


default search action
Computers & Security, Volume 32
Volume 32, February 2013
- Nerea Toledo

, Marivi Higuero
, Jasone Astorga
, Marina Aguado
, Jean-Marie Bonnin:
Design and formal security evaluation of NeMHIP: A new secure and efficient network mobility management protocol based on the Host Identity Protocol. 1-18 - Andreas U. Schmidt, Andreas Leicher, Andreas Brett, Yogendra Shah, Inhyok Cha:

Tree-formed verification data for trusted platforms. 19-35 - Hailun Tan, Diethelm Ostry, John Zic

, Sanjay K. Jha
:
A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks. 36-55 - Simson L. Garfinkel

:
Digital media triage with bulk data analysis and bulk_extractor. 56-72 - Kamil Reddy, Hein S. Venter

:
The architecture of a digital forensic readiness management system. 73-89 - Robert E. Crossler

, Allen C. Johnston, Paul Benjamin Lowry, Qing Hu, Merrill Warkentin
, Richard L. Baskerville
:
Future directions for behavioral information security research. 90-101 - Dimitrios Damopoulos, Georgios Kambourakis

, Stefanos Gritzalis
:
From keyloggers to touchloggers: Take the rough with the smooth. 102-114 - Ioana Lasc, Reiner Dojen, Tom Coffey:

On the detection of desynchronisation attacks against security protocols that use dynamic shared secrets. 115-129 - Jared D. DeMott, Richard J. Enbody, William F. Punch:

Systematic bug finding and fault localization enhanced with input data tracking. 130-157 - Shuzhen Wang, Zonghua Zhang

, Youki Kadobayashi:
Exploring attack graph for cost-benefit security hardening: A probabilistic approach. 158-169 - Rui Joaquim, Paulo Ferreira

, Carlos Ribeiro
:
EVIV: An end-to-end verifiable Internet voting system. 170-191 - Daniel Lerch-Hostalot

, David Megías
:
LSB matching steganalysis based on patterns of pixel differences and random embedding. 192-206 - Alois Paulin, Tatjana Welzer:

A universal system for fair non-repudiable certified e-mail without a trusted third party. 207-218 - Z. Cliffe Schreuders, Tanya Jane McGill

, Christian Payne:
The state of the art of application restrictions and sandboxes: A survey of application-oriented access controls and their shortfalls. 219-241 - Ken H. Guo:

Security-related behavior in using information systems in the workplace: A review and synthesis. 242-251 - Ravi Chandra Jammalamadaka, Roberto Gamboni, Sharad Mehrotra, Kent E. Seamons

, Nalini Venkatasubramanian:
A middleware approach for outsourcing data securely. 252-266 - Yannis Soupionis, Dimitris Gritzalis:

Hacking VoIP. 267 - Miltiadis Kandias, Dimitris Gritzalis:

Metasploit the Penetration Tester's Guide. 268-269

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














