


default search action
Handbook of Information and Communication Security 2010
- Peter P. Stavroulakis, Mark Stamp

:
Handbook of Information and Communication Security. Springer 2010, ISBN 978-3-642-04116-7
Fundamentals and Cryptography
- Clark D. Thomborson

:
A Framework for System Security. 3-20 - Jonathan Katz:

Public-Key Cryptography. 21-34 - David Jao:

Elliptic Curve Cryptography. 35-57 - Praveen Gauravaram, Lars R. Knudsen:

Cryptographic Hash Functions. 59-79 - Christopher Swenson:

Block Cipher Cryptanalysis. 81-89 - Jerzy Pejas

, Adrian Skrobek:
Chaos-Based Information Security. 91-128 - Kai Xi, Jiankun Hu:

Bio-Cryptography. 129-157 - Christian Monyk:

Quantum Cryptography. 159-174
Intrusion Detection and Access Control
- Karen Scarfone

, Peter Mell
:
Intrusion Detection and Prevention Systems. 177-192 - Bazara I. A. Barry, H. Anthony Chan:

Intrusion Detection Systems. 193-205 - Inderjeet Pabla, Ibrahim Khalil, Jiankun Hu:

Intranet Security via Firewalls. 207-219 - Himanshu Singh, Robert Chun:

Distributed Port Scan Detection. 221-234 - Jiankun Hu:

Host-Based Anomaly Intrusion Detection. 235-255 - Neerja Bhatnagar:

Security in Relational Databases. 257-272 - Alessandro Basso, Francesco Bergadano:

Anti-bot Strategies Based on Human Interactive Proofs. 273-291 - Maurizio Colombo, Aliaksandr Lazouski, Fabio Martinelli, Paolo Mori:

Access and Usage Control in Grid Systems. 293-308 - Fahim K. Sufi

, Ibrahim Khalil, Jiankun Hu:
ECG-Based Authentication. 309-331
Networking
- Ping Wang, Baber Aslam, Cliff Changchun Zou:

Peer-to-Peer Botnets. 335-350 - Theodosis Dimitrakos, David Brossard, Pierre de Leusse, Srijith K. Nair:

Security of Service Networks. 351-382 - Abdun Naser Mahmood, Christopher Leckie, Jiankun Hu, Zahir Tari, Mohammed Atiquzzaman:

Network Traffic Analysis and SCADA Security. 383-405 - Melody Moh, Ji Li:

Mobile Ad Hoc Network Routing. 407-420 - Nikos Komninos

, Dimitrios D. Vergados, Christos Douligeris:
Security for Ad Hoc Networks. 421-432 - Zulfikar Ramzan:

Phishing Attacks and Countermeasures. 433-448
Optical Networking
- Alexandre Locquet

:
Chaos-Based Secure Optical Communications Using Semiconductor Lasers. 451-478 - Apostolos Argyris, Dimitris Syvridis:

Chaos Applications in Optical Communications. 479-510
Wireless Networking
- Kashif Kifayat, Madjid Merabti, Qi Shi

, David Llewellyn-Jones:
Security in Wireless Sensor Networks. 513-552 - Jamil Ibriq, Imad Mahgoub, Mohammad Ilyas:

Secure Routing in Wireless Sensor Networks. 553-578 - Chih-fan Hsin:

Security via Surveillance and Monitoring. 579-602 - Konstantinos Birkos, Theofilos Chrysikos, Stavros Kotsopoulos, Ioannis A. Maniatis:

Security and Quality of Service in Wireless Networks. 603-630
Software
- Úlfar Erlingsson, Yves Younan, Frank Piessens:

Low-Level Software Security by Example. 633-658 - Teodoro Cipresso, Mark Stamp:

Software Reverse Engineering. 659-696 - Antonio Lioy, Gianluca Ramunno:

Trusted Computing. 697-717 - Zheng Yan:

Security via Trusted Communications. 719-746 - Eric Filiol

:
Viruses and Malware. 747-769 - Thomas H. Austin:

Designing a Secure Programming Language. 771-785
Forensics and Legal Issues
- Frederick B. Cohen:

Fundamentals of Digital Forensic Evidence. 789-808 - Shiguo Lian, Yan Zhang:

Multimedia Forensics for Detecting Forgeries. 809-828 - Peter P. Stavroulakis:

Technological and Legal Aspects of CIS. 829-850

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














