Journal: Computers & Security

Volume 22, Issue 7

556 -- 558E. Eugene Schultz. Patching Pandemonium
570 -- 576Stephen Hinde. Nimbyism, dominoes and creaking infrastructure
577 -- 579Hank Wolfe. Forensic evidence testimony - some thoughts
580 -- 584Rolf Moulton, Robert S. Coles. Applying information security governance
585 -- 588Nicolas Sklavos, Odysseas G. Koufopavlou. Data dependent rotations, a trustworthy approach for future encryption systems/ciphers: low cost and high performance
591 -- 595Jau-Ji Shen, Chih-Wei Lin, Min-Shiang Hwang. Security enhancement for the timestamp-based password authentication scheme using smart cards
596 -- 612Sang Hyun Oh, Won Suk Lee. An anomaly intrusion detection method by clustering normal user behavior
613 -- 623Sang-Jun Han, Sung-Bae Cho. Detecting intrusion with rule-based integration of multiple models
624 -- 642Harold W. Thimbleby. The reduced Enigma
643 -- 645Bin Wang, Jian-hua Li, Zhi-Peng Tong. Cryptanalysis of an enhanced timestamp-based password authentication scheme