Journal: Computers & Security

Volume 29, Issue 4

381 -- 382Dimitris Gritzalis, Pierangela Samarati. Editorial
383 -- 392Egon Hilgenstieler, Elias Procópio Duarte Jr., Glenn Mansfield Keeni, Norio Shiratori. Extensions to the source path isolation engine for precise and efficient log-based IP traceback
393 -- 409A. Maciej Rossudowski, Hein S. Venter, Jan H. P. Eloff, Derrick G. Kourie. A security privacy aware architecture and protocol for a single smart card used for multiple services
410 -- 418Fangwei Wang, Yunkai Zhang, Changguang Wang, Jianfeng Ma, Sang-Jae Moon. Stability analysis of a SEIQV epidemic model for rapid spreading worms
419 -- 431Tony Cheneau, Aymen Boudguiga, Maryline Laurent. Significantly improved performances of the cryptographically generated addresses thanks to ECC and GPGPU
432 -- 445Eirik Albrechtsen, Jan Hovden. Improving information security awareness and behaviour through dialogue, participation and collective reflection. An intervention study
446 -- 459Ji Won Yoon, Hyoungshick Kim, Jun Ho Huh. Hybrid spam filtering for mobile communication
460 -- 475Christoforos Ntantogian, Christos Xenakis, Ioannis Stavrakakis. A generic mechanism for efficient authentication in B3G networks
476 -- 486Johan Van Niekerk, Rossouw von Solms. Information security culture: A management perspective
487 -- 500Todd Mander, Richard Cheung, Farhad Nabhani. Power system DNP3 data object security using data sets
501 -- 514Jordi Forné, M. Francisca Hinarejos, Andrés Marín, Florina Almenárez Mendoza, Javier Lopez, José A. Montenegro, Marc Lacoste, Daniel Diaz. Pervasive authentication and authorization infrastructures for mobile users