Journal: Computers & Security

Volume 23, Issue 4

265 -- 266E. Eugene Schultz. Intrusion prevention
267 -- 274E. Eugene Schultz. Security views
275 -- 279Rossouw von Solms, Sebastiaan H. von Solms. From policies to culture
282 -- 289Ji Hu, Christoph Meinel. Tele-Lab IT-Security on CD: portable, reliable and safe IT security training
290 -- 299Heba Kamal Aslan. Logical analysis of AUTHMAC_DH: a new protocol for authentication and key distribution
300 -- 311Victoria Ungureanu. Formal support for certificate management policies
312 -- 319Sanghyun Cho, Sung Deok Cha. SAD: web session anomaly detection based on parameter estimation
320 -- 329Heba Kamal Aslan. A scalable and distributed multicast security protocol using a subgroup-key hierarchy
330 -- 337Yu-Yi Chen, Jinn-ke Jan, Chin-Ling Chen. The design of a secure anonymous Internet voting system
338 -- 351Yougang Song, Brett D. Fleisch. Rico: a security proxy for mobile code