personalised cryptographic key generation based on FaceHashing. 606-614 - Shin-Jia Hwang, Ching-Chung Chan:

Improvement on Li et al.'s generalization of proxy signature schemes. 615-619
Volume 23, Number 8, December 2004
- E. Eugene Schultz:

Is the U.S. government really getting serious about information security? 621-622 - Sebastiaan H. von Solms, Emil Marais:

From secure wired networks to secure wireless networks - what are the extra risks? 633-637 - Shaun Posthumus, Rossouw von Solms:

A framework for the governance of information security. 638-646 - Axelle Apvrille, Makan Pourzandi:

XML distributed security policy for clusters. 649-658 - Cungang Yang, Celia Li:

Access control in a hierarchy using one-way hash functions. 659-664 - Li-Chiou Chen, Thomas A. Longstaff, Kathleen M. Carley

:
Characterization of defense mechanisms against distributed denial of service attacks. 665-678 - Afzel Noore, Nikhil Tungala, Max M. Houck

:
Embedding biometric identifiers in 2D barcodes for improved security. 679-686 - Rachid Beghdad

:
Modelling and solving the intrusion detection problem in computer networks. 687-696 - Yanjiang Yang, Shuhong Wang, Feng Bao, Jie Wang, Robert H. Deng

:
New efficient user identification and key distribution scheme providing enhanced security. 697-704 - Heba Kamal Aslan:

A hybrid scheme for multicast authentication over lossy networks. 705-713

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














