Journal: Computers & Security

Volume 23, Issue 2

87 -- 88E. Eugene Schultz. Incident response teams need to change
97 -- 103Mohammad Peyravian, Allen Roginsky, Nevenko Zunic. Non-PKI methods for public key distribution
107 -- 119Horng-Twu Liaw. A secure electronic voting protocol for general elections
120 -- 125Tzong-Sun Wu, Chien-Lung Hsu. Efficient user identification scheme with key distribution preserving anonymity for distributed computer networks
126 -- 136Chang-Joo Moon, Dae-Ha Park, Soung-Jin Park, Doo-Kwon Baik. Symmetric RBAC model that takes the separation of duty and role hierarchies into consideration
137 -- 153Theodore Stergiou, Mark S. Leeson, Roger J. Green. An alternative architectural framework to the OSI security model
154 -- 166Allister Cournane, Ray Hunt. An analysis of the tools used for the generation and prevention of spam
167 -- 173Wen-Shenq Juang. Efficient password authenticated key agreement using smart cards
174 -- 178Shiang-Feng Tzeng, Min-Shiang Hwang, Cheng-Ying Yang. An improvement of nonrepudiable threshold proxy signature scheme with known signers