1 | -- | 3 | Kouichi Sakurai, Dieter Gollmann. Managing Insider Security Threats (MIST 2012 Volume 1) |
4 | -- | 20 | William R. Claycomb, Carly L. Huth, Lori Flynn, David M. Mcintire, Todd B. Lewellen. Chronological Examination of Insider Threat Sabotage: Preliminary Observations |
21 | -- | 34 | Shinsaku Kiyomoto, Kazuhide Fukushima, Yutaka Miyake. Design of Categorization Mechanism for Disaster-Information-Gathering System |
35 | -- | 45 | Byungha Choi, Kyungsan Cho. Detection of Insider Attacks to the Web Server |
46 | -- | 60 | S. Sree Vivek, S. Sharmila Deva Selvi, Ramarathnam Venkatesan, C. Pandu Rangan. A Special Purpose Signature Scheme for Secure Computation of Traffic in a Distributed Network |
61 | -- | 71 | Jianfeng Wang, Hua Ma, Qiang Tang, Jin Li 0002, Hui Zhu, Siqi Ma, Xiaofeng Chen 0001. A New Efficient Verifiable Fuzzy Keyword Search Scheme |
72 | -- | 84 | S. Sree Vivek, S. Sharmila Deva Selvi, Salini Selvaraj Kowsalya, C. Pandu Rangan. PKI Based Signcryption without Pairing: an Efficient Scheme with Tight Security Reduction |
85 | -- | 99 | Kangwon Lee, Kyungroul Lee, Jaecheon Byun, Sunghoon Lee, Hyobeom Ahn, Kangbin Yim. Extraction of Platform-unique Information as an Identifier |