Marina L. Gavrilova, Chih Jeng Kenneth Tan, Edward D. Moreno (Eds.):
Transactions on Computational Science IV, Special Issue on Security in Computing.
Lecture Notes in Computer Science 5430 Springer 2009, ISBN 978-3-642-01003-3 BibTeX
- Reouven Elbaz, David Champagne, Catherine H. Gebotys, Ruby B. Lee, Nachiketh R. Potlapally, Lionel Torres:
Hardware Mechanisms for Memory Authentication: A Survey of Existing Techniques and Engines.
1-22
Electronic Edition (link) BibTeX
- Victor P. Roche, Unai Arronategui:
Behavioural Characterization for Network Anomaly Detection.
23-40
Electronic Edition (link) BibTeX
- Feng Hao, Piotr Zielinski:
The Power of Anonymous Veto in Public Discussion.
41-52
Electronic Edition (link) BibTeX
- Emad Eldin Mohamed, Hussein M. Abdel-Wahab:
Collusion-Resistant Message Authentication in Overlay Multicast Communication.
53-67
Electronic Edition (link) BibTeX
- Emerson Ribeiro de Mello, Michelle S. Wangham, Joni da Silva Fraga, Edson T. de Camargo, Davi da Silva Böger:
A Model for Authentication Credentials Translation in Service Oriented Architecture.
68-86
Electronic Edition (link) BibTeX
- Ratna Dutta, Tom Dowling:
Secure and Efficient Group Key Agreements for Cluster Based Networks.
87-116
Electronic Edition (link) BibTeX
- Jaydeb Bhaumik, Dipanwita Roy Chowdhury:
An Integrated ECC-MAC Based on RS Code.
117-135
Electronic Edition (link) BibTeX
- Brijesh Kumar Chaurasia, Shekhar Verma, G. S. Tomar, Ajith Abraham:
Optimizing Pseudonym Updation in Vehicular Ad-Hoc Networks.
136-148
Electronic Edition (link) BibTeX
- Hind Rakkay, Hanifa Boucheneb:
Security Analysis of Role Based Access Control Models Using Colored Petri Nets and CPNtools.
149-176
Electronic Edition (link) BibTeX
- Subhendu Aich, Samrat Mondal, Shamik Sural, Arun K. Majumdar:
Role Based Access Control with Spatiotemporal Context for Mobile Applications.
177-199
Electronic Edition (link) BibTeX
- Jaafar Almasizadeh, Mohammad Abdollahi Azgomi:
A Method for Estimation of the Success Probability of an Intrusion Process by Considering the Temporal Aspects of the Attacker Behavior.
200-214
Electronic Edition (link) BibTeX
- Fábio Dacêncio Pereira, Edward David Moreno Ordonez:
A Hardware Architecture for Integrated-Security Services.
215-229
Electronic Edition (link) BibTeX
- Francesco Regazzoni, Thomas Eisenbarth, Axel Poschmann, Johann Großschädl, Frank K. Gürkaynak, Marco Macchetti, Zeynep Toprak Deniz, Laura Pozzi, Christof Paar, Yusuf Leblebici, Paolo Ienne:
Evaluating Resistance of MCML Technology to Power Analysis Attacks Using a Simulation-Based Methodology.
230-243
Electronic Edition (link) BibTeX
- Jedidiah R. Crandall, John Brevik, Shaozhi Ye, Gary Wassermann, Daniela A. S. de Oliveira, Zhendong Su, Shyhtsun Felix Wu, Frederic T. Chong:
Putting Trojans on the Horns of a Dilemma: Redundancy for Information Theft Detection.
244-262
Electronic Edition (link) BibTeX
Copyright © Sun May 17 00:23:31 2009
by Michael Ley (ley@uni-trier.de)