


default search action
International Journal of Information Security, Volume 6
Volume 6, Number 1, January 2007
- Nathan L. Clarke

, Steven Furnell
:
Authenticating mobile phone users using keystroke analysis. 1-14 - Carlo Blundo

, Clemente Galdi
, Giuseppe Persiano:
Low-randomness constant-round private XOR computations. 15-26 - Shujing Wang, Yan Zhang:

Handling distributed authorization with delegation through answer set programming. 27-46 - Elisavet Konstantinou, Yannis C. Stamatiou

, Christos D. Zaroliagis
:
Efficient generation of secure elliptic curves. 47-63
Volume 6, Numbers 2-3, March 2007
- Theodosis Dimitrakos

, Fabio Martinelli, Peter Y. A. Ryan
, Steve A. Schneider
:
Guest Editors' Preface. 65-66 - Lantian Zheng, Andrew C. Myers:

Dynamic security labels and static information flow control. 67-84 - Nicoletta De Francesco, Luca Martini:

Instruction-level security typing by abstract interpretation. 85-106 - Boris Köpf, Heiko Mantel:

Transformational typing and unification for automatically correcting insecure programs. 107-131 - J. G. Cederquist

, Ricardo Corin, M. A. C. Dekker, Sandro Etalle, J. I. den Hartog, Gabriele Lenzini:
Audit-based compliance control. 133-151 - Karl Krukow, Mogens Nielsen:

Trust structures. 153-181 - Rob Delicata, Steve A. Schneider

:
An algebraic approach to the verification of a class of Diffie-Hellman protocols. 183-196
Volume 6, Number 4, July 2007
- Stefanos Gritzalis

, Athanasios N. Yannacopoulos
, Costas Lambrinoudakis
, Petros Hatzopoulos, Sokratis K. Katsikas
:
A probabilistic model for optimal insurance contracts against security risks and privacy violation in IT outsourcing environments. 197-211 - Liqun Chen

, Zhaohui Cheng, Nigel P. Smart:
Identity-based key agreement protocols from pairings. 213-241 - Jens-Matthias Bohli, María Isabel González Vasco

, Rainer Steinwandt:
Secure group key establishment revisited. 243-254 - Elisa Bertino, Elena Ferrari

, Federica Paci
, Loredana Parasiliti Provenza:
A system for securing push-based distribution of XML documents. 255-284
Volume 6, Number 5, September 2007
- Scott Knight, Scott Buffett, Patrick C. K. Hung:

The International Journal of Information Security Special Issue on privacy, security and trust technologies and E-business services. 285-286 - Zhengping Wu, Alfred C. Weaver

:
Requirements of federated trust management for service-oriented architectures. 287-296 - Jinshan Liu, Valérie Issarny:

An incentive compatible reputation mechanism for ubiquitous computing environments. 297-311 - Avner Levin:

Is workplace surveillance legal in Canada? 313-321 - Thomas W. Lauer, Xiaodong Deng:

Building online trust through privacy practices. 323-331 - Jie Zhang, Ali A. Ghorbani, Robin Cohen:

A familiarity-based trust model for effective selection of sellers in multiagent e-commerce systems. 333-344 - Mohammad Zulkernine, Mathew Graves, Muhammad Umair Ahmed Khan

:
Integrating software specifications into intrusion detection. 345-357
Volume 6, Number 6, October 2007
- Michael Backes, Stefanos Gritzalis

, Bart Preneel:
Preface. 359-360 - Kostas G. Anagnostakis

, Michael B. Greenwald, Sotiris Ioannidis, Angelos D. Keromytis:
COVERAGE: detecting and reacting to worm epidemics using cooperation and validation. 361-378 - Luciano Bononi

, Carlo Tacconi:
Intrusion detection for secure clustering and routing in Mobile Multi-hop Wireless Networks. 379-392 - George Danezis:

Breaking four mix-related schemes based on Universal Re-encryption. 393-402 - Fernando Esponda, Elena S. Ackley, Paul Helman, Haixia Jia, Stephanie Forrest

:
Protecting data privacy through hard-to-reverse negative databases. 403-415 - Patrick Klinkoff, Engin Kirda, Christopher Kruegel, Giovanni Vigna:

Extending .NET security to unmanaged code. 417-428

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














