Journal: Computers & Security

Volume 28, Issue 3-4

105 -- 120Albert Levi, Can Berk Güder. Understanding the limitations of S/MIME digital signatures for e-mails: A GUI based approach
121 -- 129Dimitris Mitropoulos, Diomidis Spinellis. SDriver: Location-specific signatures prevent SQL injection attacks
130 -- 137Reinhardt A. Botha, Steven Furnell, Nathan L. Clarke. From desktop to mobile: Examining the security experience
138 -- 143Jen-Ho Yang, Chin-Chen Chang. An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem
144 -- 152Kuo-Fong Kao, I-En Liao, Yueh-Chia Li. Detecting rogue access points using client-side bottleneck bandwidth analysis
153 -- 173Reza Sadoddin, Ali A. Ghorbani. An incremental frequent structure mining framework for real-time alert correlation
174 -- 188Alessandro Basso, Stefano Sicco. Preventing massive automated access to web resources
189 -- 198M. T. Dlamini, Jan H. P. Eloff, Mariki M. Eloff. Information security: The moving target
199 -- 214Mawloud Omar, Yacine Challal, Abdelmadjid Bouabdallah. Reliable and fully distributed trust model for mobile ad hoc networks
215 -- 228Divakaran Liginlal, Inkook Sim, Lara Khansa. How significant is human error as a cause of privacy breaches? An empirical study and a framework for error management
229 -- 241P. P. Deepthi, P. S. Sathidevi. Design, implementation and analysis of hardware efficient stream ciphers using LFSR based hash functions