Journal: Computers & Security

Volume 25, Issue 6

393 -- 394E. Eugene Schultz. Microsoft is back in the hot seat
405 -- 407Danny Bradbury. Microsoft s new window on security
408 -- 412Rossouw von Solms, Sebastiaan H. von Solms. Information Security Governance: A model based on the Direct-Control Cycle
413 -- 419Bilge Karabacak, Ibrahim Sogukpinar. A quantitative method for ISO 17799 gap analysis
420 -- 425Kumar Mangipudi, Rajendra S. Katti. A Secure Identification and Key agreement protocol with user Anonymity (SIKA)
426 -- 434Hamida Seba. FTKM: A fault-tolerant key management protocol for multicast communications
435 -- 444Dong Jin Kwak, Sang-Jae Moon, Guilin Wang, Robert H. Deng. A secure extension of the Kwak-Moon group signcryption scheme
445 -- 451A. A. Abimbola, Jose Munoz, William J. Buchanan. NetHost-Sensor: Investigating the capture of end-to-end encrypted intrusive data
452 -- 458Emrah Tomur, Y. Murat Erten. Application of temporal and spatial role based access control in 802.11 wireless networks
459 -- 468Morteza Amini, Rasool Jalili, Hamid Reza Shahriari. RT-UNNID: A practical solution to real-time network-based intrusion detection using unsupervised neural networks
469 -- 473Zhi-hong Zuo, Qing-Xin Zhu, Ming-Tian Zhou. Infection, imitation and a hierarchy of computer viruses