Volume 25,
Number 1,
February 2006
Volume 25,
Number 2,
March 2006
- E. Eugene Schultz:
About "Unofficial patches".
79-80
Electronic Edition (link) BibTeX
- Danny Bradbury:
The metamorphosis of malware writers.
89-90
Electronic Edition (link) BibTeX
- Vicki Miller Luoma:
Computer forensics and electronic discovery: The new management challenge.
91-96
Electronic Edition (link) BibTeX
- Vafa D. Izadinia, Derrick G. Kourie, Jan H. P. Eloff:
Uncovering identities: A study into VPN tunnel fingerprinting.
97-105
Electronic Edition (link) BibTeX
- Hsiang-An Wen, Chun-Li Lin, Tzonelih Hwang:
Provably secure authenticated key exchange protocols for low power computing clients.
106-113
Electronic Edition (link) BibTeX
- Vipul Goyal, Virendra Kumar, Mayank Singh, Ajith Abraham, Sugata Sanyal:
A new protocol to counter online dictionary attacks.
114-120
Electronic Edition (link) BibTeX
- Nikos Komninos, Dimitris Vergados, Christos Douligeris:
Layered security design for mobile ad hoc networks.
121-130
Electronic Edition (link) BibTeX
- Raphael Chung-Wei Phan, David Wagner:
Security considerations for incremental hash functions based on pair block chaining.
131-136
Electronic Edition (link) BibTeX
- Krishna Sampigethaya, Radha Poovendran:
A framework and taxonomy for comparison of electronic voting schemes.
137-153
Electronic Edition (link) BibTeX
Volume 25,
Number 3,
May 2006
- E. Eugene Schultz:
Special systems: Overlooked sources of security risk?
155
Electronic Edition (link) BibTeX
- Danny Bradbury:
Modeling network security.
163-164
Electronic Edition (link) BibTeX
- Sebastiaan H. von Solms:
Information Security - The Fourth Wave.
165-168
Electronic Edition (link) BibTeX
- Soojin Lee, Byungchun Chung, Heeyoul Kim, Yunho Lee, Chanil Park, Hyunsoo Yoon:
Real-time analysis of intrusion detection alerts via correlation.
169-183
Electronic Edition (link) BibTeX
- Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati, Deepak B. Phatak:
A novel remote user authentication scheme using bilinear pairings.
184-189
Electronic Edition (link) BibTeX
- Wenliang Du, Mingdong Shang, Haizhi Xu:
A novel approach for computer security education using Minix instructional operating system.
190-200
Electronic Edition (link) BibTeX
- Jun Shao, Zhenfu Cao:
A traceable threshold signature scheme with multiple signing policies.
201-206
Electronic Edition (link) BibTeX
- John Ayoade:
Security implications in RFID and authentication processing framework.
207-212
Electronic Edition (link) BibTeX
- Ming Li:
Change trend of averaged Hurst parameter of traffic under DDOS flood attacks.
213-220
Electronic Edition (link) BibTeX
- Iain Sutherland, George E. Kalb, Andrew Blyth, Gaius Mulley:
An empirical examination of the reverse engineering process for binary files.
221-228
Electronic Edition (link) BibTeX
- Guillermo González-Talaván:
A simple, configurable SMTP anti-spam filter: Greylists.
229-236
Electronic Edition (link) BibTeX
Volume 25,
Number 4,
June 2006
- E. Eugene Schultz:
Representing information security fairly and accurately.
237
Electronic Edition (link) BibTeX
- Reinhardt A. Botha, Tshepo G. Gaadingwe:
Reflecting on 20 SEC conferences.
247-256
Electronic Edition (link) BibTeX
- Richard Ford, Mark Bush, Alexander Bulatov:
Predation and the cost of replication: New approaches to malware prevention?
257-264
Electronic Edition (link) BibTeX
- Wee Hock Desmond Ng, Haitham S. Cruickshank, Zhili Sun:
Scalable balanced batch rekeying for secure group communication.
265-273
Electronic Edition (link) BibTeX
- Hassan Artail, Haïdar Safa, Malek Sraj, Iyad Kuwatly, Zaid Al Masri:
A hybrid honeypot framework for improving intrusion detection systems in protecting organizational networks.
274-288
Electronic Edition (link) BibTeX
- H. A. Kruger, W. D. Kearney:
A prototype for assessing information security awareness.
289-296
Electronic Edition (link) BibTeX
- Ashraf Elgohary, Tarek S. Sobh, Mohammed Zaki:
Design of an enhancement for SSL/TLS protocols.
297-306
Electronic Edition (link) BibTeX
- Chin-Chen Chang, Jung-San Lee:
An anonymous voting mechanism based on the key exchange protocol.
307-314
Electronic Edition (link) BibTeX
Volume 25,
Number 5,
July 2006
Volume 25,
Number 6,
September 2006
- E. Eugene Schultz:
Microsoft is back in the hot seat.
393-394
Electronic Edition (link) BibTeX
- Danny Bradbury:
Microsoft's new window on security.
405-407
Electronic Edition (link) BibTeX
- Rossouw von Solms, Sebastiaan H. von Solms:
Information Security Governance: A model based on the Direct-Control Cycle.
408-412
Electronic Edition (link) BibTeX
- Bilge Karabacak, Ibrahim Sogukpinar:
A quantitative method for ISO 17799 gap analysis.
413-419
Electronic Edition (link) BibTeX
- Kumar Mangipudi, Rajendra S. Katti:
A Secure Identification and Key agreement protocol with user Anonymity (SIKA).
420-425
Electronic Edition (link) BibTeX
- Hamida Seba:
FTKM: A fault-tolerant key management protocol for multicast communications.
426-434
Electronic Edition (link) BibTeX
- Dong Jin Kwak, Sang-Jae Moon, Guilin Wang, Robert H. Deng:
A secure extension of the Kwak-Moon group signcryption scheme.
435-444
Electronic Edition (link) BibTeX
- A. A. Abimbola, Jose Munoz, William J. Buchanan:
NetHost-Sensor: Investigating the capture of end-to-end encrypted intrusive data.
445-451
Electronic Edition (link) BibTeX
- Emrah Tomur, Y. Murat Erten:
Application of temporal and spatial role based access control in 802.11 wireless networks.
452-458
Electronic Edition (link) BibTeX
- Morteza Amini, Rasool Jalili, Hamid Reza Shahriari:
RT-UNNID: A practical solution to real-time network-based intrusion detection using unsupervised neural networks.
459-468
Electronic Edition (link) BibTeX
- Zhi-hong Zuo, Qing-xin Zhu, Ming-tian Zhou:
Infection, imitation and a hierarchy of computer viruses.
469-473
Electronic Edition (link) BibTeX
Volume 25,
Number 7,
October 2006
- E. Eugene Schultz:
Issues concerning the distribution of vulnerability information.
475-476
Electronic Edition (link) BibTeX
- Hazel Lacohée, Andrew D. Phippen, Steven Furnell:
Risk and restitution: Assessing how users establish online trust.
486-493
Electronic Edition (link) BibTeX
- Rossouw von Solms, Sebastiaan H. von Solms:
Information security governance: Due care.
494-497
Electronic Edition (link) BibTeX
- Vinay M. Igure, Sean A. Laughter, Ronald D. Williams:
Security issues in SCADA networks.
498-506
Electronic Edition (link) BibTeX
- Vassilis Kapsalis, Loukas Hadellis, Dimitris Karelis, Stavros A. Koubias:
A dynamic context-aware access control architecture for e-services.
507-521
Electronic Edition (link) BibTeX
- Maria Kjaerland:
A taxonomy and comparison of computer security incidents from the commercial and government sectors.
522-538
Electronic Edition (link) BibTeX
- Wei Wang, Xiaohong Guan, Xiangliang Zhang, Liwei Yang:
Profiling program behavior for anomaly intrusion detection based on the transition and frequency property of computer audit data.
539-550
Electronic Edition (link) BibTeX
Volume 25,
Number 8,
November 2006
Copyright © Sat May 16 23:53:41 2009
by Michael Ley (ley@uni-trier.de)