Journal: Computers & Security

Volume 25, Issue 2

79 -- 80E. Eugene Schultz. About Unofficial patches
89 -- 90Danny Bradbury. The metamorphosis of malware writers
91 -- 96Vicki Miller Luoma. Computer forensics and electronic discovery: The new management challenge
97 -- 105Vafa D. Izadinia, Derrick G. Kourie, Jan H. P. Eloff. Uncovering identities: A study into VPN tunnel fingerprinting
106 -- 113Hsiang-An Wen, Chun-Li Lin, Tzonelih Hwang. Provably secure authenticated key exchange protocols for low power computing clients
114 -- 120Vipul Goyal, Virendra Kumar, Mayank Singh, Ajith Abraham, Sugata Sanyal. A new protocol to counter online dictionary attacks
121 -- 130Nikos Komninos, Dimitris Vergados, Christos Douligeris. Layered security design for mobile ad hoc networks
131 -- 136Raphael Chung-Wei Phan, David Wagner. Security considerations for incremental hash functions based on pair block chaining
137 -- 153Krishna Sampigethaya, Radha Poovendran. A framework and taxonomy for comparison of electronic voting schemes