Journal: Computers & Security

Volume 30, Issue 4

171 -- 0Eugene H. Spafford. Editorial
172 -- 177Xiongfeng Ma, Chi-Hang Fred Fung, Jean-Christian Boileau, H. F. Chau. Universally composable and customizable post-processing for practical quantum key distribution
178 -- 193Travis D. Breaux, David L. Baumer. Legally reasonable security requirements: A 10-year FTC retrospective
194 -- 207Hugues Chabot, Raphael Khoury, Nadia Tawbi. Extending the enforcement power of truncation monitors using static analysis
208 -- 220Nancie Gunson, Diarmid Marshall, Hazel Morton, Mervyn A. Jack. User perceptions of security and usability of single-factor and two-factor authentication in automated telephone banking
221 -- 241Davide Ariu, Roberto Tronci, Giorgio Giacinto. HMMPayl: An intrusion detection system based on Hidden Markov Models
242 -- 256Sebastian Möller, Noam Ben-Asher, Klaus-Peter Engelbrecht, Roman Englert, Joachim Meyer. Modeling the behavior of users who are confronted with security mechanisms
257 -- 272Stylianos Basagiannis, Sophia G. Petridou, Nikolaos Alexiou, Georgios I. Papadimitriou, Panagiotis Katsaros. Quantitative analysis of a certified e-mail protocol in mobile environments: A probabilistic model checking approach
273 -- 287Dong-Her Shih, David C. Yen, Chih-Hung Cheng, Ming-Hung Shih. A secure multi-item e-auction mechanism with bid privacy