Volume 5,
Number 1,
January-March 2008
Volume 5,
Number 2,
April-June
- Elisa Bertino, Ning Shang, Samuel S. Wagstaff Jr.:
An Efficient Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting.
65-70
Electronic Edition (link) BibTeX
- Sarah H. Sellke, Ness B. Shroff, Saurabh Bagchi:
Modeling and Automated Containment of Worms.
71-86
Electronic Edition (link) BibTeX
- Haibing Lu, Yingjiu Li:
Practical Inference Control for Data Cubes.
87-98
Electronic Edition (link) BibTeX
- Roman Obermaisser:
Temporal Partitioning of Communication Resources in an Integrated Architecture.
99-114
Electronic Edition (link) BibTeX
- Suresh Srinivasan, Krishnan Ramakrishnan, Prasanth Mangalagiri, Yuan Xie, Vijaykrishnan Narayanan, Mary Jane Irwin, Karthik Sarpatwari:
Toward Increasing FPGA Lifetime.
115-127
Electronic Edition (link) BibTeX
Volume 5,
Number 3,
July - September 2008
- Spyros T. Halkidis, Nikolaos Tsantalis, Alexander Chatzigeorgiou, George Stephanides:
Architectural Risk Analysis of Software Systems Based on Security Patterns.
129-142
Electronic Edition (link) BibTeX
- Jong-Tae Park, Jae-Wook Nah, Wee-Hyuk Lee:
Dynamic Path Management with Resilience Constraints under Multiple Link Failures in MPLS/GMPLS Networks.
143-154
Electronic Edition (link) BibTeX
- Jian Ren, Lein Harn:
Generalized Ring Signatures.
155-163
Electronic Edition (link) BibTeX
- Francesco Menichelli, Renato Menicocci, Mauro Olivieri, Alessandro Trifiletti:
High-Level Side-Channel Attack Modeling and Simulation for Security-Critical Systems on Chips.
164-176
Electronic Edition (link) BibTeX
- Jing Deng, Yunghsiang S. Han:
Multipath Key Establishment for Wireless Sensor Networks Using Just-Enough Redundancy Transmission.
177-190
Electronic Edition (link) BibTeX
Volume 5,
Number 4,
October - December 2008
- Bruno Blanchet:
A Computationally Sound Mechanized Prover for Security Protocols.
193-207
Electronic Edition (link) BibTeX
- Srdjan Capkun, Mario Cagalj, Ram Kumar Rengaswamy, Ilias Tsigkogiannis, Jean-Pierre Hubaux, Mani B. Srivastava:
Integrity Codes: Message Integrity Protection and Authentication over Insecure Channels.
208-223
Electronic Edition (link) BibTeX
- David Brumley, James Newsome, D. Song, Hao Wang, Somesh Jha:
Theory and Techniques for Automatic Generation of Vulnerability-Based Signatures.
224-241
Electronic Edition (link) BibTeX
- S. Jha, Ninghui Li, Mahesh V. Tripunitara, Qihua Wang, William H. Winsborough:
Towards Formal Verification of Role-Based Access Control Policies.
242-255
Electronic Edition (link) BibTeX
Copyright © Sun May 17 00:23:40 2009
by Michael Ley (ley@uni-trier.de)