Journal: Computers & Security

Volume 23, Issue 6

441 -- 442E. Eugene Schultz. The case for one-time credentials
453 -- 455Steven A. Hofmeyr. The implications of immunology for secure systems design
459 -- 468Avishai Wool. The use and usability of direction-based filtering in firewalls
469 -- 477Rui Jiang, Li Pan, Jianhua Li. Further analysis of password authentication schemes based on authentication tests
478 -- 488Hassan Artail. Peer-assisted carrying authentication (PACA)
489 -- 497H. S. Venter, Jan H. P. Eloff. Vulnerability forecasting - a conceptual model
498 -- 529Gwan-Hwan Hwang, Tao-Ku Chang. An operational model and language support for securing XML documents