Journal: Computers & Security

Volume 28, Issue 8

729 -- 730Dimitris Gritzalis, Tom Karygiannis. Editorial
731 -- 742Amir Herzberg. DNS-based email sender authentication mechanisms: A critical review
743 -- 753Ram Dantu, Sonia Fahmy, Henning Schulzrinne, João W. Cangussu. Issues and challenges in securing VoIP
754 -- 771Srdjan Pudar, G. Manimaran, Chen-Ching Liu. PENET: A practical method and tool for integrated modeling of security attacks and countermeasures
772 -- 784Juan Pedro Muñoz-Gea, Josemaria Malgosa-Sanahuja, Pilar Manzanares-Lopez, Juan Carlos Sanchez-Aarnoutse, Joan García-Haro. Proposal, design and evaluation of a mechanism to limit the length of anonymous overlay network paths
785 -- 794Lihong Yao, Xiaochao Zi, Li Pan, Jianhua Li. A study of on/off timing channel based on packet delay distribution
795 -- 802Junsup Lee, Sung Deok Cha, Dongkun Lee, Hyungkyu Lee. Classification of web robots: An empirical study based on over one billion requests
803 -- 815Yu-Lun Huang, P. H. Lu, J. Doug Tygar, A. D. Joseph. OSNP: Secure wireless authentication protocol using one-time key
816 -- 826Hyeun-Suk Rhee, Cheong-Tag Kim, Young U. Ryu. Self-efficacy in information security: Its influence on end users' information security practice behavior
827 -- 842Yong Tang, Bin Xiao, Xicheng Lu. Using a bioinformatics approach to generate accurate exploit-based signatures for polymorphic worms
843 -- 856Jorge Fontenla González, Manuel Caeiro Rodríguez, Martín Llamas Nistal, Luis E. Anido-Rifón. Reverse OAuth: A solution to achieve delegated authorizations in single sign-on e-learning systems