Journal: Computers & Security

Volume 29, Issue 2

165 -- 166Dimitris Gritzalis, Sabrina De Capitani di Vimercati. Editorial
167 -- 179Josep Lluis Ferrer-Gomilla, Jose Antonio Onieva, Magdalena Payeras, Javier Lopez. Certified electronic mail: Properties revisited
180 -- 195Houssem Jarraya, Maryline Laurent. A secure peer-to-peer backup service keeping great autonomy while under the supervision of a provider
196 -- 207A. Da Veiga, Jan H. P. Eloff. A framework and assessment instrument for information security culture
208 -- 224Ming-Yang Su. WARP: A wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks
225 -- 243Sven Ehlert, Dimitris Geneiatakis, Thomas Magedanz. Survey of network security systems to counter SIP-based denial-of-service attacks
244 -- 252Marko Hölbl, Tatjana Welzer, Bostjan Brumen. Two proposed identity-based three-party authenticated key agreement protocols from pairings
253 -- 268Natalia Stakhanova, Samik Basu, Johnny Wong. On the symbiosis of specification-based and anomaly-based detection
269 -- 277Chin-Chen Chang, Hao-Chuan Tsai, Yi-Pei Hsieh. An efficient and fair buyer-seller fingerprinting scheme for large scale networks
278 -- 290Gabriel López Millán, Manuel Gil Pérez, Gregorio Martínez Pérez, Antonio F. Gómez-Skarmeta. PKI-based trust management in inter-domain scenarios