Volume 23,
Number 1,
February 2004
Volume 23,
Number 2,
March 2004
- E. Eugene Schultz:
Incident response teams need to change.
87-88
Electronic Edition (link) BibTeX
- Mohammad Peyravian, Allen Roginsky, Nevenko Zunic:
Non-PKI methods for public key distribution.
97-103
Electronic Edition (link) BibTeX
- Horng-Twu Liaw:
A secure electronic voting protocol for general elections.
107-119
Electronic Edition (link) BibTeX
- Tzong-Sun Wu, Chien-Lung Hsu:
Efficient user identification scheme with key distribution preserving anonymity for distributed computer networks.
120-125
Electronic Edition (link) BibTeX
- Chang-Joo Moon, Dae-Ha Park, Soung-Jin Park, Doo-Kwon Baik:
Symmetric RBAC model that takes the separation of duty and role hierarchies into consideration.
126-136
Electronic Edition (link) BibTeX
- Theodore Stergiou, Mark S. Leeson, Roger J. Green:
An alternative architectural framework to the OSI security model.
137-153
Electronic Edition (link) BibTeX
- Allister Cournane, Ray Hunt:
An analysis of the tools used for the generation and prevention of spam.
154-166
Electronic Edition (link) BibTeX
- Wen-Shenq Juang:
Efficient password authenticated key agreement using smart cards.
167-173
Electronic Edition (link) BibTeX
- Shiang-Feng Tzeng, Min-Shiang Hwang, Cheng-Ying Yang:
An improvement of nonrepudiable threshold proxy signature scheme with known signers.
174-178
Electronic Edition (link) BibTeX
Volume 23,
Number 3,
May 2004
- E. Eugene Schultz:
Worms and viruses: are we losing control?
179-180
Electronic Edition (link) BibTeX
- E. Eugene Schultz:
Security views.
181-190
Electronic Edition (link) BibTeX
- Cheryl Vroom, Rossouw von Solms:
Towards information security behavioural compliance.
191-198
Electronic Edition (link) BibTeX
- Min-Hui Lin, Chin-Chen Chang, Yan-Ren Chen:
A fair and secure mobile agent environment based on blind signature and proxy host.
199-212
Electronic Edition (link) BibTeX
- Charles Iheagwara:
The effect of intrusion detection management methods on the return on investment.
213-228
Electronic Edition (link) BibTeX
- Liehuang Zhu, Yuanda Cao, Dong Wang:
Digital signature of multicast streams secure against adaptive chosen message attack.
229-240
Electronic Edition (link) BibTeX
- Li Feng, Xiaohong Guan, Sangang Guo, Yan Gao, Peini Liu:
Predicting the intrusion intentions by observing system call sequences.
241-252
Electronic Edition (link) BibTeX
- Denis Besnard, Budi Arief:
Computer security impaired by legitimate users.
253-264
Electronic Edition (link) BibTeX
Volume 23,
Number 4,
June 2004
Volume 23,
Number 5,
July 2004
Volume 23,
Number 6,
September 2004
Volume 23,
Number 7,
October 2004
- E. Eugene Schultz:
The gap between cryptography and information security: has it narrowed?
531-532
Electronic Edition (link) BibTeX
- E. Eugene Schultz:
Security views.
533-541 BibTeX
- Steve Purser:
Improving the ROI of the security management process.
542-546
Electronic Edition (link) BibTeX
- Ming Li:
An approach to reliably identifying signs of DDOS flood attacks based on LRD traffic pattern recognition.
549-558
Electronic Edition (link) BibTeX
- Marijke Coetzee, Jan H. P. Eloff:
Towards Web Service access control.
559-570
Electronic Edition (link) BibTeX
- Tian-Fu Lee, Tzonelih Hwang, Chun-Li Lin:
Enhanced three-party encrypted key exchange without server public keys.
571-577
Electronic Edition (link) BibTeX
- Javier Lopez, Rolf Oppliger, Günther Pernul:
Authentication and authorization infrastructures (AAIs): a comparative survey.
578-590
Electronic Edition (link) BibTeX
- Jae-Myeong Jeon, Yon Dohn Chung, Myoung-Ho Kim, Yoon-Joon Lee:
Filtering XPath expressions for XML access control.
591-605
Electronic Edition (link) BibTeX
- Andrew Teoh Beng Jin, David Ngo Chek Ling, Alwyn Goh:
Personalised cryptographic key generation based on FaceHashing.
606-614
Electronic Edition (link) BibTeX
- Shin-Jia Hwang, Ching-Chung Chan:
Improvement on Li et al.'s generalization of proxy signature schemes.
615-619
Electronic Edition (link) BibTeX
Volume 23,
Number 8,
December 2004
- E. Eugene Schultz:
Is the U.S. government really getting serious about information security?
621-622
Electronic Edition (link) BibTeX
- Sebastiaan H. von Solms, Emil Marais:
From secure wired networks to secure wireless networks - what are the extra risks?
633-637
Electronic Edition (link) BibTeX
- Shaun Posthumus, Rossouw von Solms:
A framework for the governance of information security.
638-646
Electronic Edition (link) BibTeX
- Axelle Apvrille, Makan Pourzandi:
XML distributed security policy for clusters.
649-658
Electronic Edition (link) BibTeX
- Cungang Yang, Celia Li:
Access control in a hierarchy using one-way hash functions.
659-664
Electronic Edition (link) BibTeX
- Li-Chiou Chen, Thomas A. Longstaff, Kathleen M. Carley:
Characterization of defense mechanisms against distributed denial of service attacks.
665-678
Electronic Edition (link) BibTeX
- Afzel Noore, Nikhil Tungala, Max M. Houck:
Embedding biometric identifiers in 2D barcodes for improved security.
679-686
Electronic Edition (link) BibTeX
- Rachid Beghdad:
Modelling and solving the intrusion detection problem in computer networks.
687-696
Electronic Edition (link) BibTeX
- Yanjiang Yang, Shuhong Wang, Feng Bao, Jie Wang, Robert H. Deng:
New efficient user identification and key distribution scheme providing enhanced security.
697-704
Electronic Edition (link) BibTeX
- Heba Kamal Aslan:
A hybrid scheme for multicast authentication over lossy networks.
705-713
Electronic Edition (link) BibTeX
Copyright © Sat May 16 23:53:41 2009
by Michael Ley (ley@uni-trier.de)