default search action
International Journal of Information and Computer Security, Volume 3
Volume 3, Number 1, 2009
- Shankar Bhausaheb Nikam, Suneeta Agarwal:
Wavelet-based multiresolution analysis of ridges for fingerprint liveness detection. 1-46 - Min Yang, Qingshu Meng, Huanguo Zhang:
The evolutionary design of trace form bent functions in cryptography. 47-59 - Karen Renaud:
Guidelines for designing graphical authentication mechanism interfaces. 60-85 - Sanjay Rawat, Ashutosh Saxena:
Application security code analysis: a step towards software assurance. 86-110
Volume 3, Number 2, 2009
- David M. Nicol, Charles M. Davis, Thomas J. Overbye:
A testbed for power system security evaluation. 114-131 - Hongbing Hu, Yu Chen, Wei-Shinn Ku, Zhou Su, Chung-Han Chen:
Weighted trust evaluation-based malicious node detection for wireless sensor networks. 132-149 - Prashant Dewan, Partha Dasgupta, Amiya Bhattacharya:
Mitigating routing vulnerabilities in ad hoc networks using reputations. 150-172 - Men Long, Chwan-Hwa John Wu:
Design and simulation on data-forwarding security in sensor networks. 173-194 - Chwan-Hwa John Wu, Tong Liu, Chun-Ching Andy Huang, J. David Irwin:
Modelling and simulations for Identity-Based Privacy-Protected Access Control Filter (IPACF) capability to resist massive denial of service attacks. 195-223
Volume 3, Numbers 3/4, 2009
- Mohamed Elhoucine Elhdhili, Lamia Ben Azzouz, Farouk Kamoun:
REputation based Clustering Algorithm for security management in ad hoc networks with liars. 228-244 - Mahmoud Mostafa, Anas Abou El Kalam, Christian Fraboul:
A new protocol for security and QoS in IP networks. 245-264 - Guillaume Hiet, Valérie Viet Triem Tong, Ludovic Mé, Benjamin Morin:
Policy-based intrusion detection in web applications by monitoring Java information flows. 265-279 - Nora Cuppens-Boulahia, Frédéric Cuppens, Fabien Autrel, Hervé Debar:
An ontology-based approach to react to network attacks. 280-305 - Clara Bertolissi, Maribel Fernández:
Distributed event-based access control. 306-320 - Monia Loulou, Mohamed Jmaiel, Mohamed Mosbah:
Dynamic security framework for mobile agent systems: specification, verification and enforcement. 321-336 - Slim Kallel, Anis Charfi, Mira Mezini, Mohamed Jmaiel, Andreas Sewe:
A holistic approach for access control policies: from formal specification to aspect-based enforcement. 337-354
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.