Journal: Computers & Security

Volume 31, Issue 6

739 -- 740Eugene H. Spafford. Editorial
741 -- 749Anmin Fu, Yuqing Zhang, ZhenChao Zhu, Qi Jing, Jingyu Feng. An efficient handover authentication scheme with privacy preservation for IEEE 802.16m network
750 -- 770Lara Khansa, Deborah F. Cook, Tabitha L. James, Olga Bruyaka. Impact of HIPAA provisions on the stock market value of healthcare institutions, and information security and other information technology firms
771 -- 781Aniello Castiglione, Giuseppe Cattaneo, Maurizio Cembalo, Alfredo De Santis, Pompeo Faruolo, Fabio Petagna, Umberto Ferraro Petrillo. Engineering a secure mobile messaging framework
782 -- 790Stavros N. Shiaeles, Vasilios Katos, Alexandros S. Karakos, Basil K. Papadopoulos. Real time DDoS detection using fuzzy estimators
791 -- 798WenBin Hsieh, Jenq-Shiou Leu. Exploiting hash functions to intensify the remote user authentication scheme
799 -- 0Katina Michael. Hacking: The Next Generation
800 -- 0Tim Wedge. The Basics of Digital Forensics
801 -- 0Bill Tsoumas, Dimitris Gritzalis. Inside Cyber Warfare: Mapping the Cyber Underworld
802 -- 803Alexios Mylonas, Dimitris Gritzalis. Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software