


default search action
Computers & Security, Volume 24
Volume 24, Number 1, February 2005
- Security views: Malware update. Comput. Secur. 24(1): 1-9 (2005)

- Theodosios Tsiakis

, George Stephanides:
The concept of security and trust in electronic payments. 10-15 - Mariana Gerber, Rossouw von Solms:

Management of risk in the information age. 16-30 - Simon Hansman, Ray Hunt:

A taxonomy of network and computer attacks. 31-43 - Tianjie Cao

, Dongdai Lin, Rui Xue:
A randomized RSA-based partially blind signature scheme for electronic cash. 44-49 - Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo:

An improvement of Hwang-Lee-Tang's simple remote user authentication scheme. 50-56 - Yacine Challal

, Abdelmadjid Bouabdallah, Hatem Bettahar:
H2A: Hybrid Hash-chaining scheme for Adaptive multicast source authentication of media-streaming. 57-68 - Kerry-Lynn Thomson

, Rossouw von Solms:
Information security obedience: a definition. 69-75 - Ruishan Zhang, Kefei Chen:

Improvements on the WTLS protocol to avoid denial of service attacks. 76-82 - Che Wun Chiou, Chiou-Yng Lee

:
Multiplexer-based double-exponentiation for normal basis of GF(2m). 83-86
Volume 24, Number 2, March 2005
- E. Eugene Schultz:

Search engines: a growing contributor to security risk. 87-88 - E. Eugene Schultz:

Lycos crosses the line. 89-90 - Security views: Malware Update. Comput. Secur. 24(2): 91-98 (2005)

- Basie von Solms:

Information Security governance: COBIT or ISO 17799 or both? 99-104 - Theodosios Tsiakis

, George Stephanides:
The economic approach of information security. 105-108 - John Marchesini, Sean W. Smith, Meiyuan Zhao:

Keyjacking: the surprising insecurity of client-side SSL. 109-123 - Jeffrey M. Stanton

, Kathryn R. Stam, Paul Mastrangelo, Jeffrey Jolton:
Analysis of end user security behaviors. 124-133 - Shyh-Yih Wang, Chi-Sung Laih:

Cryptanalyses of two key assignment schemes based on polynomial interpolations. 134-138 - Francesco Bergadano

, Davide Cavagnino:
Dealing with packet loss in the Interactive Chained Stream Authentication protocol. 139-146 - Bilge Karabacak

, Ibrahim Sogukpinar
:
ISRAM: information security risk analysis method. 147-159 - Han-Sung Kim, Sung Deok Cha:

Empirical evaluation of SVM-based masquerade detection using UNIX commands. 160-168 - Rui Jiang, Li Pan, Jianhua Li:

An improvement on efficient anonymous auction protocols. 169-174
Volume 24, Number 3, May 2005
- E. Eugene Schultz:

Security dilemmas with Microsoft's Internet Explorer. 175-176 - Security views - Malware update. Comput. Secur. 24(3): 177-187 (2005)

- Smart card based authentication - any future? Comput. Secur. 24(3): 188-191 (2005)

- Almut Herzog, Nahid Shahmehri:

Performance of the Java security manager. 192-207 - Faisal Nabi:

Secure business application logic for e-commerce systems. 208-217 - Xiu-Zhen Chen, Qing-Hua Zheng, Xiaohong Guan, Chen-Guang Lin, Jie Sun:

Multiple behavior information fusion based quantitative threat evaluation. 218-231 - Konstantinos Rantos

, Chris J. Mitchell
:
Matching key recovery mechanisms to business requirements. 232-245 - Maria Karyda

, Evangelos A. Kiountouzis, Spyros Kokolakis:
Information systems security policies: a contextual perspective. 246-260
Volume 24, Number 4, June 2005
- E. Eugene Schultz:

Personal information compromises: It is time for the U.S. Government to wake up. 261-262 - Security views. Comput. Secur. 24(4): 263-270 (2005)

- Basie von Solms, Rossouw von Solms:

From information security to ... business security? 271-273 - Steven Furnell

:
Why users cannot use security. 274-279 - David B. Chang, Carl S. Young:

Infection dynamics on the Internet. 280-286 - Wenbao Jiang, Hua Song, Yiqi Dai:

Real-time intrusion detection for high-speed networks. 287-294 - Srilatha Chebrolu, Ajith Abraham, Johnson P. Thomas:

Feature deduction and ensemble design of intrusion detection systems. 295-307 - Rodolfo Villarroel

, Eduardo Fernández-Medina
, Mario Piattini
:
Secure information systems development - a survey and comparison. 308-321 - Giampaolo Bella

, Stefano Bistarelli
:
Information Assurance for security protocols. 322-333 - Sihan Qing, Weiping Wen:

A survey and trends on Internet worms. 334-346
Volume 24, Number 5, August 2005
- E. Eugene Schultz:

Non-infosec professionals in infosec? 347-348 - E. Eugene Schultz:

Security views. Comput. Secur. 24(5): 349-358 (2005) - Richard LeVine:

Technology evolution drives need for greater information technology security. 359-361 - Chris Andrew:

The five Ps of patch management: Is there a simple way for businesses to develop and deploy an advanced security patch management strategy? 362-363 - Alex Biryukov

, Joseph Lano, Bart Preneel:
Recent attacks on alleged SecurID and their practical implications. 364-370 - George Magklaras

, Steven Furnell
:
A preliminary model of end user sophistication for insider threat prediction in IT systems. 371-380 - Chou Chen Yang, Ren-Chiun Wang, Wei-Ting Liu:

Secure authentication scheme for session initiation protocol. 381-386 - Dipankar Dasgupta, Fabio A. González

, K. Yallapu, Jonatan Gómez, R. Yarramsettii:
CIDS: An agent-based intrusion detection system. 387-398 - Heba Kamal Aslan:

Two-level controllers hierarchy for a scalable and distributed multicast security protocol. 399-408 - Anat Hovav, John D'Arcy:

Capital market reaction to defective IT products: The case of computer viruses. 409-424
Volume 24, Number 6, September 2005
- E. Eugene Schultz:

The human factor in security. 425-426 - E. Eugene Schultz:

Security views. Comput. Secur. 24(6): 427-436 (2005) - C. Pollard:

Telecom fraud: The cost of doing nothing just went up. 437-439 - Steven A. Hofmeyr:

Host intrusion prevention: Part of the operating system or on top of the operating system? 440-442 - Basie von Solms:

Information Security Governance - Compliance management vs operational management. 443-447 - Terry L. Wiant:

Information security policy's impact on reporting security incidents. 448-459 - Hsien-Chu Wu, Chin-Chen Chang:

A novel digital image watermarking scheme based on the vector quantization technique. 460-471 - Marianthi Theoharidou

, Spyros Kokolakis, Maria Karyda
, Evangelos A. Kiountouzis:
The insider threat to information systems and the effectiveness of ISO17799. 472-484 - Wolfgang Fischer, Niels Lepperhoff:

Can critical infrastructures rely on the Internet? 485-491 - Philip Machanick

:
A distributed systems approach to secure Internet mail. 492-499 - Min-Shiang Hwang, Jung-Wen Lo, Chia-Hsin Liu:

Improvement on the flexible tree-based key management framework. 500-504
Volume 24, Number 7, October 2005
- E. Eugene Schultz:

Aligning disaster recovery and security incident response. 505-506 - Security views - Malware update. Comput. Secur. 24(7): 507-515 (2005)

- P. Foote, T. Neudenberger:

Beyond Sarbanes-Oxley compliance. 516-518 - Nathan L. Clarke

, Steven Furnell
:
Authentication of users on mobile telephones - A survey of attitudes and practices. 519-527 - Vaibhav Gowadia, Csilla Farkas, Marco Valtorta:

PAID: A Probabilistic Agent-Based Intrusion Detection system. 529-545 - Lawrence O'Gorman, Amit Bagga, Jon Louis Bentley:

Query-directed passwords. 546-560 - H. Chris Tseng, Benjamin Jack Culpepper:

Sinkhole intrusion in mobile ad hoc networks: The problem and some detection indicators. 561-570 - Fu-Yuan Lee, Shiuh-Pyng Shieh:

Defending against spoofed DDoS attacks with path fingerprint. 571-586
Volume 24, Number 8, November 2005
- E. Eugene Schultz:

Infosec certification: Which way do we turn from here? 587-588 - E. Eugene Schultz:

Security views. Comput. Secur. 24(8): 589-598 (2005) - Nathan Friess, Ryan Vogt, John Aycock:

Timing is everything. 599-603 - Stephen Flowerday

, Rossouw von Solms:
Real-time information integrity = system integrity + data integrity + continuous assurances. 604-613 - Haralambos Mouratidis

:
Safety and Security in Multiagent Systems: Report on the 2nd SASEMAS workshop (SASEMAS'05). 614-617 - Chun-I Fan, Yung-Cheng Chan, Zhi-Kai Zhang:

Robust remote authentication scheme with smart cards. 619-628 - Jun Jiang, Chen He, Ling-ge Jiang:

A novel mix-based location privacy mechanism in Mobile IPv6. 629-641 - Fabrizio Baiardi

, Alessandro Falleni, Riccardo Granchi, Fabio Martinelli, Marinella Petrocchi, Anna Vaccarelli:
SEAS, a secure e-voting protocol: Design and implementation. 642-652 - Chuan-Kun Wu:

Hash channels. 653-661 - Yun Wang:

A multinomial logistic regression modeling approach for anomaly intrusion detection. 662-674

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














