Journal: Computers & Security

Volume 22, Issue 5

366 -- 367E. Eugene Schultz. Pandora s Box: spyware, adware, autoexecution, and NGSCB
368 -- 377E. Eugene Schultz. Security Views
378 -- 387Stephen Hinde. Privacy legislation: a comparison of the US and European approaches
388 -- 391Hank Wolfe. Encountering encryption
402 -- 411Fred Cohen, Deanna Koike. Leading attackers through attack graphs with deceptions
412 -- 415Scott A. Vanstone. Next generation security for wireless: elliptic curve cryptography
416 -- 420Andrew Harding. SSL Virtual Private Networks
423 -- 434Martin Botha, Rossouw von Solms. Utilising fuzzy logic and trend analysis for effective intrusion detection
435 -- 449Gonzalo Álvarez, Slobodan Petrovic. A new taxonomy of Web attacks suitable for efficient encoding
450 -- 452Sheng Zhong, Tianwen Lin. A comment on the Chen-Chung scheme for hierarchical access control
453 -- 456Chien-Lung Hsu, Tzong-Sun Wu. Cryptanalyses and improvements of two cryptographic key assignment schemes for dynamic access control in a user hierarchy