researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Computers & Security
Home
Index
Info
Issue
Volume
22
, Issue
5
366
--
367
E. Eugene Schultz
.
Pandora s Box: spyware, adware, autoexecution, and NGSCB
368
--
377
E. Eugene Schultz
.
Security Views
378
--
387
Stephen Hinde
.
Privacy legislation: a comparison of the US and European approaches
388
--
391
Hank Wolfe
.
Encountering encryption
402
--
411
Fred Cohen
,
Deanna Koike
.
Leading attackers through attack graphs with deceptions
412
--
415
Scott A. Vanstone
.
Next generation security for wireless: elliptic curve cryptography
416
--
420
Andrew Harding
.
SSL Virtual Private Networks
423
--
434
Martin Botha
,
Rossouw von Solms
.
Utilising fuzzy logic and trend analysis for effective intrusion detection
435
--
449
Gonzalo Álvarez
,
Slobodan Petrovic
.
A new taxonomy of Web attacks suitable for efficient encoding
450
--
452
Sheng Zhong
,
Tianwen Lin
.
A comment on the Chen-Chung scheme for hierarchical access control
453
--
456
Chien-Lung Hsu
,
Tzong-Sun Wu
.
Cryptanalyses and improvements of two cryptographic key assignment schemes for dynamic access control in a user hierarchy