Abstract is missing.
- Security in Practice - Security-Usability ChasmAtul Prakash. 1-9 [doi]
- Investigating the Impact of Real-World Factors on Internet Worm PropagationDaniel A. Ray, Charles B. Ward, Bogdan Munteanu, Jonathan Blackwell, Xiaoyan Hong, Jun Li. 10-24 [doi]
- An OS Security Protection Model for Defeating Attacks from NetworkZhiyong Shan, Qiuyue Wang, Xiaofeng Meng. 25-36 [doi]
- A Secure Intra-domain Routing Protocol for Wireless Mesh NetworksRamanarayana Kandikattu, Lillykutty Jacob. 37-50 [doi]
- Genetic Algorithm Based Steganography Using WaveletsK. B. Raja, Kiran Kumar K., Satish Kumar N., M. S. Lakshmi, H. Preeti, K. R. Venugopal, Lalit M. Patnaik. 51-63 [doi]
- Cryptanalysis of Tso et al. s ID-Based Tripartite Authenticated Key Agreement ProtocolMeng-Hui Lim, Sanggon Lee, Sang-Jae Moon. 64-76 [doi]
- A Near Optimal S-Box DesignDebojyoti Bhattacharya, Nitin Bansal, Amitava Banerjee, Dipanwita Roy Chowdhury. 77-90 [doi]
- A Software Framework for Autonomic Security in Pervasive EnvironmentsAnshuman Saxena, Marc Lacoste, Tahar Jarboui, Ulf Lücking, Bernd Steinke. 91-109 [doi]
- DLPKH - Distributed Logical Public-Key HierarchyRakeshbabu Bobba, Himanshu Khurana. 110-127 [doi]
- Inference Control in Logic Databases as a Constraint Satisfaction ProblemJoachim Biskup, Dominique Marc Burgard, Torben Weibert, Lena Wiese. 128-142 [doi]
- An Improved SCARE Cryptanalysis Against a Secret A3/A8 GSM AlgorithmChristophe Clavier. 143-155 [doi]
- Cryptanalysis and the Improvement of Kim et al. s Password Authentication SchemesDebasis Giri, P. D. Srivastava. 156-166 [doi]
- Information Leakage Via Electromagnetic Emanations and Evaluation of Tempest CountermeasuresHidema Tanaka. 167-179 [doi]
- Data Privacy - Problems and SolutionsSabrina De Capitani di Vimercati, Pierangela Samarati. 180-192 [doi]
- Secure Chaotic Synchronization Using Negative Feedback of Super-Positioned SignalsG. K. Patra, V. Anil Kumar, R. P. Thangavelu. 193-207 [doi]
- A Secure and Efficient Multi-authority Proactive Election SchemeAshish Kumar Singh, Priya Chandran. 208-218 [doi]
- Secure Transaction Management Protocols for MLS/DDBMSNavdeep Kaur, Rajwinder Singh, Manoj Misra, Anil Kumar Sarje. 219-233 [doi]
- The Curse of Ease of Access to the InternetKotagiri Ramamohanarao, Kapil Kumar Gupta, Tao Peng, Christopher Leckie. 234-249 [doi]
- A Structured Approach to Detect Scanner-Printer Used in Generating Fake DocumentGaurav Gupta, R. Sultania, S. Mondal, Sanjoy Kumar Saha, Bhabatosh Chanda. 250-253 [doi]
- A Zero Knowledge Password Proof Mutual Authentication Technique Against Real-Time Phishing AttacksMohsen Sharifi, Alireza Saberi, Mojtaba Vahidi, Mohammad Zoroufi. 254-258 [doi]
- Simulation of Dynamic Honeypot Based Redirection to Counter Service Level DDoS AttacksAnjali Sardana, Ramesh Chandra Joshi. 259-262 [doi]
- A New Concept of Key Agreement Using Chaos-Synchronization Based Parameter EstimationG. K. Patra, V. Anil Kumar, R. P. Thangavelu. 263-266 [doi]
- On Knowledge-Based Classification of Abnormal BGP EventsJun Li, Dejing Dou, Shiwoong Kim, Han Qin, Yibo Wang. 267-271 [doi]
- Towards Automated Privilege SeparationDhananjay Bapat, Kevin R. B. Butler, Patrick Drew McDaniel. 272-276 [doi]
- Constructing a Common Cross Site Scripting Vulnerabilities Enumeration (CXE) Using CWE and CVEK. Sivakumar, K. Garg. 277-291 [doi]
- Performance Analysis for Multi Sensor Fingerprint Recognition SystemShimon Modi, Stephen J. Elliott, Hakil Kim. 292-305 [doi]
- Use of Dimensionality Reduction for Intrusion DetectionSubrat Kumar Dash, Sanjay Rawat, Arun K. Pujari. 306-320 [doi]