Journal: Int. J. Comput.

Volume 4, Issue 2

8 -- 16Philip Attfield, Ming-Yuh Huang. Real-World Access control Systematic Failures; Reality or Virtual Reality?
17 -- 25Vlasti Broucek, Paul Turner. Considerations for E-Forensics: Insights into Implications of uncoordinated Technical, organisational and Legal responses to Illegal or Inappropriate on-Line Behaviours
26 -- 35Dan Cvrcek, Václav Matyás Jr., Marek Kumpost. On Privacy Classification in Ubiquitous Computing Systems
36 -- 45Nicolas Prigent, Christophe Bidan. Securing Devices Communities in spontaneous Networks
46 -- 53Viktor Lokazyuk, Oksana Pomorova. The Problems of Information Defence in Diagnosis Intelligent Systems of Microprocessor Devices
54 -- 60Anastasios Fragopoulos, Dimitrios N. Serpanos. Sources of Randomness for Use in Random number Generation
61 -- 68Georgy Loutsky, Valerij Shyrotchin, Vadim Mukhin. Integrated Systems of Information Security in Computer Networks
69 -- 76Andriy Horpenyuk. Fast Algorithms and Computing means of cryptological Functions
77 -- 94Sankalp Singh, Adnan Agbaria, Fabrice Stevens, Tod Courtney, John F. Meyer, William H. Sanders, Partha P. Pal. Validation of a survivable Publish-Subscribe System
95 -- 104Andrian Piskozub. Modern Approaches of Securing Computer Networks from Denial of Service Attacks
105 -- 112Akio Shiibashi, Kinji Mori. Autonomous Decentralized Data Consistency for High-Assurance Embedded System
113 -- 123Igor V. Kotenko, Alexander Ulanov. Agent-based simulation of DDoS Attacks and Defense Mechanisms
124 -- 132Zdravko Karakehayov, Ivan Radev. A Scalable Security Service for Geographic Ad-Hoc Routing