350 | -- | 0 | Sushil Jajodia, Pierangela Samarati. Guest Editorial |
351 | -- | 362 | Angelo Rossi, Samuel Pierre, Suresh Krishnan. Secure Route Optimization for MIPv6 Using Enhanced CGA and DNSSEC |
363 | -- | 373 | Teodor Sommestad, Mathias Ekstedt, Hannes Holm. The Cyber Security Modeling Language: A Tool for Assessing the Vulnerability of Enterprise System Architectures |
374 | -- | 384 | Xiaofei Wang, Yang Xu, Junchen Jiang, Olga Ormond, Bin Liu, Xiaojun Wang. StriFA: Stride Finite Automata for High-Speed Regular Expression Matching in Network Intrusion Detection Systems |
385 | -- | 395 | Fosca Giannotti, Laks V. S. Lakshmanan, Anna Monreale, Dino Pedreschi, Wendy Hui Wang. Privacy-Preserving Mining of Association Rules From Outsourced Transaction Databases |
396 | -- | 409 | Jian Chang, Krishna K. Venkatasubramanian, Andrew G. West, Sampath Kannan, Insup Lee, Boon Thau Loo, Oleg Sokolsky. AS-CRED: Reputation and Alert Service for Interdomain Routing |
410 | -- | 419 | Mingwu Zhang, Tsuyoshi Takagi. Efficient Constructions of Anonymous Multireceiver Encryption Protocol and Their Deployment in Group E-mail Systems With Privacy Preservation |
420 | -- | 429 | Fagen Li, Hui Zhang, Tsuyoshi Takagi. Efficient Signcryption for Heterogeneous Systems |
430 | -- | 441 | Suku Nair, Omar Al-Ibrahim, Subil Abraham. State Machine-Based Security Fusion for Resource-Constrained Environments |
442 | -- | 454 | Salah-Eddine Tbahriti, Chirine Ghedira, Brahim Medjahed, Michael Mrissa, Djamal Benslimane. How to Enhance Privacy Within DaaS Service Composition? |
455 | -- | 466 | Amir Averbuch, Michael Kiperberg, Nezer Jacob Zaidenberg. Truly-Protect: An Efficient VM-Based Software Protection |
467 | -- | 477 | Thomas E. Dube, Richard A. Raines, Michael R. Grimaila, Kenneth W. Bauer Jr., Steven K. Rogers. Malware Target Recognition of Unknown Threats |
478 | -- | 488 | Dawei Li, Xiaoyan Hong, Darwin Witt. ProtoGENI, a Prototype GENI Under Security Vulnerabilities: An Experiment-Based Security Study |
489 | -- | 500 | Len Sassaman, Meredith L. Patterson, Sergey Bratus, Michael E. Locasto. Security Applications of Formal Language Theory |
501 | -- | 515 | Ramadan Abdunabi, Mustafa Al-Lail, Indrakshi Ray, Robert B. France. Specification, Validation, and Enforcement of a Generalized Spatio-Temporal Role-Based Access Control Model |