Abstract is missing.
- A novel network platform for secure and efficient malware collection based on reconfigurable hardware logicSascha Mühlbach, Andreas Koch 0001. 9-14 [doi]
- DDoS attacks traffic and Flash Crowds traffic simulation with a hardware test center platformJie Wang 0001, Raphael C.-W. Phan, John N. Whitley, David J. Parish. 15-20 [doi]
- Assessing the Portuguese Web applications securityNuno Teodoro, Carlos Serrão. 21-26 [doi]
- An AODE-based intrusion detection system for computer networksZubair A. Baig, AbdulRahman Shaheen, Radwan E. Abdel-Aal. 28-35 [doi]
- Autonomous agents for Testing and Verification of Softwares after Deployment over NetworkUmar Manzoor, Janita Irfan, Samia Nefti. 36-41 [doi]
- Self-organizing feature maps for User-to-Root and Remote-to-Local network intrusion detection on the KDD Cup 1999 datasetRyan Wilson, Charlie Obimbo. 42-47 [doi]
- Internet-based management and consumption of digital assetsYulin Wang, Yixin Chen, Jing Feng, Hong Ding, Wenjia Ding. 49-53 [doi]
- The concept of Secure Mobile WalletHao Zhao, Sead Muftic. 54-58 [doi]
- A new and efficient approach to protect AES against differential power analysisMassoud Masoumi, Soheil Mohammadi. 59-66 [doi]
- Simple power analysis attacks using chosen message against ECC hardware implementationsHuiyun Li, Keke Wu, Guoqing Xu, Hai Yuan, Peng Luo. 68-72 [doi]
- m)Moncef Amara, Amar Siad. 73-78 [doi]
- Removing directory servers from anonymous communication systems using ID-Based Encryption to improve scalabilityHiroyuki Tanaka, Shoichi Saito, Hiroshi Matsuo. 79-84 [doi]
- Security extensions of Windows environment based on FIPS 201 (PIV) smart cardAbdul Ghafoor Abbasi, Sead Muftic, Shahzad Mumtaz. 86-92 [doi]
- Giving you back control of your data digital signing practical issues and the eCert solutionLisha Chen-Wilson, Andrew M. Gravell, David Argles. 93-99 [doi]
- A survey of static software watermarkingJames Hamilton, Sebastian Danicic. 100-107 [doi]
- A software application to analyze the effects of temporal and environmental metrics on overall CVSS v2 scoreAssad Ali, Pavol Zavarsky, Dale Lindskog, Ron Ruhl. 109-113 [doi]
- Exploiting code mobility for dynamic binary obfuscationPaolo Falcarin, Stefano Di Carlo, Alessandro Cabutto, Nicola Garazzino, Davide Barberis. 114-120 [doi]
- Bio-inspired visual user detection for intelligent interfaceWoo Joon Han, Il Song Han. 121-123 [doi]
- Secure confirmation of sensitive transaction data in modern Internet banking servicesThomas Weigold, Alain P. Hiltgen. 125-132 [doi]
- Secure service-oriented architecture for mobile transactionsFeng Zhang, Sead Muftic, Gernot Schmoelzer. 133-138 [doi]
- High level anti-phishing countermeasure: A case studyAbdullah Alnajim. 139-144 [doi]
- What DHCPv6 says about youStephen Groat, Matthew Dunlop, Randy C. Marchany, Joseph G. Tront. 146-151 [doi]
- Detection of fraud use of credit card by extended VFDTTatsuya Minegishi, Ayahiko Niimi. 152-159 [doi]
- Web services: Security challengesMohamad Ibrahim Ladan. 160-163 [doi]
- Tamper-resistant database logging on mobile devicesSubhasish Mazumdar, Anand Paturi. 165-170 [doi]
- IBE-Trust: A security framework for Wireless Sensor NetworksYusnani Mohd Yussoff, Habibah Hashim. 171-176 [doi]
- Security analysis and countermeasures assessment against spit attacks on VoIP systemsMarialisa Scatà, Aurelio La Corte. 177-183 [doi]
- Secure application access to IMS via 4G GAA architectureCristina-Elena Vintila. 185-191 [doi]
- High-performance modular exponentiation algorithm by using a new modified modular multiplication algorithm and common-multiplicand-multiplication methodAbdalhossein Rezai, Parviz Keshavarzi. 192-197 [doi]
- A user-centric approach to eCertificate for electronic identities (eIDs) management in mobile environmentMichele Schiano di Zenise, Andrea Vitaletti, David Argles. 198-203 [doi]
- Effective server virtualization with enhanced security strategy for large organizationDharmalingam Ramalingam, Arun Nagarle Shivashankarappa. 205-209 [doi]
- Virtual machine based security architectureElahe Borghei, Reza Azmi, Alireza Ghahremanian, Hamed Nemati. 210-215 [doi]
- Security, privacy and efficiency of Internet banking transactionsCorrado Ronchi, Akmal Khodjanov, Muzaffar Mahkamov, Shukhrat Zakhidov. 216-222 [doi]
- A graphical password authentication systemAhmad Almulhem. 223-225 [doi]
- Related-key impossible differential cryptanalysis on Crypton and Crypton v1.0Yuechuan Wei, Chao Li, Bing Sun. 227-232 [doi]
- Encryption algorithm using Programmable Cellular AutomataPetre Anghelescu. 233-239 [doi]
- New most efficient state recovery attacks on an eSTREAM candidate F-FCSR-H v2 and F-FCSR-H stream ciphersArshad Ali. 240-246 [doi]
- On the extraction of forensically relevant information from physical memoryFunminiyi Olajide, Nick Savage. 248-252 [doi]
- Concurrency control and consistency maintenance with DTD and SSM for weakly connected environmentsK. Chitra, Al-Dahoud Ali. 253-257 [doi]
- Toward protecting the integrity of relational databasesIbrahim Kamel, Kareem Kamel. 258-261 [doi]
- A 2-level model for e-commerce securitySimin Ghesmati, Majid Sate, Abbas Asosheh. 263-268 [doi]
- Security review of email summarization systemsTaiwo Ayodele, Charles A. Shoniregun, Galyna A. Akmayeva. 269-271 [doi]
- Security of mobile Internet access with UMTS/HSDPA/LTEDaniel Caragata, Safwan El Assad, Ion Tutanescu, Charles A. Shoniregun, Galyna A. Akmayeva. 272-276 [doi]
- E-STOS: Extending Smart Traffic Online System with traffic laws time delaysHatem Fawzi Halaoui. 277-282 [doi]
- FingerID: A new security model based on fingerprint recognition for distributed systemsSara Jeza Alotaibi, David Argles. 284-289 [doi]
- Automatic hand writer identification using the feed forward neural networksConstantin Anton, Cosmin Stirbu, Romeo-Vasile Badea. 290-293 [doi]