Volume 4,
Number 1,
January-March 2007
- HariGovind V. Ramasamy, Adnan Agbaria, William H. Sanders:
A Parsimonious Approach for Obtaining Resource-Efficient and Trustworthy Execution.
1-17
Electronic Edition (link) BibTeX
- Sérgio Gorender, Raimundo José de Araújo Macêdo, Michel Raynal:
An Adaptive Programming Model for Fault-Tolerant Distributed Computing.
18-31
Electronic Edition (link) BibTeX
- Swapna S. Gokhale:
Architecture-Based Software Reliability Analysis: Overview and Limitations.
32-40
Electronic Edition (link) BibTeX
- Kai Hwang, Min Cai, Ying Chen, Min Qin:
Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes.
41-55
Electronic Edition (link) BibTeX
- Antoine Scherrer, Nicolas Larrieu, Philippe Owezarski, Pierre Borgnat, Patrice Abry:
Non-Gaussian and Long Memory Statistical Characterizations for Internet Traffic with Anomalies.
56-70
Electronic Edition (link) BibTeX
- Tzonelih Hwang, Kuo-Chang Lee, Chuan-Ming Li:
Provably Secure Three-Party Authenticated Quantum Key Distribution Protocols.
71-80
Electronic Edition (link) BibTeX
Volume 4,
Number 2,
April-June 2007
- Ravishankar K. Iyer:
Editorial: Dependability and Security.
85-87
Electronic Edition (link) BibTeX
- Min Cai, Kai Hwang, Jianping Pan, Christos Papadopoulos:
WormShield: Fast Worm Signature Generation with Distributed Fingerprint Aggregation.
88-104
Electronic Edition (link) BibTeX
- Cliff Changchun Zou, Donald F. Towsley, Weibo Gong:
Modeling and Simulation Study of the Propagation and Defense of Internet E-mail Worms.
105-118
Electronic Edition (link) BibTeX
- Ram Dantu, João W. Cangussu, Sudeep Patwardhan:
Fast Worm Containment Using Feedback Control.
119-136
Electronic Edition (link) BibTeX
- Sean Peisert, Matt Bishop, Sidney Karin, Keith Marzullo:
Analysis of Computer Intrusions Using Sequences of Function Calls.
137-150
Electronic Edition (link) BibTeX
- Ian Reay, Patricia Beatty, Scott Dick, James Miller:
A Survey and Analysis of the P3P Protocol's Agents, Adoption, Maintenance, and Future.
151-164
Electronic Edition (link) BibTeX
Volume 4,
Number 3,
July-September 2007
- Ahmed Awad E. Ahmed, Issa Traoré:
A New Biometric Technology Based on Mouse Dynamics.
165-179
Electronic Edition (link) BibTeX
- Baruch Awerbuch, Shay Kutten, Yishay Mansour, Boaz Patt-Shamir, George Varghese:
A Time-Optimal Self-Stabilizing Synchronizer Using A Phase Clock.
180-190
Electronic Edition (link) BibTeX
- Gal Badishi, Amir Herzberg, Idit Keidar:
Keeping Denial-of-Service Attackers in the Dark.
191-204
Electronic Edition (link) BibTeX
- Nizar Bouabdallah, Bruno Sericola:
Introducing a Relative Priority for the Shared-Protection Schemes.
205-215
Electronic Edition (link) BibTeX
- Iliano Cervesato, Catherine Meadows:
One Picture Is Worth a Dozen Connectives: A Fault-Tree Representation of NPATRL Security Requirements.
216-227
Electronic Edition (link) BibTeX
- Wei Yu, Yan Lindsay Sun, K. J. Ray Liu:
Optimizing Rekeying Cost for Contributory Group Key Agreement Schemes.
228-242
Electronic Edition (link) BibTeX
Volume 4,
Number 4,
October-December 2007
- Marco Bucci, Luca Giancane, Raimondo Luzzi, Alessandro Trifiletti:
A Dynamic and Differential CMOS Lookup Table with Data-Independent Power Consumption for Cryptographic Applications on Chip Cards.
245-251
Electronic Edition (link) BibTeX
- Xiaoxin Wu, Elisa Bertino:
An Analysis Study on Zone-Based Anonymous Communication in Mobile Ad Hoc Networks.
252-265
Electronic Edition (link) BibTeX
- Gunjan Khanna, Mike Yu Cheng, Padma Varadharajan, Saurabh Bagchi, Miguel P. Correia, Paulo Veríssimo:
Automated Rule-Based Diagnosis through a Distributed Monitor System.
266-279
Electronic Edition (link) BibTeX
- Ilir Gashi, Peter T. Popov, Lorenzo Strigini:
Fault Tolerance via Diversity for Off-the-Shelf Products: A Study with SQL Database Servers.
280-294
Electronic Edition (link) BibTeX
- Marco Serafini, Andrea Bondavalli, Neeraj Suri:
Online Diagnosis and Recovery: On the Choice and Impact of Tuning Parameters.
295-312
Electronic Edition (link) BibTeX
- Mohamed A. Haleem, Chetan Nanjunda Mathur, Rajarathnam Chandramouli, K. P. Subbalakshmi:
Opportunistic Encryption: A Trade-Off between Security and Throughput in Wireless Networks.
313-324
Electronic Edition (link) BibTeX
- Jeremy Lee, Mohammad Tehranipoor, Chintan Patel, Jim Plusquellic:
Securing Designs against Scan-Based Side-Channel Attacks.
325-336
Electronic Edition (link) BibTeX
- Hung-Yu Chien:
SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity.
337-340
Electronic Edition (link) BibTeX
Copyright © Sun May 17 00:23:40 2009
by Michael Ley (ley@uni-trier.de)