Journal: Computers & Security

Volume 24, Issue 1

10 -- 15Theodosios Tsiakis, George Stephanides. The concept of security and trust in electronic payments
16 -- 30Mariana Gerber, Rossouw von Solms. Management of risk in the information age
31 -- 43Simon Hansman, Ray Hunt. A taxonomy of network and computer attacks
44 -- 49Tianjie Cao, Dongdai Lin, Rui Xue. A randomized RSA-based partially blind signature scheme for electronic cash
50 -- 56Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo. An improvement of Hwang-Lee-Tang s simple remote user authentication scheme
57 -- 68Yacine Challal, Abdelmadjid Bouabdallah, Hatem Bettahar. H::2::A: Hybrid Hash-chaining scheme for Adaptive multicast source authentication of media-streaming
69 -- 75Kerry-Lynn Thomson, Rossouw von Solms. Information security obedience: a definition
76 -- 82Ruishan Zhang, Kefei Chen. Improvements on the WTLS protocol to avoid denial of service attacks
83 -- 86Che Wun Chiou, Chiou-Yng Lee. Multiplexer-based double-exponentiation for normal basis of GF(2:::::::m:::::::)