Volume 24,
Number 1,
February 2005
- Security views: Malware update.
1-9 BibTeX
- Theodosios Tsiakis, George Stephanides:
The concept of security and trust in electronic payments.
10-15
Electronic Edition (link) BibTeX
- Mariana Gerber, Rossouw von Solms:
Management of risk in the information age.
16-30
Electronic Edition (link) BibTeX
- Simon Hansman, Ray Hunt:
A taxonomy of network and computer attacks.
31-43
Electronic Edition (link) BibTeX
- Tianjie Cao, Dongdai Lin, Rui Xue:
A randomized RSA-based partially blind signature scheme for electronic cash.
44-49
Electronic Edition (link) BibTeX
- Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo:
An improvement of Hwang-Lee-Tang's simple remote user authentication scheme.
50-56
Electronic Edition (link) BibTeX
- Yacine Challal, Abdelmadjid Bouabdallah, Hatem Bettahar:
H2A: Hybrid Hash-chaining scheme for Adaptive multicast source authentication of media-streaming.
57-68
Electronic Edition (link) BibTeX
- Kerry-Lynn Thomson, Rossouw von Solms:
Information security obedience: a definition.
69-75
Electronic Edition (link) BibTeX
- Ruishan Zhang, Kefei Chen:
Improvements on the WTLS protocol to avoid denial of service attacks.
76-82
Electronic Edition (link) BibTeX
- Che Wun Chiou, Chiou-Yng Lee:
Multiplexer-based double-exponentiation for normal basis of GF(2m).
83-86
Electronic Edition (link) BibTeX
Volume 24,
Number 2,
March 2005
- E. Eugene Schultz:
Search engines: a growing contributor to security risk.
87-88
Electronic Edition (link) BibTeX
- E. Eugene Schultz:
Lycos crosses the line.
89-90
Electronic Edition (link) BibTeX
- Security views: Malware Update.
91-98 BibTeX
- Basie von Solms:
Information Security governance: COBIT or ISO 17799 or both?
99-104
Electronic Edition (link) BibTeX
- Theodosios Tsiakis, George Stephanides:
The economic approach of information security.
105-108
Electronic Edition (link) BibTeX
- John Marchesini, Sean W. Smith, Meiyuan Zhao:
Keyjacking: the surprising insecurity of client-side SSL.
109-123
Electronic Edition (link) BibTeX
- Jeffrey M. Stanton, Kathryn R. Stam, Paul Mastrangelo, Jeffrey Jolton:
Analysis of end user security behaviors.
124-133
Electronic Edition (link) BibTeX
- Shyh-Yih Wang, Chi-Sung Laih:
Cryptanalyses of two key assignment schemes based on polynomial interpolations.
134-138
Electronic Edition (link) BibTeX
- Francesco Bergadano, Davide Cavagnino:
Dealing with packet loss in the Interactive Chained Stream Authentication protocol.
139-146
Electronic Edition (link) BibTeX
- Bilge Karabacak, Ibrahim Sogukpinar:
ISRAM: information security risk analysis method.
147-159
Electronic Edition (link) BibTeX
- Han-Sung Kim, Sung Deok Cha:
Empirical evaluation of SVM-based masquerade detection using UNIX commands.
160-168
Electronic Edition (link) BibTeX
- Rui Jiang, Li Pan, Jian-Hua Li:
An improvement on efficient anonymous auction protocols.
169-174
Electronic Edition (link) BibTeX
Volume 24,
Number 3,
May 2005
Volume 24,
Number 4,
June 2005
- E. Eugene Schultz:
Personal information compromises: It is time for the U.S. Government to wake up.
261-262
Electronic Edition (link) BibTeX
- Security views.
263-270 BibTeX
- Basie von Solms, Rossouw von Solms:
From information security to ... business security?
271-273
Electronic Edition (link) BibTeX
- Steven Furnell:
Why users cannot use security.
274-279
Electronic Edition (link) BibTeX
- David B. Chang, Carl S. Young:
Infection dynamics on the Internet.
280-286
Electronic Edition (link) BibTeX
- Wenbao Jiang, Hua Song, Yiqi Dai:
Real-time intrusion detection for high-speed networks.
287-294
Electronic Edition (link) BibTeX
- Srilatha Chebrolu, Ajith Abraham, Johnson P. Thomas:
Feature deduction and ensemble design of intrusion detection systems.
295-307
Electronic Edition (link) BibTeX
- Rodolfo Villarroel, Eduardo Fernández-Medina, Mario Piattini:
Secure information systems development - a survey and comparison.
308-321
Electronic Edition (link) BibTeX
- Giampaolo Bella, Stefano Bistarelli:
Information Assurance for security protocols.
322-333
Electronic Edition (link) BibTeX
- Sihan Qing, Weiping Wen:
A survey and trends on Internet worms.
334-346
Electronic Edition (link) BibTeX
Volume 24,
Number 5,
August 2005
- E. Eugene Schultz:
Non-infosec professionals in infosec?
347-348
Electronic Edition (link) BibTeX
- E. Eugene Schultz:
Security views.
349-358 BibTeX
- Richard LeVine:
Technology evolution drives need for greater information technology security.
359-361
Electronic Edition (link) BibTeX
- C. Andrew:
The five Ps of patch management: Is there a simple way for businesses to develop and deploy an advanced security patch management strategy?
362-363
Electronic Edition (link) BibTeX
- Alex Biryukov, Joseph Lano, Bart Preneel:
Recent attacks on alleged SecurID and their practical implications.
364-370
Electronic Edition (link) BibTeX
- G. Magklaras, Steven Furnell:
A preliminary model of end user sophistication for insider threat prediction in IT systems.
371-380
Electronic Edition (link) BibTeX
- Chou Chen Yang, Ren-Chiun Wang, Wei-Ting Liu:
Secure authentication scheme for session initiation protocol.
381-386
Electronic Edition (link) BibTeX
- D. Dasgupta, F. Gonzalez, K. Yallapu, J. Gomez, R. Yarramsettii:
CIDS: An agent-based intrusion detection system.
387-398
Electronic Edition (link) BibTeX
- Heba Kamal Aslan:
Two-level controllers hierarchy for a scalable and distributed multicast security protocol.
399-408
Electronic Edition (link) BibTeX
- Anat Hovav, John D'Arcy:
Capital market reaction to defective IT products: The case of computer viruses.
409-424
Electronic Edition (link) BibTeX
Volume 24,
Number 6,
September 2005
Volume 24,
Number 7,
October 2005
Volume 24,
Number 8,
November 2005
- E. Eugene Schultz:
Infosec certification: Which way do we turn from here?
587-588
Electronic Edition (link) BibTeX
- E. Eugene Schultz:
Security views.
589-598 BibTeX
- Nathan Friess, Ryan Vogt, John Aycock:
Timing is everything.
599-603
Electronic Edition (link) BibTeX
- Stephen Flowerday, Rossouw von Solms:
Real-time information integrity = system integrity + data integrity + continuous assurances.
604-613
Electronic Edition (link) BibTeX
- Haralambos Mouratidis:
Safety and Security in Multiagent Systems: Report on the 2nd SASEMAS workshop (SASEMAS'05).
614-617
Electronic Edition (link) BibTeX
- Chun-I Fan, Yung-Cheng Chan, Zhi-Kai Zhang:
Robust remote authentication scheme with smart cards.
619-628
Electronic Edition (link) BibTeX
- Jun Jiang, Chen He, Ling-ge Jiang:
A novel mix-based location privacy mechanism in Mobile IPv6.
629-641
Electronic Edition (link) BibTeX
- Fabrizio Baiardi, Alessandro Falleni, Riccardo Granchi, Fabio Martinelli, Marinella Petrocchi, Anna Vaccarelli:
SEAS, a secure e-voting protocol: Design and implementation.
642-652
Electronic Edition (link) BibTeX
- Chuan-Kun Wu:
Hash channels.
653-661
Electronic Edition (link) BibTeX
- Yun Wang:
A multinomial logistic regression modeling approach for anomaly intrusion detection.
662-674
Electronic Edition (link) BibTeX
Copyright © Sat May 16 23:53:41 2009
by Michael Ley (ley@uni-trier.de)