Journal: Computers & Security

Volume 31, Issue 1

1 -- 2Eugene H. Spafford. Editorial
3 -- 0Manuel Leithner, Edgar Weippl. Android forensics
4 -- 25Antonio Maña, Hristo Koshutanski, Ernesto J. Pérez. A trust negotiation based security framework for service provisioning in load-balancing clusters
26 -- 32M. Oguzhan Külekci. On scrambling the Burrows-Wheeler transform to provide privacy in lossless compression
33 -- 39Gaobo Yang, Ning Chen, Qin Jiang. A robust hashing algorithm based on SURF for video copy detection
40 -- 58Gaurav Bhatnagar, Q. M. Jonathan Wu, Balasubramanian Raman. A new robust adjustable logo watermarking scheme
59 -- 69Xingwen Zhao, Fangguo Zhang. Tracing and revoking scheme for dynamic privileges against pirate rebroadcast
70 -- 82Sheng Mou, Zhiwen Zhao, Sisi Jiang, Zushun Wu, Jiaojiao Zhu. Feature extraction and classification algorithm for detecting complex covert timing channel
83 -- 95Princely Ifinedo. Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory
96 -- 108Luis Rodero Merino, Luis Miguel Vaquero, Eddy Caron, Adrian Muresan, Frédéric Desprez. Building safe PaaS clouds: A survey on security in multitenant software platforms
109 -- 121Deian Stefan, Xiaokui Shu, Danfeng (Daphne) Yao. Robustness of keystroke-dynamics based biometrics against synthetic forgeries
122 -- 136Timothy H. Lacey, Robert F. Mills, Barry E. Mullins, Richard A. Raines, Mark E. Oxley, Steven K. Rogers. RIPsec - Using reputation-based multilayer security to protect MANETs
137 -- 147Thomas E. Dube, Richard A. Raines, Gilbert L. Peterson, Kenneth W. Bauer Jr., Michael R. Grimaila, Steven K. Rogers. Malware target recognition via static heuristics